The source and integrity of identity assertions and access tokens are verified before granting access to system and information resources.
This includes verification of digital signatures protecting identity assertions and access tokens, as well as included metadata. Metadata includes information about the access request such as information unique to user, system or information resource being accessed, or the transaction itself such as time. Protected system and information resources could include connected networks, applications, and APIs.
the source of identity assertions is verified before granting access to system and information resources; the source of access tokens is verified before granting access to system and information resources; the integrity of identity assertions is verified before granting access to system and information resources; the integrity of access tokens is verified before granting access to system and information resources
No cross-framework mappings available