IA-13(02) Verification of Identity Assertions and Access Tokens
The source and integrity of identity assertions and access tokens are verified before granting access to system and information resources.
Baselines
- L
- M
- H
- P
Guidance
This includes verification of digital signatures protecting identity assertions and access tokens, as well as included metadata. Metadata includes information about the access request such as information unique to user, system or information resource being accessed, or the transaction itself such as time. Protected system and information resources could include connected networks, applications, and APIs.