Prohibit the use of cached authenticators after [Assignment: organization-defined time period].
Prohibit the use of cached authenticators after [Assignment: organization-defined time period].
For PKI-based authentication, employ an organization-wide methodology for managing the content of PKI trust stores installed across all platforms, including networks, operating systems, browsers, and applications.
Use only General Services Administration-approved products and services for identity, credential, and access management.
Require that the issuance of [Assignment: organization-defined types of and/or specific authenticators] be conducted [Selection: in person; by a trusted external party] before [Assignment: organization-defined registration authority] with authorization by [Assignment: organization-defined personnel or roles].
Employ presentation attack detection mechanisms for biometric-based authentication.
(a) Employ [Assignment: organization-defined password managers] to generate and manage passwords; and (b) Protect the passwords using [Assignment: organization-defined controls].
Obscure feedback of authentication information during the authentication process to protect the information from possible exploitation and use by unauthorized individuals.
Implement mechanisms for authentication to a cryptographic module that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication.
Uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.
Accept and electronically verify Personal Identity Verification-compliant credentials from other federal agencies.