Ver:
Control de
acceso basado en la identidad del usuario. Típicamente se emplea alguna
característica del proceso que requiere el acceso actuando en nombre del
usuario final. Los derechos de acceso se conceden en base a la identidad
declarada. [NIST-SP800-53:2013]
Access control based on the
identity of the user (typically relayed as a characteristic of the process
acting on behalf of that user) where access authorizations to specific objects
are assigned based on user identity. [NIST-SP800-53:2013]
Access control based on the
identity of the user (typically relayed as a characteristic of the process
acting on behalf of that user) where access authorizations to specific objects
are assigned based on user identity. [CNSSI_4009:2010]