You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hey everyone, I was trying to get an answer regarding the implementation of Identity and if it happens to comply with NIST 800-63B-4 guidelines around Digital Identity Authentication and Authenticator Management. I know that things are stored in SQL but didnt know if things are stored in separate tables, what algorithm is used by default, is that modifiable, where are keys stored, etc.
Just looking for some guidance on how Identity is setup from a security perspective.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Hey everyone, I was trying to get an answer regarding the implementation of Identity and if it happens to comply with NIST 800-63B-4 guidelines around Digital Identity Authentication and Authenticator Management. I know that things are stored in SQL but didnt know if things are stored in separate tables, what algorithm is used by default, is that modifiable, where are keys stored, etc.
Just looking for some guidance on how Identity is setup from a security perspective.
Beta Was this translation helpful? Give feedback.
All reactions