Authentication - Use of Exclusively Non-Restricted Authenticator Types, v1.0

Authentication schemes may include the use of no restricted authenticators

Assessment Step

1
No Restricted Authenticators (NoRestrictedAuthenticators)
Does the authentication scheme disallow all restricted authenticators?
Artifact
A1
Provide evidence (e.g. policies, operational details) that no restricted authenticators are allowed.

Conformance Criteria (1)

C1
Authentication schemes may not allow the use of any restricted authenticators
Citation
NIST SP 800-63B
Section 5.2.10