ANSI X9.117 : 2012
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION
23-01-2013
15-06-2024
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Authentication Framework
6 Requirements
7 Authentication Examples
Annex A (normative) - Authentication Control Objectives
Annex B (normative) - Password Considerations
Bibliography
Describes a taxonomy, requirements, operating principles, controls objectives, techniques, and technical approaches to enable financial institutions (FI) to support secure remote access.
| Committee |
X9
|
| DevelopmentNote |
Supersedes ANSI X9.49. (12/2012)
|
| DocumentType |
Standard
|
| PublisherName |
American Bankers Association
|
| Status |
Superseded
|
| SupersededBy | |
| Supersedes |
| ISO 15782-1:2009 | Certificate management for financial services — Part 1: Public key certificates |
| ANSI X9.57 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY: CERTIFICATE MANAGEMENT |
| ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
| ISO/IEC 9798-3:1998 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques |
| ANSI X9.8-1 : 2015 | FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD-BASED SYSTEMS |
| ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
| ISO/IEC 9798-4:1999 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function |
| ANSI X9.84 : 2010(R2017) | BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY |
| ISO/IEC 9798-2:2008 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms |
| ISO 15782-2:2001 | Banking — Certificate management — Part 2: Certificate extensions |
| ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
| ISO/IEC 9798-6:2010 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer |
| ANSI X9.79-1 : 2001 | FINANCIAL SERVICES PUBLIC KEY INFRASTRUCTURE - PART 1: PKI PRACTICES AND POLICY FRAMEWORK |
| ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
| ISO 21188:2006 | Public key infrastructure for financial services — Practices and policy framework |
| ISO/IEC 9798-1:2010 | Information technology — Security techniques — Entity authentication — Part 1: General |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.