FIPS Standard
Role
Type of
Authentication
Authentication
Data
…
…
…
…
…
…
…
…
Table C1. Roles and Required Identification and Authentication
Authentication
Mechanism
Strength of
Mechanism
…
…
…
…
Table C2. Strengths of Authentication Mechanisms
Role
Authorized
Services
…
…
…
…
…
…
Table C3. Services Authorized for Roles
Service
Cryptographic Keys
and CSPs
Type(s) of Access
(e.g., RWE)
… …
…
…
…
… …
…
…
…
Table C4. Access Rights within Services
49