logo

Database

Summary

All of the systems authentication pathways and identity management APIs must be equally secure.

Description

Some systems offer more than one option to authenticate their users or verify their identity. All of these options must have the same security control strength, so that there is no weaker alternative.

References