Credential management
Password repository application
End-user password storage
On premises vs. cloud repository
Hardware key manager
Privileged access management
Password policies
Complexity
Length
Character classes
History
Maximum/minimum age
Auditing
Reversable encryption
Federation
Transitive trust
OpenID
Security Assertion Markup Language (SAML)
Shibboleth
Access control
Mandatory access control (MAC)
Discretionary access control (DAC)
Role-based access control
Rule-based access control
Attribute-based access control
Protocols
Remote Authentication Dial-in User Server (RADIUS)
erminal Access Controller Access Control System (TACACS)
Diameter
Lightweight Directory Access Protocol (LDAP)
Kerberos
OAuth
802.1X
Extensible Authentication Protocol (EAP)
Multifactor authentication (MFA)
Two-factor authentication (2FA)
2-Step Verification
In-band
Out-of-band
One-time password (OTP)
HMAC-based one-time password (HOTP)
Time-based one-time password (TOTP)
Hardware root of trust
Single sign-on (SSO)
JavaScript Object Notation (JSON) web token (JWT)
Attestation and identity proofing