Qatar's e-Authentication Framework

Wednesday, June 12, 2013
Cyber Security

Authentication is one of the most fundamental security control employed in any information systems solution. Organizations should understand that technology is just one component of this complete solution and that due consideration should be accorded to the processes built around it.

This document provides recommendation on how organizations should design and implement their e-Authentication solutions. It lists down the steps that should be considered in this process. These include assessment of business requirements, the assurance level required, the technology and system, registration requirements. It further recommends using a risk based approach.

The document should apply to any organization designing and implementing an enterprise wide e-Authentication solution. The document does not cover physical access control systems.