Description

Identification, Authentication, and Authorization are controls to facilitate access and to protect university information resources and data.

Applicability

  • This Control applies to all Texas A&M information resources. The intended audience for this Control includes all owners, managers, system administrators, and university users of information resources.

Implementation

  • 1

    Texas A&M University will assign a unique identifier for identification and develop authentication for each individual who has a business, research, or educational need to access university information resources.

  • 2

    Precise implementation for information resource access, identification, and authentication are highlighted in Controls: AC-2 Access Management; IA-2 Identification and Authentication (Organizational Users); and IA-4 Identifier Management.