Page History
...
The e-Authentication policy is found in the Office of Management and Budget Memo 04-04, E-Authentication Guidance for Federal Agencies. Technology recommendations and guidance are discussed in the National Institute of Standards and Technology (NIST) SP 800-63, Electronic Authentication Guideline.
Step 1: Complete the
...
E-Auth Threshold Analysis
On Step 1 (Tab 2) of the workbook, fill in the System Name, ISSO Name, System Owner Name (Federal business owner), Date of Assessment, and Date of Approval in the provided blanks. If you know your system's FISMA UUID you can provide it; otherwise leave blank and this can be assigned later if needed.
The Minimum Assurance Level box will be automatically filled in based on Step 2
Answer the three screening questions posed, which are:
...
If you answer YES to all 3 of these questions, then you must proceed to Step 2 of the workbook and complete all required answers in Step 2. If you answered NO to any one of these 3 questions, then an eAuth rating is not required and you can skip to Step 3.
Step 2: Answer the
...
E-Auth RA questions
On Step 2 (Tab 3) provide a response to each question by selecting the appropriate impact levels for each of the 6 Impact areas using the built-in dropdown menus (e.g, choosing between N/A, Low, Moderate, or High)
- Once you have answered all 6 questions, proceed to Step 3 (Tab 4) of the Workbook to see your final eAuth rating and obtain owner approval.
...