JIS X 8341-3:2016 (ISO/IEC 40500:2012) | Control No. | Success level | ||
---|---|---|---|---|
Success criteria | Conformance level | |||
2.2.5 | Re-authenticating | AAA | tky2219 | - |
Item No. | Success Techniques | Application | Conformance | Inspection method (*1) |
Implementation No. | Inspector | Program detection/inspection result | |||
---|---|---|---|---|---|---|---|---|---|---|
Number of items detected | Not inspected | Conformance | Non-Conformance | |||||||
1 | Saving data so that it can be used after a user re-authenticates | - | - | HC | I201038 (G105) (G181) |
S190498 | 0 | 0 | 0 | 0 |
Encoding user data as hidden or encrypted data in a re-authorization page |
*1 AC:Automated Check、AF:Automated Find、HC:Human Check
Types of symbols:
For application ○: Applicable, -: Not applicable
For conformance ◎: Conformance (success level 100%), ○: Success level 50% or more, △: Success level less than 50%, ×: Non-conformance (success level 0%), -: Not applicable