This document discusses user authentication and cryptographic key infrastructure. It describes various techniques for entity authentication including something you have (e.g. smart cards), something you are (e.g. biometrics), and something you know (e.g. passwords, one-time passwords, challenge-response authentication). It also discusses cryptographic key infrastructure and the use of certificates signed by certificate authorities to bind identities to public keys.