https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-6
This example policy describes how information resources shall obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
Texas A&M Policy: Identification and Authentication (Non-Organizational Users) (IA-8)
3.5 3.5.1 Identification and Authentication
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-8
This example policy describes the configuration of resources to uniquely identify and authenticate users not affiliated with the university who are permitted to utilize university information resources.
Texas A&M Policy: Identification and Authentication (Organizational Users) (IA-2)
3.5 3.5.1 Identification and Authentication
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-2
This example policy describes the capability for information resources to uniquely identify and authenticate university faculty, staff, students, and other approved users.
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-4/
This example policy describes how user or device identifiers are managed by receiving appropriate authorization to initially assign a user, selecting a unique identifier, preventing the reuse of identifiers, and disabling the user identifier after a period of inactivity or change in job status.
https://cpl.thalesgroup.com/
Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices.
http://www.cs.tufts.edu/comp/116/archive/fall2015/agoldschmidt.pdf
This document provides a study of a unique class of attack and several methods attempting to prevent attacks of a kind.
https://vaulted.io/library/disa-stigs-srgs/network_device_management_security_requirements_guide/V-55149?version=V2R14&compareto=V2R10
This link provides an example of a network device that must obscure feedback of authentication information. It provides a description of how to check practice and provides a fix.
https://www.youtube.com/watch?v=pZIlaWhfhpQ
This YouTube video discusses identification and authentication issues in the context of computer security.
https://www.youtube.com/watch?v=Gi-niOoVAm4
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.