IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication