Join Now
Interested companies are encouraged to review the Benefits of Membership and apply today!
Join NowGlossary
Unfamiliar with a term used in this section? Check the TCG Glossary of TechnicalTerms for the definition.
View Glossary
Learn More
Trusted Network Connect
The Trusted Network Connect (TNC) Work Group has defined and released an open architecture and a growing set of standards for endpoint integrity. The TNC architecture enables network operators to enforce policies regarding endpoint integrity at or after network connection. The standards ensure multi-vendor interoperability across a wide variety of endpoints, network technologies, and policies.
TNC SWID Messages and Attributes for IF-M Specification
The Trusted Network Connect (TNC) Work Group defines an open solution architecture that enables network operators to enforce policies regarding endpoint integrity when granting access to a network infrastructure. Software Identification tags (SWID tags) [3] are XML documents that identify a specific software product.
TNC Endpoint Compliance Profile Specification
The Trusted Network Connect Work Group (TNC-WG) has defined an open architecture for network security, including standard protocols for endpoint assessment and remediation. The Endpoint Compliance Profile (ECP) builds on the TNC protocols and interfaces to determine the compliance status of any type of endpoint on a network.
The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure. This security assessment of each endpoint is performed using a set of asserted integrity measurements covering aspects of the operational environment of the endpoint.
TNC IF-MAP Metadata for ICS Security
The purpose of this specification is to facilitate the deployment, management, and protection of large-scale industrial control systems by creating virtual layer 2 and/or layer-3 overlay networks on top of standard shared IP network infrastructure—particularly (though not necessarily) TNC compliant IP network infrastructure.
This Trusted Network Connect Working Group (TNC) specification provides a standard model for controlling what operations MAP Clients can execute upon the content of a MAP Server.
TNC IF-M: TLV Binding Specification
The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure.
TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification
Trusted Network Connect (TNC) is a working group within the Trusted Computing Group (TCG). TNC is defining an open solution architecture that enables network operators to enforce policies regarding endpoint integrity when granting access to a network infrastructure. Part of the TNC architecture is IF-T, a standard for mapping the communications between TNC Clients and TNC Servers onto existing protocols. This document defines and specifies IF-T.
The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure.
This page includes all registries published by TCG.
TNC IF-MAP Binding for SOAP Specification
The Trusted Network Connect Working Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure. Part of the TNC architecture is IF MAP, a standard interface between the Metadata Access Point and other elements of the TNC architecture. This document defines and specifies IF MAP.
