Join Now

Interested companies are encouraged to review the Benefits of Membership and apply today!

Join Now

Glossary

Unfamiliar with a term used in this section? Check the TCG Glossary of TechnicalTerms for the definition.  


View Glossary

Learn More

Trusted Network Connect

Trusted Network Connect

The Trusted Network Connect (TNC) Work Group has defined and released an open architecture and a growing set of standards for endpoint integrity. The TNC architecture enables network operators to enforce policies regarding endpoint integrity at or after network connection. The standards ensure multi-vendor interoperability across a wide variety of endpoints, network technologies, and policies.

icon

Registry

This page includes all registries published by TCG.

April 2014 | Specifications | Add to Briefcase

icon

TNC IF-MAP Binding for SOAP Specification

The Trusted Network Connect Working Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure. Part of the TNC architecture is IF MAP, a standard interface between the Metadata Access Point and other elements of the TNC architecture. This document defines and specifies IF MAP.

March 2014 | Specifications | Add to Briefcase

icon

TNC Endpoint Compliance Profile Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open architecture for network security, including standard protocols for endpoint assessment and remediation. The Endpoint Compliance Profile (ECP) builds on the TNC protocols and interfaces to determine the compliance status of any type of endpoint on a network.

August 2013 | Specifications | Add to Briefcase

icon

TNC IF-IMV Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure. This security assessment of each endpoint is performed using a set of asserted integrity measurements covering aspects of the operational environment of the endpoint.

August 2013 | Specifications | Add to Briefcase

icon

TNC PDP Server Discovery and Validation Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints in order to determine whether to grant access to a requested network infrastructure. This document defines several standard techniques that an endpoint can use to find the Policy Decision Point (PDP) to which it is supposed to report its measurements and to validate the trustworthiness of this PDP.

August 2013 | Specifications | Add to Briefcase

icon

TNC SWID Messages and Attributes for IF-M Specification

The Trusted Network Connect (TNC) Work Group defines an open solution architecture that enables network operators to enforce policies regarding endpoint integrity when granting access to a network infrastructure. Software Identification tags (SWID tags) [3] are XML documents that identify a specific software product.

August 2013 | Specifications | Add to Briefcase

icon

TNC MAP Content Authorization

This Trusted Network Connect Working Group (TNC) specification provides a standard model for controlling what operations MAP Clients can execute upon the content of a MAP Server.

April 2013 | Specifications | Add to Briefcase

icon

Comments for TNC MAP Content Authorization

Public review comments received for TNC MAP Content Authorization Specification, Version 1.0, Revision 26

April 2013 | Specifications | Add to Briefcase

icon

TNC IF-IMC Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to enforce policies regarding the security state of endpoints inorder to determine whether to grant access to a requested network infrastructure. This security assessment of each endpoint is performed using a set of asserted integrity measurements covering aspects of the operational environment of the endpoint.

February 2013 | Specifications | Add to Briefcase

icon

TNC IF-T: Binding to TLS

Part of the TNC architecture is IF-T, a standard protocol used to Transport the TNC assessment exchanges leveraging the existing network connectivity. Because TNC enables assessment to occur during the process of joining a network and after the endpoint has been placed on the network, several bindings of IF-T will exist to address these different scenarios.

February 2013 | Specifications | Add to Briefcase