Detailed security requirements for inclusion in an RFP. These requirements should focus specifically on security of the login process (authentication) of users into a networked application.
Identify the method (via testing, inspection, analysis) that will be used to verify that the application complies with the requirement.