Glossary
0-9
-
Two-factor authentication (2FA) is a form of multifactor authentication (MFA) that strengthens access security by requiring two methods, also called authentication factors, to verify your identity.
A
-
Application Programming Interface
An API (Application Programming Interface) is a software interface that enables two applications to communicate with each other. APIs are used to exchange information between applications in a standardized way.
-
An API (Application Programming Interface) is a software interface that enables two applications to communicate with each other. APIs are used to exchange information between applications in a standardized way.
-
Authentication is the act or process of verifying whether a user, application, or device is actually who or what it claims to be.
-
Authentication is the act or process of verifying whether a user, application, or device is actually who or what it claims to be.
-
The authorization process determines what a person or system is allowed to do within a file, application, or system.
-
The authorization process determines what a person or system is allowed to do within a file, application, or system.
D
-
A digital identity is the type of identity that enables a person to identify themselves within an IT system or application. It is like an online passport that grants you access to the digital world.
E
-
An entitlement, often also called a right, permission, authorization, or approval, grants a user permission or privileges to use a specific application, service, device, or digital content.
G
-
General Data Protection Regulation
The General Data Protection Regulation (GDPR) imposes additional responsibilities and obligations on organizations when processing personal data.
-
The General Data Protection Regulation (GDPR) imposes additional responsibilities and obligations on organizations when processing personal data.
I
-
Identification is the act and step of presenting a digital identity to a system, service provider, or organization so they know who they are dealing with.
-
Identity & Access Management (IAM) encompasses all processes within organizations related to managing users, authorizations, and access.
-
Identity & Access Management (IAM) encompasses all processes within organizations related to managing users, authorizations, and access.
-
The identity lifecycle encompasses all steps involved in managing a user's digital identity, including creation, activation, transition, deactivation, and deletion.
M
-
Multifactor authentication (MFA) is a method to verify a user's identity (authentication) using three or more factors.
-
Multifactor authentication (MFA) is a method to verify a user's identity (authentication) using three or more factors.
O
-
Onboarding includes everything new employees need to feel at home in a new organization and to do their work.
-
A One-Time Password (OTP) is a unique sequence of digits or letters that can be used only once for authentication.
-
A One-Time Password (OTP) is a unique sequence of digits or letters that can be used only once for authentication.
P
-
Provisioning is an essential process in IT management that focuses on efficiently managing user accounts and systems within organizations.
R
-
Role-Based Access Control (RBAC) is a method for structuring authorization management within your organization. Instead of assigning authorizations on an individual basis, assign them by role. Roles are composed of attributes such as department, job function, location, and cost center of an employee within an organization.
-
Role-Based Access Control (RBAC) is a method for structuring authorization management within your organization. Instead of assigning authorizations on an individual basis, assign them by role. Roles are composed of attributes such as department, job function, location, and cost center of an employee within an organization.
S
-
Security Assertion Markup Language
SAML stands for Security Assertion Markup Language and is one of the most commonly used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users authenticate once and do not need to log in again.
-
SAML stands for Security Assertion Markup Language and is one of the most commonly used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users authenticate once and do not need to log in again.
-
Single Sign-On, or SSO, is an authentication method that allows users to sign in once to access multiple applications or systems.
-
Single Sign-On, or SSO, is an authentication method that allows users to sign in once to access multiple applications or systems.
-
A Single Source of Truth (SSOT), also called a system of record, is a centralized, reliable data source where data and documents are recorded once, ensuring consistency, accuracy, and up-to-date status for reuse in business processes via specific systems.
-
A Single Source of Truth (SSOT), also called a system of record, is a centralized, reliable data source where data and documents are recorded once, ensuring consistency, accuracy, and up-to-date status for reuse in business processes via specific systems.
-
Single-factor authentication is the simplest form of authentication and uses one authentication factor to verify a digital identity.
-
Single-factor authentication is the simplest form of authentication and uses one authentication factor to verify a digital identity.
-
Strong authentication is a method that uses multiple factors to verify the identity of a digital user or device.
T
-
Two-factor authentication (2FA) is a form of multifactor authentication (MFA) that strengthens access security by requiring two methods, also called authentication factors, to verify your identity.