Free Demo Contact

Glossary

0-9

  • 2FA

    Two-factor authentication (2FA) is a form of multifactor authentication (MFA) that strengthens access security by requiring two methods, also called authentication factors, to verify your identity.

A

  • Application Programming Interface

    An API (Application Programming Interface) is a software interface that enables two applications to communicate with each other. APIs are used to exchange information between applications in a standardized way.

  • API

    An API (Application Programming Interface) is a software interface that enables two applications to communicate with each other. APIs are used to exchange information between applications in a standardized way.

  • Authentication

    Authentication is the act or process of verifying whether a user, application, or device is actually who or what it claims to be.

  • AuthN

    Authentication is the act or process of verifying whether a user, application, or device is actually who or what it claims to be.

  • Authorization

    The authorization process determines what a person or system is allowed to do within a file, application, or system.

  • AuthZ

    The authorization process determines what a person or system is allowed to do within a file, application, or system.

D

  • Digital Identity

    A digital identity is the type of identity that enables a person to identify themselves within an IT system or application. It is like an online passport that grants you access to the digital world.

E

  • Entitlement

    An entitlement, often also called a right, permission, authorization, or approval, grants a user permission or privileges to use a specific application, service, device, or digital content.

G

  • General Data Protection Regulation

    The General Data Protection Regulation (GDPR) imposes additional responsibilities and obligations on organizations when processing personal data.

  • GDPR

    The General Data Protection Regulation (GDPR) imposes additional responsibilities and obligations on organizations when processing personal data.

I

  • Identification

    Identification is the act and step of presenting a digital identity to a system, service provider, or organization so they know who they are dealing with.

  • Identity & Access Management

    Identity & Access Management (IAM) encompasses all processes within organizations related to managing users, authorizations, and access.

  • IAM

    Identity & Access Management (IAM) encompasses all processes within organizations related to managing users, authorizations, and access.

  • Identity Lifecycle

    The identity lifecycle encompasses all steps involved in managing a user's digital identity, including creation, activation, transition, deactivation, and deletion.

M

  • Multifactor Authentication

    Multifactor authentication (MFA) is a method to verify a user's identity (authentication) using three or more factors.

  • MFA

    Multifactor authentication (MFA) is a method to verify a user's identity (authentication) using three or more factors.

O

  • Onboarding

    Onboarding includes everything new employees need to feel at home in a new organization and to do their work.

  • One-Time Password

    A One-Time Password (OTP) is a unique sequence of digits or letters that can be used only once for authentication.

  • OTP

    A One-Time Password (OTP) is a unique sequence of digits or letters that can be used only once for authentication.

P

  • Provisioning

    Provisioning is an essential process in IT management that focuses on efficiently managing user accounts and systems within organizations.

R

  • Role-Based Access Control

    Role-Based Access Control (RBAC) is a method for structuring authorization management within your organization. Instead of assigning authorizations on an individual basis, assign them by role. Roles are composed of attributes such as department, job function, location, and cost center of an employee within an organization.

  • RBAC

    Role-Based Access Control (RBAC) is a method for structuring authorization management within your organization. Instead of assigning authorizations on an individual basis, assign them by role. Roles are composed of attributes such as department, job function, location, and cost center of an employee within an organization.

S

  • Security Assertion Markup Language

    SAML stands for Security Assertion Markup Language and is one of the most commonly used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users authenticate once and do not need to log in again.

  • SAML

    SAML stands for Security Assertion Markup Language and is one of the most commonly used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users authenticate once and do not need to log in again.

  • Single Sign-On

    Single Sign-On, or SSO, is an authentication method that allows users to sign in once to access multiple applications or systems.

  • SSO

    Single Sign-On, or SSO, is an authentication method that allows users to sign in once to access multiple applications or systems.

  • Single Source of Truth

    A Single Source of Truth (SSOT), also called a system of record, is a centralized, reliable data source where data and documents are recorded once, ensuring consistency, accuracy, and up-to-date status for reuse in business processes via specific systems.

  • SSOT

    A Single Source of Truth (SSOT), also called a system of record, is a centralized, reliable data source where data and documents are recorded once, ensuring consistency, accuracy, and up-to-date status for reuse in business processes via specific systems.

  • Single-Factor Authentication

    Single-factor authentication is the simplest form of authentication and uses one authentication factor to verify a digital identity.

  • SFA

    Single-factor authentication is the simplest form of authentication and uses one authentication factor to verify a digital identity.

  • Strong Authentication

    Strong authentication is a method that uses multiple factors to verify the identity of a digital user or device.

T

  • Two-Factor Authentication

    Two-factor authentication (2FA) is a form of multifactor authentication (MFA) that strengthens access security by requiring two methods, also called authentication factors, to verify your identity.