Appendices
To help users navigate the IAM solution and understand key concepts, below is a list of common terms and acronyms frequently referenced throughout the manual
Access Control List (ACL): A list of permissions attached to a resource that specifies which users or system processes can access it, and what operations they can perform.
Active Directory (AD): A directory service developed by Microsoft for Windows domain networks. It is used to manage permissions and access to network resources.
API (Application Programming Interface): A set of rules and tools that allows different software applications to communicate with each other.
Audit Logs: Records of events or transactions that help track user and system activities, often used for compliance and troubleshooting.
Authentication: The process of verifying the identity of a user or system attempting to access a resource.
Authorization: The process of determining what an authenticated user is permitted to do, typically based on their role or permissions.
Deprovisioning: The process of removing or disabling access to resources when a user or system no longer requires them.
Encryption: The process of converting information into a secure format that can only be accessed by authorized individuals or systems with the correct decryption key.
Federation: A system that allows for the sharing of identity information across multiple trusted organizations or domains, enabling SSO between them.
GDPR (General Data Protection Regulation): A legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU).
HIPAA (Health Insurance Portability and Accountability Act): A U.S. law that mandates data privacy and security provisions for safeguarding medical information.
Identity Access Management (IAM): A framework of policies and technologies that ensure the right individuals have the appropriate access to resources at the right times for the right reasons.
ISO 27001: An international standard for information security management systems (ISMS), ensuring that organizations follow best practices to protect information assets.
LDAP (Lightweight Directory Access Protocol): A protocol used to access and manage directory services over a network, commonly used for authentication and directory lookups.
Multi-Factor Authentication (MFA): A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
OAuth (Open Authorization): An open standard for access delegation, commonly used to grant websites or applications limited access to a user’s information without exposing passwords.
OpenID Connect (OIDC): An authentication layer built on top of OAuth 2.0, which allows the identity of a user to be verified based on authentication performed by an authorization server.
Provisioning: The process of setting up or assigning resources, such as applications or user accounts, to a user or system.
RBAC (Role-Based Access Control): A method of regulating access to systems and applications based on the roles assigned to individual users within an organization.
SAML (Security Assertion Markup Language): An open standard for exchanging authentication and authorization data between parties, specifically between an identity provider and a service provider.
SSO (Single Sign-On): An authentication scheme that allows users to log in once and gain access to multiple systems without re-entering credentials for each system.
SOC 2 (Service Organization Control 2): An auditing procedure that ensures a company securely manages data to protect the privacy and interests of its clients.
Updated 12 months ago
