IAM ConceptsSPIFFE Verifiable Identity Document
The SPIFFE Verifiable Identity Document (SVID) is a specification for securely issuing and validating cryptographic identities...
Read more
IAM ConceptsOAuth 2.0
OAuth 2.0 is an open standard for access delegation that allows applications to obtain limited access to user resources...
Read more
IAM ConceptsPAM
Privileged Access Management (PAM) is a set of tools and strategies designed to manage, monitor, and secure privileged accounts and access.
Read more
IAM ConceptsCIEM
Cloud Infrastructure Entitlement Management (CIEM) refers to tools and practices for managing and governing cloud-based identities...
Read more
IAM ConceptsAccess Management
Access Management is the process of authenticating and authorizing users and machines to access systems, applications, and APIs.
Read more
IAM ConceptsIdentity Fabric
Identity Fabric is a framework of interconnected tools, technologies, and processes designed to collectively manage both human and NHIs...
Read more
IAM ConceptsWorkload IAM (Identity and Access Management)
Workload Identity and Access Management (IAM) refers to the application of IAM principles specifically to non-human identities...
Read more
IAM ConceptsWorkload IGA (Identity Governance and Administration)
Workload Identity Governance and Administration encompasses the processes, technologies, and policies designed to manage and secure NHIs...
Read more
IAM ConceptsAttestation
Access attestation, also known as access recertification or entitle review, enables you to review and validate the access privileges...
Read more
IAM ConceptsSecret Sprawl
Secret sprawl refers to the uncontrolled proliferation or accumulation of secrets, credentials, or sensitive information across an...
Read more
IAM ConceptsIAM
Identity and Access Management (IAM) is a framework or system used to manage digital identities, authentication, and access controls...
Read more
IAM ConceptsConditional Access
Conditional access is a security feature that controls access to resources based on specific conditions or criteria, such as...
Read more
IAM ConceptsMFA
Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more forms of...
Read more
IAM ConceptsSSO
Single Sign-On (SSO) is an authentication mechanism that allows users to access multiple applications or services with...
Read more
IAM ConceptsRBAC Role-Based Access Control
Role-Based Access Control (RBAC) is a method of managing access to resources in a system based on the roles assigned to individual users...
Read more
IAM ConceptsIDP
IDP stands for Identity Provider, a service or system responsible for authenticating and verifying the identities of users or entities...
Read more
IAM ConceptsOffboarded Employee
An offboarded employee is a former employee or staff member who has left the organization or terminated their employment. Offboarding...
Read more
IAM ConceptsVault
A vault is a secure repository used to store sensitive information, such as passwords, cryptographic keys, certificates...
Read more