< Back to Glossary

IAM Concepts

IAM Concepts : IAM stands for Identity and Access Management. This category explores fundamental concepts, principles, and practices related to controlling access to resources within an organization, including authentication, least privilege, and identity lifecycle management.

Diagram representing IAM concepts on Oasis Security’s Glossary page, illustrating key identity and access management terms
IAM Concepts

SPIFFE Verifiable Identity Document

The SPIFFE Verifiable Identity Document (SVID) is a specification for securely issuing and validating cryptographic identities...

letter=

S
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

OAuth 2.0

OAuth 2.0 is an open standard for access delegation that allows applications to obtain limited access to user resources...

letter=

O
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

PAM

Privileged Access Management (PAM) is a set of tools and strategies designed to manage, monitor, and secure privileged accounts and access.

letter=

P
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

CIEM

Cloud Infrastructure Entitlement Management (CIEM) refers to tools and practices for managing and governing cloud-based identities...

letter=

C
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

IGA

Identity Governance and Administration (IGA)

letter=

I
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Access Management

Access Management is the process of authenticating and authorizing users and machines to access systems, applications, and APIs.

letter=

A
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Identity Fabric

Identity Fabric is a framework of interconnected tools, technologies, and processes designed to collectively manage both human and NHIs...

letter=

I
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Workload IAM (Identity and Access Management)

Workload Identity and Access Management (IAM) refers to the application of IAM principles specifically to non-human identities...

letter=

W
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Workload IGA (Identity Governance and Administration)

Workload Identity Governance and Administration encompasses the processes, technologies, and policies designed to manage and secure NHIs...

letter=

W
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Attestation

Access attestation, also known as access recertification or entitle review, enables you to review and validate the access privileges...

letter=

A
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Secret Sprawl

Secret sprawl refers to the uncontrolled proliferation or accumulation of secrets, credentials, or sensitive information across an...

letter=

S
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

IAM

Identity and Access Management (IAM) is a framework or system used to manage digital identities, authentication, and access controls...

letter=

I
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Conditional Access

Conditional access is a security feature that controls access to resources based on specific conditions or criteria, such as...

letter=

C
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

MFA

Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more forms of...

letter=

M
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

SSO

Single Sign-On (SSO) is an authentication mechanism that allows users to access multiple applications or services with...

letter=

S
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

RBAC Role-Based Access Control

Role-Based Access Control (RBAC) is a method of managing access to resources in a system based on the roles assigned to individual users...

letter=

R
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

IDP

IDP stands for Identity Provider, a service or system responsible for authenticating and verifying the identities of users or entities...

letter=

I
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Offboarded Employee

An offboarded employee is a former employee or staff member who has left the organization or terminated their employment. Offboarding...

letter=

O
Read more
Icon for reading resources on non human identity security by Oasis Security
IAM Concepts

Vault

A vault is a secure repository used to store sensitive information, such as passwords, cryptographic keys, certificates...

letter=

V
Read more
Icon for reading resources on non human identity security by Oasis Security