Identity typesAWS Document DB User
An AWS Document DB user is an identity granted access to resources and services within an Amazon Web Services (AWS) DocumentDB...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesAWS RDS User
An AWS RDS user is an identity granted access to resources and services within an Amazon Web Services (AWS) Relational Database Service...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesApplication
An application is a software program or set of software components designed to perform specific tasks or functions to meet...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesBreak Glass Account
A break glass account is a special user account or emergency access mechanism used to gain privileged access to critical systems...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsConditional Access
Conditional access is a security feature that controls access to resources based on specific conditions or criteria, such as...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesExternal Account
An external account refers to a user account or identity managed by an external identity provider (IdP) or authentication...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
VendorGCP Secret Vault
The Google Cloud Secrets Engine automates the generation of service account keys and OAuth tokens, aligning with...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
VendorHashiCorp Vault
HashiCorp Vault is a popular open-source tool for managing secrets, encryption keys, and...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesHuman Identity
Human identity refers to the unique characteristics, attributes, or identifiers associated with individual users or persons within...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsIAM
Identity and Access Management (IAM) is a framework or system used to manage digital identities, authentication, and access controls...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesIAM User
An IAM (Identity and Access Management) user is an individual or entity granted access to resources and services within an IAM system or...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsIDP
IDP stands for Identity Provider, a service or system responsible for authenticating and verifying the identities of users or entities...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesKMS Key
A Key Management Service (KMS) key is a cryptographic key used for encryption, decryption, and access management of data, usually for...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsMFA
Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more forms of...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesMSA Key
MSA is the consumer side of Microsoft that powers authentication for all consumer based platforms...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesNHI
NHI stands for National Health Index, a unique identifier used in healthcare systems to identify individuals and...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsOffboarded Employee
An offboarded employee is a former employee or staff member who has left the organization or terminated their employment. Offboarding...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
VendorOkta Application
Okta is a platform for identity and access management that offers secure identity verification, single sign-on (SSO), and...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
RegulationPCI 4.0
PCI 4.0 refers to the Payment Card Industry Data Security Standard (PCI DSS) version 4.0, a set of...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
VendorParameter Store
AWS Systems Manager Parameter Store offers a secure way to store and manage configuration data and...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsRBAC Role Based Access
Role-Based Access Control (RBAC) is a method of managing access to resources in a system based on the roles assigned to individual users...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesRole
A role defines a set of permissions and access rights granted to users, groups, or service principals within a system or...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesSAS Token
A Shared Access Signature (SAS) token is a security token that provides limited access rights to specific...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsSSO
Single Sign-On (SSO) is an authentication mechanism that allows users to access multiple applications or services with...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesSecret Manager Secret
A secret manager secret is a confidential piece of information, such as a password, API token, or database connection string, stored...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsSecret Sprawl
Secret sprawl refers to the uncontrolled proliferation or accumulation of secrets, credentials, or sensitive information across an...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesSecure Parameter
A secure parameter is a configurable value or setting used in an application, service, or system that has been designed and implemented...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesService Account
A service account is a type of account used by services, applications, or automated processes to access resources or perform specific...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesService Principal
A service principal is an identity used by a service or application to authenticate and access resources in a secure and controlled...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
IAM ConceptsVault
A vault is a secure repository used to store sensitive information, such as passwords, cryptographic keys, certificates...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesVault Certificate
A vault certificate is a digital certificate stored securely within a vault or cryptographic system. Vault certificates are used for...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)
Identity typesVault Key
A vault key is a cryptographic key stored securely within a vault for encryption, decryption, or authentication purposes. Vault keys are...
Read more
![Read more](https://cdn.prod.website-files.com/652ba09e4e7b1ba97dd01e7b/65708b7502c1aa3c4540abd2_Read%20more.svg)