IAM Concepts
IAM Concepts : IAM stands for Identity and Access Management. This category explores fundamental concepts, principles, and practices related to controlling access to resources within an organization, including authentication, least privilege, and identity lifecycle management.

IAM Concepts
Access Management
Access Management is the process of authenticating and authorizing users and machines to access systems, applications, and APIs.
AWS
Azure
GCP
OKTA
letter=
A
IAM Concepts
Attestation
Access attestation, also known as access recertification or entitle review, enables you to review and validate the access privileges...
AWS
Azure
GCP
OKTA
letter=
A
IAM Concepts
CIEM
Cloud Infrastructure Entitlement Management (CIEM) refers to tools and practices for managing and governing cloud-based identities...
AWS
Azure
GCP
OKTA
letter=
C
IAM Concepts
Conditional Access
Conditional access is a security feature that controls access to resources based on specific conditions or criteria, such as...
letter=
C
IAM Concepts
IAM
Identity and Access Management (IAM) is a framework or system used to manage digital identities, authentication, and access controls...
letter=
I
IAM Concepts
IDP
IDP stands for Identity Provider, a service or system responsible for authenticating and verifying the identities of users or entities...
letter=
I
IAM Concepts
Identity Fabric
Identity Fabric is a framework of interconnected tools, technologies, and processes designed to collectively manage both human and NHIs...
Azure
AWS
GCP
OKTA
letter=
I
IAM Concepts
Identity Threat Detection and Response (ITDR)
Identity Threat Detection and Response (ITDR) is an emerging cybersecurity discipline focused on detecting, analyzing, and responding to...
AWS
GCP
Azure
OKTA
letter=
I
IAM Concepts
Just-in-time
Just-in-Time (JIT) access is a dynamic access control model that grants identities
letter=
J
IAM Concepts
MFA
Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more forms of...
letter=
M
IAM Concepts
Machine Credentials
Machine credentials are cryptographic artifacts used to authenticate and authorize non-human identities (NHIs)...
letter=
M
IAM Concepts
OAuth 2.0
OAuth 2.0 is an open standard for access delegation that allows applications to obtain limited access to user resources...
AWS
Azure
GCP
OKTA
letter=
O
IAM Concepts
Offboarded Employee
An offboarded employee is a former employee or staff member who has left the organization or terminated their employment. Offboarding...
AWS
Azure
GCP
OKTA
letter=
O
IAM Concepts
PAM
Privileged Access Management (PAM) is a set of tools and strategies designed to manage, monitor, and secure privileged accounts and access.
AWS
Azure
GCP
OKTA
letter=
P
IAM Concepts
Principle of Least Privilege
The Principle of Least Privilege (PoLP) is a foundational cybersecurity concept that dictates all identities...
letter=
L
IAM Concepts
RBAC Role-Based Access Control
Role-Based Access Control (RBAC) is a method of managing access to resources in a system based on the roles assigned to individual users...
letter=
R
IAM Concepts
SPIFFE Verifiable Identity Document
The SPIFFE Verifiable Identity Document (SVID) is a specification for securely issuing and validating cryptographic identities...
AWS
Azure
GCP
OKTA
letter=
S
IAM Concepts
SSO
Single Sign-On (SSO) is an authentication mechanism that allows users to access multiple applications or services with...
letter=
S
IAM Concepts
Secret Sprawl
Secret sprawl refers to the uncontrolled proliferation or accumulation of secrets, credentials, or sensitive information across an...
letter=
S
IAM Concepts
Vault
A vault is a secure repository used to store sensitive information, such as passwords, cryptographic keys, certificates...
letter=
V
See Oasis in action. Book a demo
Connect with one of our experts to explore how the Oasis platform can work for you