IAM ConceptsSPIFFE Verifiable Identity Document
The SPIFFE Verifiable Identity Document (SVID) is a specification for securely issuing and validating cryptographic identities...
Read more

IAM ConceptsOAuth 2.0
OAuth 2.0 is an open standard for access delegation that allows applications to obtain limited access to user resources...
Read more

IAM ConceptsPAM
Privileged Access Management (PAM) is a set of tools and strategies designed to manage, monitor, and secure privileged accounts and access.
Read more

IAM ConceptsCIEM
Cloud Infrastructure Entitlement Management (CIEM) refers to tools and practices for managing and governing cloud-based identities...
Read more

IAM ConceptsAccess Management
Access Management is the process of authenticating and authorizing users and machines to access systems, applications, and APIs.
Read more

IAM ConceptsIdentity Fabric
Identity Fabric is a framework of interconnected tools, technologies, and processes designed to collectively manage both human and NHIs...
Read more

IAM ConceptsWorkload IAM (Identity and Access Management)
Workload Identity and Access Management (IAM) refers to the application of IAM principles specifically to non-human identities...
Read more

IAM ConceptsWorkload IGA (Identity Governance and Administration)
Workload Identity Governance and Administration encompasses the processes, technologies, and policies designed to manage and secure NHIs...
Read more

IAM ConceptsAttestation
Access attestation, also known as access recertification or entitle review, enables you to review and validate the access privileges...
Read more

IAM ConceptsSecret Sprawl
Secret sprawl refers to the uncontrolled proliferation or accumulation of secrets, credentials, or sensitive information across an...
Read more

IAM ConceptsIAM
Identity and Access Management (IAM) is a framework or system used to manage digital identities, authentication, and access controls...
Read more

IAM ConceptsConditional Access
Conditional access is a security feature that controls access to resources based on specific conditions or criteria, such as...
Read more

IAM ConceptsMFA
Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more forms of...
Read more

IAM ConceptsSSO
Single Sign-On (SSO) is an authentication mechanism that allows users to access multiple applications or services with...
Read more

IAM ConceptsRBAC Role-Based Access Control
Role-Based Access Control (RBAC) is a method of managing access to resources in a system based on the roles assigned to individual users...
Read more

IAM ConceptsIDP
IDP stands for Identity Provider, a service or system responsible for authenticating and verifying the identities of users or entities...
Read more

IAM ConceptsOffboarded Employee
An offboarded employee is a former employee or staff member who has left the organization or terminated their employment. Offboarding...
Read more

IAM ConceptsVault
A vault is a secure repository used to store sensitive information, such as passwords, cryptographic keys, certificates...
Read more
