Glossary

AJAX progress indicator
  • a

  • What is access control? Access control refers to methods and technologies used to secure and manage digital access to applications, data, and other IT resources. Today, access control is crucial for maintaining the security of IT environments. With IT systems commonly accessible online,(...)
  • What is Active Directory? Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was solely responsible for centralised domain(...)
  • What is Active Directory? Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was solely responsible for centralised domain(...)
  • API stands for Application Programming Interface. An API is a standard connection between computer systems allowing them to exchange data and collaborate easily. Just as people need to speak the same language to understand each other, an API ensures that basic communication between computer(...)
  • API stands for Application Programming Interface. An API is a standard connection between computer systems allowing them to exchange data and collaborate easily. Just as people need to speak the same language to understand each other, an API ensures that basic communication between computer(...)
  • What is an audit? An audit is a systematic examination of processes, systems, and the data they process within an organisation. The purpose of such an audit is to verify compliance with predefined rules, laws, and standards. There are various types of audits, each typically focusing on a(...)
  • Where identity and access management starts with identification, authentication is the second step. Authentication, often referred to by the abbreviation ā€˜AuthNā€™, is one of the security processes within the IAM framework. But what exactly do we mean by authentication in this context? And what(...)
  • Where identity and access management starts with identification, authentication is the second step. Authentication, often referred to by the abbreviation ā€˜AuthNā€™, is one of the security processes within the IAM framework. But what exactly do we mean by authentication in this context? And what(...)
  • Authorisation, often referred to by the abbreviation ā€˜AuthZā€™, is the third and final step of the IAM process (Identity and Access Management). It is a process in which roles and rights play a central role, a crucial element in securely using applications, networks, devices and digital(...)
  • Authorisation, often referred to by the abbreviation ā€˜AuthZā€™, is the third and final step of the IAM process (Identity and Access Management). It is a process in which roles and rights play a central role, a crucial element in securely using applications, networks, devices and digital(...)
  • c

  • What is CIAM? CIAM stands for Customer Identity and Access Management, the functionality for managing customer user accounts and access rights. With CIAM, organisations can ensure that their customers have secure access to, for example, a customer portal and other applications and data(...)
  • What is compliance? Within organisations, the meaning of compliance relates to the extent to which you adhere to laws and guidelines applicable to that organisation. Compliance is often thought of primarily in terms of financial rules and obligations, but a company or government(...)
  • Identification and authentication are crucial components in confirming a digital identity, making them a key pillar within every Identity & Access Management (IAM) process. No IAM process can operate without one or multiple credentials or authentication factors, now a familiar part of our(...)
  • d

  • Identity and Access Management (IAM) heavily relies on digital identities. In this article, we delve deeper into what a digital identity is, and why they are vital for organisations. But before discussing digital identity, let's first address what identity means. You have an identity from the(...)
  • e

  • It's commonly accepted that you need permission to enter someone's house, or that not just any employee of a company can enter the server room. Entitlement translates this principle to the digital world and the system of identity and access management. What is an entitlement in Identity &(...)
  • i

  • Identity and Access Management (IAM) is indispensable in our digital society. Whether you're placing an online order, logging into a government service or trying to access your emails: in each of those cases, you need an online identity to gain access. Identification is a vital component of(...)
  • What is Identity and Access Management? The term Identity & Access Management (IAM) describes all processes within an organization aimed at managing users, authorizations, and access within your organization's digital network. This involves validating the identity of users on one hand, and(...)
  • What is Identity and Access Management? The term Identity & Access Management (IAM) describes all processes within an organization aimed at managing users, authorizations, and access within your organization's digital network. This involves validating the identity of users on one hand, and(...)
  • Just like your identity in real life, your digital identities and accounts also go through a specific life cycle. Your digital identity can vary depending on the process or system. And as your role, position or status within an organisation changes, your digital identities and accounts change(...)
  • What is ISO 27001? ISO 27001 is globally recognised as the standard for managing information security. This guideline provides organisations with a framework for securely and systematically managing their information using an Information Security Management System (ISMS). Is ISO 27001(...)
  • m

  • What is Multi-Factor Authentication (MFA)? In short, Multi-Factor Authentication (MFA) is an authentication method where the online user must successfully complete two or more steps to gain access. This type of authentication is also known as Two-Factor Authentication (2FA). While 'two-factor(...)
  • What is Multi-Factor Authentication (MFA)? In short, Multi-Factor Authentication (MFA) is an authentication method where the online user must successfully complete two or more steps to gain access. This type of authentication is also known as Two-Factor Authentication (2FA). While 'two-factor(...)
  • o

  • Identity and Access Management (IAM) plays a crucial role in managing and securing all aspects of digital user access. An essential security concept within IAM is the One-Time Password (OTP), also known as a single-use password. But what exactly is an OTP? How does it work, and why should(...)
  • Identity and Access Management (IAM) plays a crucial role in managing and securing all aspects of digital user access. An essential security concept within IAM is the One-Time Password (OTP), also known as a single-use password. But what exactly is an OTP? How does it work, and why should(...)
  • What is OpenID Connect? OpenID Connect, also known as OIDC, simply means having one key to log into many different internet services without having to remember different passwords. It is a way to enable Single Sign-On (SSO). OpenID Connect is built on top of OAuth2. OAuth 2.0 serves as the(...)
  • What is OpenID Connect? OpenID Connect, also known as OIDC, simply means having one key to log into many different internet services without having to remember different passwords. It is a way to enable Single Sign-On (SSO). OpenID Connect is built on top of OAuth2. OAuth 2.0 serves as the(...)
  • p

  • What is PAM? In practice, the acronym PAM refers to both Privileged Access Management and Privileged Account Management. PAM handles the management and security of so-called privileged accounts. These are accounts that allow you to perform critical IT management processes, such as systems(...)
  • What is Phishing? Phishing is a type of internet fraud where someone pretends to be a trustworthy entity to steal personal information, such as passwords or credit card numbers, most often through fake emails that look real. Example of a Phishing Email Phishing emails may seem like normal(...)
  • What is Principle of Least Privilege? The Principle of Least Privilege (PoLP) means that users are only given access rights to those applications and data they need to perform their tasks. Users are therefore not given more rights than strictly necessary. In this respect, the Principle of(...)
  • What is Privacy? Privacy is the right to protect your personal information and lifestyle from unauthorized access. It involves maintaining control over what others know about you and how your personal information is used. Personal data can include various aspects, such as: Name:(...)
  • What is privacy by design? Privacy by design is a design principle where you fully consider privacy aspects during the development phase of information systems and processes. From the outset, you think about possible privacy risks and then translate these into the necessary (technical)(...)
  • Provisioning is a process in IT management that focuses on efficiently managing user accounts and systems within organisations. This task ranges from setting up server hardware and cloud infrastructure to managing network components and user accounts. In this digital age, an effective(...)
  • r

  • Role Based Access Control (RBAC) Role Based Access Control (RBAC) is a method for setting up authorization management within your organisation. Here, you assign authorizations not on an individual basis, but based on RBAC roles. These roles are made up of department, job function, location,(...)
  • Role Based Access Control (RBAC) Role Based Access Control (RBAC) is a method for setting up authorization management within your organisation. Here, you assign authorizations not on an individual basis, but based on RBAC roles. These roles are made up of department, job function, location,(...)
  • What is role mining? Role mining enables you to map out all relevant user roles and their access rights in an iterative way. The input from a role mining project provides you with the necessary data to implement Role Based Access Control (RBAC) in an organisation. We explain our role mining(...)
  • s

  • What is SCIM? SCIM (System for Cross-domain Identity Management) is an open standard for automatically managing user accounts in cloud applications and services. With the help of an SCIM interface, systems can exchange, synchronise and manage account information such as a person's name, email(...)
  • SAML stands for Security Assertion Markup Language and is one of the most widely used standards for exchanging authentication data. SAML enables secure Single Sign-On. Users need to authenticate only once after which they do not need to log in again. This is possible because the(...)
  • SAML stands for Security Assertion Markup Language and is one of the most widely used standards for exchanging authentication data. SAML enables secure Single Sign-On. Users need to authenticate only once after which they do not need to log in again. This is possible because the(...)
  • What is shadow IT? Shadow IT refers to the use of software and other technologies that have not been approved by an organisation's IT department. Many employees use shadow IT, often unknowingly. For example, there are organisations where only Signal is officially allowed as a messaging app,(...)
  • Authentication within IAM can be arranged and set up in different ways. You can opt for single-factor authentication (SFA), two-factor authentication (2FA) or multi-factor authentication (MFA). The idea behind the three variants is the same, but it is the number of steps and credentials used(...)
  • Authentication within IAM can be arranged and set up in different ways. You can opt for single-factor authentication (SFA), two-factor authentication (2FA) or multi-factor authentication (MFA). The idea behind the three variants is the same, but it is the number of steps and credentials used(...)
  • In the modern digital landscape, where we regularly utilise numerous applications and platforms, the management of diverse login credentials has become a notable challenge. The constant need to log in and out of various systems can prove both time-consuming and frustrating. Additionally,(...)
  • In the modern digital landscape, where we regularly utilise numerous applications and platforms, the management of diverse login credentials has become a notable challenge. The constant need to log in and out of various systems can prove both time-consuming and frustrating. Additionally,(...)
  • In today's data-driven world, precise and efficient information management is of paramount importance. This is especially true for Identity & Access Management (IAM). For an IAM solution to be truly effective, it is essential that it operates with accurate and up-to-date data. Inaccurate or(...)
  • In today's data-driven world, precise and efficient information management is of paramount importance. This is especially true for Identity & Access Management (IAM). For an IAM solution to be truly effective, it is essential that it operates with accurate and up-to-date data. Inaccurate or(...)
  • Ransomware attacks, malware, DDoS attacks, phishing, Trojan horses: there are many cyber threats lurking in the digital world. A powerful, error-proof and reliable authentication system is therefore more crucial than ever for organisations wanting to keep cyber threats at bay. Strong(...)
  • t

  • Authentication is an essential part of verifying a digital identity and therefore a crucial foundation of every IAM process. Authentication is the process by which you verify whether a user, application or device is genuinely who or what they claim to be. Hence, you check if the provided(...)
  • 2

  • Authentication is an essential part of verifying a digital identity and therefore a crucial foundation of every IAM process. Authentication is the process by which you verify whether a user, application or device is genuinely who or what they claim to be. Hence, you check if the provided(...)
  • c

  • Cyber security is the collective term for technologies, processes and methodologies that organisations apply to protect the confidentiality, integrity and availability of their computers, networks, software and data. Together, these three security objectives are also known as the CIA triad of(...)
  • z

  • What is Zero Trust? Zero Trust is a security principle where users and systems never automatically trust each other. In traditional corporate networks, access is restricted to internal users and a single login check is usually sufficient. However, in open cloud environments, where everything(...)