Access Management Organizations use access management to make sure the right users have access to the right resources within their IT network. It involves finding a balance between the(...) Read More
Active Directory Active Directory (AD) is a database developed by Microsoft that holds key information about the resources on a Windows server. It stores details about active objects such as(...) Read More
c
Cloud IAM Permissions Organizations use cloud identity and access management (IAM) permissions to control which resources the identities on their cloud environment are allowed to(...) Read More
Directory Service In the context of identity security, "Directory Services" refer to software systems that store, organize, and provide access to information in a directory. In essence, they(...) Read More
DtHash (Okta) Okta's dtHash, also known as the "de-identified token hash," is a cryptographic hash function that protects user identifiers within Okta sessions. It is crucial to safeguard(...) Read More
i
Identity as a Service (IDaaS) Identity as a Service (IDaaS) is a cloud-based solution that lets users sign in to multiple applications and services – across various locations and devices – with just one(...) Read More
Identity Governance and Administration (IGA) Identity governance and administration (IGA) refers to how organizations manage digital identities such as users, groups, applications, and data on their systems. It(...) Read More
Identity Lifecycle Management Organizations use identity lifecycle management (ILM) to track and control their digital identities, from the moment they’re created to when they’re deactivated or(...) Read More
Identity Provider An Identity Provider (IdP) is a system that creates, maintains, and manages identity information for principals while providing authentication services to relying(...) Read More
Identity Security Posture Management (ISPM) Identity Security Posture Management (ISPM) is an advanced strategy for proactively optimizing identity security, compliance and hygiene efforts. It aims to reduce the risk(...) Read More
Identity Threat Detection and Response (ITDR) Identity threat detection and response (ITDR) is a cybersecurity approach that aims to protect digital identities. It combines several tools, practices, and security(...) Read More
m
Microsoft Entra ID Microsoft Entra is a suite of identity and access management (IAM) products offered by Microsoft. It's designed to help organizations manage and secure access to(...) Read More
Multi-Factor Authentication (MFA) Multi-factor authentication (MFA) is a security measure that requires users to verify themselves with additional evidence alongside their username and password when signing(...) Read More
n
Nudge Security Strategy A nudge security strategy uses gentle prompts or reminders (called ‘nudges’) to encourage people to address security concerns on their system. The strategy is rooted in(...) Read More
o
OIDC (OpenID Connect) Open ID Connect (OIDC), often called "Social Login", is an authentication layer on top of the well-known OAuth 2.0 protocol, designed to verify a user's identity in a(...) Read More
Open Authorization (OAuth) OAuth is an open standard for access delegation, commonly used to grant websites or applications access to information on other websites but without giving them the(...) Read More
p
Passwordless Authentication Passwordless authentication refers to any sign-in process that lets a user access their account without a password. Users are often required to verify their identity with a(...) Read More
Principle of Least Privilege The principle of least privilege states that users should be given the bare minimum level of privileges necessary to do their job. This encourages a security-first mindset(...) Read More
Privileged Access Management (PAM) In an IT context, privileges let users bypass certain security measures to modify a system or access sensitive resources. Privileged access management (PAM) lets(...) Read More
s
SAML Security Assertion Markup Language (SAML) is a critical standard in the world of online identity and access management. Developed by the Organization for the Advancement of(...) Read More
z
Zero Trust Zero trust is a cybersecurity principle that assumes a network is always under threat of attack, treating every identity as guilty until proven innocent. A zero trust(...) Read More
Silverfort Acquires Rezonate to Deliver the World’s First End-to-End Identity Security Platform.