Free Demo Contact

Glossary

0-9

  • 2FA

    Two-factor authentication (2FA) is a form of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also called authentication factors) to verify your identity.

A

  • Access control

    Met access control bedoelen we methodes en technologieën om de digitale toegang tot applicaties, gegevens en andere IT middelen te beveiligen en beheren.

  • Active Directory

  • AD

  • Application Programming Interface

  • API

  • Audit

  • Authentication

    Authentication is the act or process of verifying that a user, application or device is who or what he/she/it pretends to be.

  • AuthN

    Authentication is the act or process of verifying that a user, application or device is who or what he/she/it pretends to be.

  • Authorisation

    The authorisation process determines what exactly a person or system is allowed to do within a file, application or system.

  • AuthZ

    The authorisation process determines what exactly a person or system is allowed to do within a file, application or system.

C

  • Compliance

  • Credential

    A credential is a piece of information used to verify the identity of a user, device, or system. Credentials are used for authentication, a password is the most well-known variant.

  • Customer Identity & Access Management

  • CIAM

  • Cybersecurity

    Cyber security is the collective term for technologies, processes and methodologies that organisations apply to protect the confidentiality, integrity and availability of their computers, networks, software and data.

D

E

  • Entitlement

    An entitlement, often also called a right, permission, authorization, or privilege, grants a user permission or privileges for using a specific application, service, device, or digital content.

I

  • Identification

    Identification is the act and step of making a digital identity known to a system, service provider or organization so that they know who they are dealing with.

  • Identity & Access Management

  • IAM

  • Identity life cycle

    The identity life cycle includes all steps of managing a user's digital identity, including the processes of creation, enablement, flow, disablement and deletion.

  • ISO 27001

    De ISO 27001 norm wordt wereldwijd erkend als de standaard op het gebied van informatiebeveiliging.

O

  • One-time password

    A one-time password (OTP) is a one-time code that is valid only once and is used for secure authentication.

  • OTP

    A one-time password (OTP) is a one-time code that is valid only once and is used for secure authentication.

  • OpenID Connect

P

  • PAM

    De afkorting PAM verwijst in de praktijk zowel naar Privileged Access Management als Privileged Account Management. PAM verzorgt het beheer en beveiliging van zogeheten privileged accounts; dat zijn accounts waarmee je kritische IT-beheerprocessen kunt uitvoeren, zoals het systeembeheer, netwerkbeheer, configuratiebeheer en het beheer van gevoelige gegevens.

  • Phishing

    Phishing is een soort internetfraude waarbij iemand zich voordoet als een betrouwbare partij om persoonlijke informatie, zoals wachtwoorden of creditcardnummers, te stelen.

  • Principle of Least Privilege

    The Principle of Least Privilege (PoLP) means that users are only given access rights to those applications and data they need to perform their tasks. Users are therefore not given more rights than strictly necessary.

  • PoLP

    The Principle of Least Privilege (PoLP) means that users are only given access rights to those applications and data they need to perform their tasks. Users are therefore not given more rights than strictly necessary.

  • Privacy

    Privacy is the right to protect your personal information and lifestyle from unauthorized access. It is about maintaining control over what others know about you and how your personal information is used.

  • Privacy by design

  • Provisioning

    Provisioning is an essential process in IT management that focuses on efficiently managing user accounts and systems within organisations.

R

  • Role Based Access Control

  • RBAC

  • Role mining

    Met role mining kun je op een iteratieve manier alle relevante gebruikersrollen en hun toegangsrechten in kaart brengen. De input van een role mining project levert je zo de noodzakelijke gegevens voor de implementatie van Role Based Access Control (RBAC) in een organisatie.

S

  • SCIM

  • System for Cross-domain Identity Management

  • Security Assertion Markup Language

    SAML stands for Security Assertion Markup Language and is one of the most widely used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users need to authenticate once after which they do not have to log in again.

  • SAML

    SAML stands for Security Assertion Markup Language and is one of the most widely used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users need to authenticate once after which they do not have to log in again.

  • Shadow IT

  • Single Sign-On

    Single Sign-On, or SSO for short, is an authentication method that allows users to only log in once to gain access to multiple applications or systems. This eliminates the need for users to remember distinct login credentials for each individual application or service.

  • SSO

    Single Sign-On, or SSO for short, is an authentication method that allows users to only log in once to gain access to multiple applications or systems. This eliminates the need for users to remember distinct login credentials for each individual application or service.

  • Single Source of Truth

    A Single Source of Truth (SSOT), also called a core registration system, refers to a centralized and reliable data source where data and documents are recorded once, so that they are consistent, accurate and up to date for reuse in business processes via specific systems.

  • SSOT

    A Single Source of Truth (SSOT), also called a core registration system, refers to a centralized and reliable data source where data and documents are recorded once, so that they are consistent, accurate and up to date for reuse in business processes via specific systems.

  • Single-Factor Authentication

    Single-factor authentication is the simplest form of authentication and applies one authentication factor to verify a digital identity.

  • SFA

    Single-factor authentication is the simplest form of authentication and applies one authentication factor to verify a digital identity.

  • Strong authentication

    Strong authentication is a method that uses multiple factors to verify the identity of a digital user or device.

T

  • Two-Factor Authentication

    Two-factor authentication (2FA) is a form of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also called authentication factors) to verify your identity.

Z

  • Zero Trust

    Zero Trust is a security principle where users and systems never automatically trust each other.