Free Demo Contact

Glossary

0-9

  • 2FA

    Two-factor authentication (2FA) is a form of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also called authentication factors) to verify your identity.

A

  • Application Programming Interface

  • API

  • Authentication

    Authentication is the act or process of verifying that a user, application or device is who or what he/she/it pretends to be.

  • AuthN

    Authentication is the act or process of verifying that a user, application or device is who or what he/she/it pretends to be.

  • Authorisation

    The authorisation process determines what exactly a person or system is allowed to do within a file, application or system.

  • AuthZ

    The authorisation process determines what exactly a person or system is allowed to do within a file, application or system.

D

  • Digital identity

    A digital identity is the type of identity that allows a person to identify themselves within an IT system or application. It is like an online passport that grants you access to the digital world.

E

  • Entitlement

    An entitlement, often also called a right, permission, authorization, or privilege, grants a user permission or privileges for using a specific application, service, device, or digital content.

I

  • Identification

    Identification is the act and step of making a digital identity known to a system, service provider or organization so that they know who they are dealing with.

  • Identity & Access Management

  • IAM

  • Identity life cycle

    The identity life cycle includes all steps of managing a user's digital identity, including the processes of creation, enablement, flow, disablement and deletion.

O

  • One-time password

    A one-time password (OTP) is a one-time code that is valid only once and is used for secure authentication.

  • OTP

    A one-time password (OTP) is a one-time code that is valid only once and is used for secure authentication.

P

  • Provisioning

    Provisioning is an essential process in IT management that focuses on efficiently managing user accounts and systems within organisations.

S

  • Security Assertion Markup Language

    SAML stands for Security Assertion Markup Language and is one of the most widely used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users need to authenticate once after which they do not have to log in again.

  • SAML

    SAML stands for Security Assertion Markup Language and is one of the most widely used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users need to authenticate once after which they do not have to log in again.

  • Single Sign-On

    Single Sign-On, or SSO for short, is an authentication method that allows users to only log in once to gain access to multiple applications or systems. This eliminates the need for users to remember distinct login credentials for each individual application or service.

  • SSO

    Single Sign-On, or SSO for short, is an authentication method that allows users to only log in once to gain access to multiple applications or systems. This eliminates the need for users to remember distinct login credentials for each individual application or service.

  • Single Source of Truth

    A Single Source of Truth (SSOT), also called a core registration system, refers to a centralized and reliable data source where data and documents are recorded once, so that they are consistent, accurate and up to date for reuse in business processes via specific systems.

  • SSOT

    A Single Source of Truth (SSOT), also called a core registration system, refers to a centralized and reliable data source where data and documents are recorded once, so that they are consistent, accurate and up to date for reuse in business processes via specific systems.

  • Single-Factor Authentication

    Single-factor authentication is the simplest form of authentication and applies one authentication factor to verify a digital identity.

  • SFA

    Single-factor authentication is the simplest form of authentication and applies one authentication factor to verify a digital identity.

  • Strong authentication

    Strong authentication is a method that uses multiple factors to verify the identity of a digital user or device.

T

  • Two-Factor Authentication

    Two-factor authentication (2FA) is a form of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also called authentication factors) to verify your identity.