A | B | C | D | E | I | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z


The process of controlling user access across a wide range of applications, systems, and resources belonging to an organization. This process encompasses all policies, processes, methodologies, and tools that enable system administrators to grant access to authorized users while preventing access to unauthorized users. Access management is a continuous process and requires periodic auditing to ensure that access rights are updated in sync with changes in the employee lifecycle.

A directory service developed by Microsoft for the Windows domain networks. Organizations use Active Directory (AD) to control which users have access to certain resources. AD stores data as objects, such as users, groups, applications, or devices, and handles the interaction of objects with the domain. For example, AD verifies access when a user signs into a device or attempts to connect to a server over a network.

Additional Resources: Multi-Factor Authentication for ADFS

A concept of using contextual data, such as user location, time of day, and IP address, to evaluate access requests. The adaptive authentication policies are triggered to require additional authentication steps only when contextual data indicates anomalous access behavior. With adaptive authentication, organizations can provide a better authentication experience for users while keeping company resources and data protected.
A service that evaluates each access request to determine if an additional factor of authentication is needed before access to requested resources is granted. Adaptive Multi-Factor Authentication uses machine learning to build a baseline profile for each user, leveraging user-specific contextual attributes such as location, device, network, and time of the access request. This enables organizations to analyze access requests against historical patterns, assign risk to each access attempt, and create step-up authentication policies that are triggered when anomalous behavior is detected.
The Idaptive App Gateway enables you to set up secure, per-app access to your on-premises applications without a VPN. With App Gateway, you can access applications that do not support modern authentication protocols based on application URLs, users, groups, and network information without exposing your entire network, installing hardware, or changing firewall rules.