A | B | C | D | E | I | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z


Identity and Access Management (IAM) is a set of technologies that helps organizations ensure that the right individuals have access to the appropriate resources. Organizations with mature IAM capabilities can decrease the risk of breaches associated with poor password practices, increase end-user productivity by simplifying access to resources employees need to do their jobs, and reduce the volume credentials-related help desk calls with secure and user-friendly self-service capabilities.

Identity as a Service, also known as IDaaS or SaaS-delivered IAM solutions, refer to identity management solutions that are hosted in the cloud and managed by third-party service providers. In recent years, SaaS-delivered solutions overtook software-based solutions to become the preferred IAM delivery method for the vast majority of customers. In contrast to IDaaS, software-delivered solutions, frequently referred to as “on-prem” solutions, are single-tenant solutions delivered as traditional software installations or virtual appliances.

Identity assurance refers to the ability to establish, with some level of certainty, that the electronic credentials provided by a person can be trusted to belong to the person they represent. Identity Assurance processes frequently combine Identity Proofing, user authentication, and electronic credential management services.

Identity analytics refers to a process of employing machine learning and artificial intelligence (AI) technologies to consume and analyze vast amounts of identity and access-related data and distill that data into actionable intelligence, allowing organizations to detect and respond to access risk more quickly. Identity Analytics relies on data from a vast array of other sources, such as data access governance, content-aware data loss prevention, security intelligence and event monitoring (SIEM), and database monitoring systems, as well as application, web, network, database and endpoint logs to obtain and analyze information about the use of access privileges.

Identity Lifecycle Management (ILM) refers to the collection of technologies and business processes that enable organizations to create, manage, and remove user identities based on defined roles, rules, and policies at every stage of the employee lifecycle.
Inbound provisioning refers to the process of leveraging user data from a trusted identity source, such as a Human Capital Management (HCM) system, to add users to identity repositories and applications. For example, an organization can set up integrations with its HCM system to provision new users into Active Directory and other applications.
Integrated Windows Authentication (IWA) refers to an authentication scheme that enables users to be automatically authenticated with Active Directory accounts to applications and services. With IWA enabled, users can access applications and services without additional authentication whenever they are signed in to the Windows domain.