Meet Aembit IAM for Agentic AI. See what’s possible →

Glossary Terms: R

A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Retrieval-Augmented Generation (RAG)

AI/MCP Concepts
Retrieval-Augmented Generation (RAG) is an AI architecture that enhances large language models (LLMs) by combining real-time information retrieval with generative reasoning. Instead of relying solely on pre-trained model knowledge, RAG systems query external data sources, retrieve relevant content, and feed it into the model’s prompt context to generate accurate, up-to-date, and domain-specific responses.

RBAC (Role-Based Access Control)

Security concepts
A method of access control where permissions are assigned to roles, and users or entities are assigned to those roles. Password managers may implement RBAC to enforce fine-grained access control and restrict access to sensitive features or data.

Robotic Process Automation (RPA) Identity

Identity types
An identity assigned to a software robot or bot used for automating repetitive tasks or workflows. RPA identities enable secure authentication and access control for robotic process automation solutions.

Role-Based Access Control (RBAC)

Identity types
A method of access control where permissions are assigned to roles, and users or entities are assigned to those roles, simplifying administration and ensuring consistent access management.

Rogue Workload

NHI security threats
A rogue workload is an unauthorized or unmanaged workload that operates outside the governance or security policies of an organization. These workloads pose security risks, as they may lack proper identity, access controls, or monitoring, and could expose sensitive resources to threats.