Meet Aembit IAM for Agentic AI. See what’s possible →

Glossary Terms: R

A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

RBAC (Role-Based Access Control)

Security concepts
A method of access control where permissions are assigned to roles, and users or entities are assigned to those roles. Password managers may implement RBAC to enforce fine-grained access control and restrict access to sensitive features or data.

Retrieval-Augmented Generation (RAG)

AI/MCP Concepts
An AI framework that optimizes an LLM’s output by retrieving relevant information from an external, authoritative knowledge base and incorporating that data into the prompt before generating a response.

Robotic Process Automation (RPA) Identity

Identity types
An identity assigned to a software robot or bot used for automating repetitive tasks or workflows. RPA identities enable secure authentication and access control for robotic process automation solutions.

Role-Based Access Control (RBAC)

Identity types
A method of access control where permissions are assigned to roles, and users or entities are assigned to those roles, simplifying administration and ensuring consistent access management.

Rogue Workload

NHI security threats
A rogue workload is an unauthorized or unmanaged workload that operates outside the governance or security policies of an organization. These workloads pose security risks, as they may lack proper identity, access controls, or monitoring, and could expose sensitive resources to threats.