Glossary Terms: R

A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Role-Based Access Control (RBAC)

IAM concepts
RBAC assigns permissions to roles representing job functions rather than to individual users, streamlining access management at scale.

Rogue Workload

NHI security threats
A rogue workload is an unauthorized or unmanaged workload that operates outside an organization’s governance framework and security policies, lacking proper identity verification, access controls or monitoring capabilities.

Retrieval-Augmented Generation (RAG)

AI/MCP Concepts
Retrieval-Augmented Generation (RAG) is an AI architecture that enhances large language models (LLMs) by combining real-time information retrieval with generative reasoning. Instead of relying solely on pre-trained model knowledge, RAG systems query external data sources, retrieve relevant content, and feed it into the model’s prompt context to generate accurate, up-to-date, and domain-specific responses.

Robotic Process Automation (RPA) Identity

Identity types
An identity assigned to a software robot or bot used for automating repetitive tasks or workflows. RPA identities enable secure authentication and access control for robotic process automation solutions.