Glossary Terms: R

A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Rogue Workload

NHI security threats
A rogue workload is an unauthorized or unmanaged workload that operates outside an organization’s governance framework and security policies, lacking proper identity verification, access controls or monitoring capabilities.

Retrieval-Augmented Generation (RAG)

AI/MCP Concepts
Retrieval-Augmented Generation (RAG) is an AI architecture that enhances large language models (LLMs) by combining real-time information retrieval with generative reasoning. Instead of relying solely on pre-trained model knowledge, RAG systems query external data sources, retrieve relevant content, and feed it into the model’s prompt context to generate accurate, up-to-date, and domain-specific responses.

RBAC (Role-Based Access Control)

Security concepts
A method of access control where permissions are assigned to roles, and users or entities are assigned to those roles. Password managers may implement RBAC to enforce fine-grained access control and restrict access to sensitive features or data.

Robotic Process Automation (RPA) Identity

Identity types
An identity assigned to a software robot or bot used for automating repetitive tasks or workflows. RPA identities enable secure authentication and access control for robotic process automation solutions.

Role-Based Access Control (RBAC)

Identity types
A method of access control where permissions are assigned to roles, and users or entities are assigned to those roles, simplifying administration and ensuring consistent access management.