Meet Aembit IAM for Agentic AI. See what’s possible →

Glossary Terms: S

A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Secret

Security concepts
A secret is sensitive credential material or key data used to authenticate or authorize access to systems, services, or data. In modern infrastructure, secrets encompass API keys, passwords, tokens, certificates, database credentials, SSH keys, and OAuth client secrets that workloads and services use for machine-to-machine authentication.

Self-RAG

AI/MCP Concepts
Self-RAG (Self-Retrieval Augmented Generation) is an emerging AI architecture in which a model autonomously retrieves, filters, and evaluates its own contextual information during the generation process, without relying on an external retriever service. It merges retrieval and reasoning within the model itself, allowing for adaptive, self-supervised access to relevant knowledge or memory.

SAML (Security Assertion Markup Language)

IAM concepts
An XML-based standard for exchanging authentication and authorization data between identity providers and service providers. SAML enables single sign-on (SSO) and federated identity management across different systems or domains.

Secret Rotation

IAM concepts
The process of periodically updating secrets to mitigate the risk of unauthorized access or misuse. Secret rotation is essential for maintaining security hygiene and compliance with industry standards and regulations.

Secrets Manager

IAM concepts
A centralized service or tool used to securely store, manage, and distribute sensitive information, such as passwords, API keys, cryptographic keys, and other credentials. Secrets managers help organizations improve security by reducing the risk of unauthorized access and data breaches.

Secret Versioning

IAM concepts
The practice of maintaining multiple versions of secrets to facilitate rollback, auditing, and compliance requirements. Secrets managers often support versioning to track changes over time and ensure that previous versions of secrets remain accessible when needed.

Service Account

Identity types
An identity used by applications or services to authenticate and authorize their interactions with other services, resources, or APIs. Service accounts are often used in automated processes and workflows.

Service Identity

Identity types
A unique identifier assigned to a service or application workload, typically associated with access control policies and permissions within a computing environment. Service identities enable secure communication and interaction between different components of a system.

Service Provider (SP)

IAM concepts
A system, application, or service that relies on an identity provider for authentication and authorization. Service providers accept identity tokens or assertions from the IdP to grant access to their resources or functionalities.

Service-to-Service Authentication

Security concepts
Authentication mechanism used between services or applications to establish trust and securely exchange information without human involvement. Service-to-service authentication often relies on cryptographic protocols, such as OAuth 2.0, to authenticate and authorize interactions.