Are you showing signs of Credentialitis? Get diagnosed and treated →

KEY CONCEPTS RELATED TO Workload iam

Non-Human Identity Terms: A to Z Glossary

Looking for a straightforward rundown of non-human workload IAM-related terms, from the basic to the advanced? You’re in the right place. We’ve compiled a glossary that covers everything related to secure systems design, identity management, and data protection – from “A”ccess control to “Z”ero Trust.

Whether you’re looking to mature your workload IAM strategy or just need a quick reference or refresher, this glossary is here to make sure you have the precise terminology at your fingertips.

Categories:

No Glossary Found

Attribute Assertion

IAM concepts
Information about a user’s identity or attributes provided by an identity provider to a service provider during the authentication process. Attribute assertions include details such as user ID, email address, roles, or group memberships, which are used to make access control decisions.

Authentication

IAM concepts
The process of verifying the identity of a user, machine, or application attempting to access a system or resource. Authentication mechanisms may include passwords, biometrics, cryptographic keys, or other factors.

Authorization

IAM concepts
The process of determining whether a user, machine, or application has permission to access a resource or perform a specific action. Authorization mechanisms enforce access control policies based on predefined rules or roles.

Backup and Recovery

IT concepts
The process of creating and maintaining backups of password manager data to prevent data loss in case of device failure, accidental deletion, or other unforeseen events. Backup and recovery mechanisms help ensure data availability and integrity.

Bearer Token

Identity types
An access token used by non-human clients to authenticate and access protected resources or APIs. Bearer tokens are typically included in API requests as a header and provide temporary authorization without requiring additional authentication mechanisms.

Bot Identity

Identity types
An identity assigned to a software robot or bot, typically used to automate tasks or interactions with systems, applications, or APIs. Bot identities may have specific permissions and access rights tailored to their intended tasks.

Browser Extension

IT concepts
A software component that extends the functionality of a web browser by adding features or capabilities. Password managers often provide browser extensions to automatically fill login forms, generate strong passwords, and facilitate secure authentication on websites.

Client Credentials

Identity types
Credentials used by non-human clients, such as applications or services, to authenticate and access protected resources or APIs. Client credentials typically consist of a client ID and client secret or other authentication tokens.

Conditional Access

Security concepts
Conditional Access enables extra layers of security by allowing access to be granted based on specific conditions such as time of day, location, device type, or security posture. For example, access might be restricted based on the security posture of a device or workload, such as whether it meets certain criteria defined by an integration with security tools like CrowdStrike.

CORS (Cross-Origin Resource Sharing)

NHI security threats
A security mechanism that allows web browsers to request resources from a different origin domain. CORS policies, defined by HTTP headers, control which cross-origin requests are allowed and prevent unauthorized access to sensitive data.