Are you showing signs of Credentialitis? Get diagnosed and treated →

KEY CONCEPTS RELATED TO Workload iam

Non-Human Identity Terms: A to Z Glossary

Looking for a straightforward rundown of non-human workload IAM-related terms, from the basic to the advanced? You’re in the right place. We’ve compiled a glossary that covers everything related to secure systems design, identity management, and data protection – from “A”ccess control to “Z”ero Trust.

Whether you’re looking to mature your workload IAM strategy or just need a quick reference or refresher, this glossary is here to make sure you have the precise terminology at your fingertips.

Categories:

No Glossary Found

RBAC (Role-Based Access Control)

Security concepts
A method of access control where permissions are assigned to roles, and users or entities are assigned to those roles. Password managers may implement RBAC to enforce fine-grained access control and restrict access to sensitive features or data.

Retrieval-Augmented Generation (RAG)

AI/MCP Concepts
An AI framework that optimizes an LLM’s output by retrieving relevant information from an external, authoritative knowledge base and incorporating that data into the prompt before generating a response.

Robotic Process Automation (RPA) Identity

Identity types
An identity assigned to a software robot or bot used for automating repetitive tasks or workflows. RPA identities enable secure authentication and access control for robotic process automation solutions.

Rogue Workload

NHI security threats
A rogue workload is an unauthorized or unmanaged workload that operates outside the governance or security policies of an organization. These workloads pose security risks, as they may lack proper identity, access controls, or monitoring, and could expose sensitive resources to threats.

Role-Based Access Control (RBAC)

Identity types
A method of access control where permissions are assigned to roles, and users or entities are assigned to those roles, simplifying administration and ensuring consistent access management.

SAML (Security Assertion Markup Language)

IAM concepts
An XML-based standard for exchanging authentication and authorization data between identity providers and service providers. SAML enables single sign-on (SSO) and federated identity management across different systems or domains.

Secret

Security concepts
Any sensitive piece of information that should be protected from unauthorized access, including passwords, cryptographic keys, tokens, and other credentials used to authenticate users or access resources.

Secret Rotation

IAM concepts
The process of periodically updating secrets to mitigate the risk of unauthorized access or misuse. Secret rotation is essential for maintaining security hygiene and compliance with industry standards and regulations.

Secret Versioning

IAM concepts
The practice of maintaining multiple versions of secrets to facilitate rollback, auditing, and compliance requirements. Secrets managers often support versioning to track changes over time and ensure that previous versions of secrets remain accessible when needed.

Secretless

IAM concepts
A secretless architecture refers to systems where applications and services authenticate and communicate without the need to manage secrets directly (e.g., passwords, tokens, or API keys). Instead, they rely on dynamically generated, just-in-time mechanisms for identity or access.