Identity and access management Definitions

Browse Definitions
Search Definitions
  • A

    AAA server (authentication, authorization, and accounting)

    An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.

  • access control

    Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.

  • access log

    An access log is a list of all the requests for individual files that people have requested from a Web site.

  • anonymous Web surfing (Web anonymizer, SafeWeb)

    Anonymous Web surfing allows a user to visit Web sites without allowing anyone to gather information about which sites the user visited.

  • authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.

  • authentication factor

    An authentication factor is a category of credential used for identity verification. The three most common categories are often described as something you know (the knowledge factor), something you have (the possession factor) and something you are (the inherence factor).

  • authentication server

    An authentication server is an application that facilitates authentication of an entity that attempts to access a network...(Continued)

  • authentication, authorization, and accounting (AAA)

    Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

  • Automated Fingerprint Identification System (AFIS)

    The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.

  • B

    bifurcation

    In the biometric process of fingerscanning, a bifurcation is a point in a finger image at which two ridges meet.

  • bimodal IAM (bimodal identity access management)

    Bimodal identity and access management (IAM) uses two forms of credentials, internal and external, as a method of authentication.

  • BioAPI Consortium

    The BioAPI Consortium is a group of over 90 organizations whose goal is to encourage and promote the growth of biometric technology by developing an industry-wide application programming interface (API.) The consortium's API defines how a software application interacts with a biometric verification device; it is compatible with different operating systems, vendor applications, and types of biometric technologies including voice and facial recognition, iris and retina scans, signature verification, hand and earlobe geometry, and fingerprint analysis.

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of an individual to verify that he is who is says he is. Biometric authentication systems compare a biometric data capture to stored, confirmed authentic data in a database. If both samples of the biometric data match, authentication is confirmed.

  • biometric payment

    Biometric payment is a point of sale technology in which a customer submits biometric data, such as a fingerprint, to authorize the deduction of funds from a bank account... (Continued)

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits... (Continued)

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close