Taming IAM in the extended enterprise with Zero Trust

Enterprise User Provisioning Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • BYOI (bring your own identity)

    BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon. 

  • mandatory access control (MAC)

    Mandatory access control (MAC) is a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.) based on the level of authorization or clearance of the accessing entity, be it person, process, or devic... 

  • privilege creep

    Privilege creep is the accumulation of IT access privileges beyond what an end user needs to do his or her job, enabling the potential abuse of privileges. 

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise... 

  • authentication, authorization, and accounting (AAA)

    Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. 

  • identity access management (IAM) system

    An identity management access (IAM) system is a framework for business processes that facilitates the management of electronic identities. 

  • onboarding and offboarding

    In identity management, onboarding is the addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access pr... 

  • role mining

    Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise... (Continued) 

  • user profile

    In a Windows environment, a user profile is a record of user-specific data that define the user's working environment. 

  • RADIUS (Remote Authentication Dial-In User Service)

    Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or s...