Skip to main content
DI

Digital Identity Glossary

Your comprehensive reference for 50+ identity, authentication, and security terms. From beginner concepts to advanced protocols.

A

Access Review

A periodic assessment process where managers or application owners review and validate that users' current access rights are appropriate and aligned with their roles and responsibilities.

beginnerGovernanceCompliance

Active Directory

AD

Microsoft's directory service for Windows domain networks that provides authentication, authorization, directory services, and group policy management for enterprise environments.

beginnerAuthenticationProvisioning

Adaptive Authentication

An authentication approach that dynamically adjusts security requirements based on real-time risk assessment, user behavior analysis, and contextual signals, balancing security with user experience.

advancedAuthenticationThreat Detection

API Security

The practices, patterns, and technologies used to protect application programming interfaces from unauthorized access, data breaches, and abuse, including authentication, authorization, rate limiting, and input validation.

intermediateAPI SecurityAuthorization

Attribute-Based Access Control

ABAC

An access control model that evaluates access requests based on attributes of the user, resource, action, and environment, enabling fine-grained, context-aware authorization decisions.

intermediateAuthorizationGovernance

Authorization Code Flow

An OAuth 2.0 grant type where the client receives an authorization code from the authorization server and exchanges it for access and refresh tokens via a back-channel request, providing the most secure flow for server-side applications.

intermediateAuthorizationStandards & Protocols

I

Identity Fabric

An architectural pattern that provides a unified, integrated layer of identity services across an organization's hybrid and multi-cloud environment, abstracting the complexity of underlying identity infrastructure.

advancedCloud IdentityGovernance

Identity Federation

The process of establishing trust relationships between separate identity management systems so that users authenticated by one system can access resources managed by another without re-authentication.

intermediateAuthenticationSSO

Identity Governance and Administration

IGA

A framework of policies, processes, and technologies that manage and govern digital identities and their access rights across an organization, including provisioning, certification, and compliance reporting.

intermediateGovernanceCompliance

Identity Lifecycle Management

The end-to-end process of managing a digital identity from creation through modification, access changes, and eventual deactivation or deletion, ensuring appropriate access at every stage.

intermediateGovernanceProvisioning

Identity Mesh

A distributed identity architecture concept where identity services are decomposed into modular, interoperable components that can be composed flexibly, rather than relying on a single monolithic identity platform.

advancedCloud IdentityGovernance

Identity Provider

IdP

A service that creates, manages, and verifies digital identities, issuing authentication tokens or assertions that other applications and services trust to grant access.

beginnerAuthenticationSSO

ISO 27001

An international standard for information security management systems (ISMS) that specifies requirements for establishing, implementing, maintaining, and continually improving an organization's information security posture.

intermediateComplianceGovernance

S

Security Assertion Markup Language

SAML

An XML-based open standard for exchanging authentication and authorization data between an identity provider and a service provider, widely used for enterprise SSO.

intermediateAuthenticationStandards & Protocols

Self-Sovereign Identity

SSI

An identity model that gives individuals full ownership and control of their digital identities without relying on any centralized authority, using decentralized identifiers and verifiable credentials.

advancedDecentralized IdentityPrivacy

Separation of Duties

SoD

A security control principle that divides critical tasks among multiple people or roles to prevent any single individual from having enough access to commit fraud or cause significant harm undetected.

intermediateGovernanceCompliance

Service Provider

SP

An application or service that relies on an identity provider to authenticate users and make authorization decisions, consuming authentication tokens or assertions issued by the IdP.

beginnerAuthenticationSSO

Session Management

The process of securely handling user sessions after authentication, including session creation, tracking, timeout, invalidation, and protection against session hijacking and fixation attacks.

intermediateAuthenticationAPI Security

Single Sign-On

Trending

SSO

An authentication method that allows users to log in once and gain access to multiple applications or systems without re-entering credentials for each one.

beginnerAuthenticationSSO

SOC 2

A compliance framework developed by the AICPA that defines criteria for managing customer data based on five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.

intermediateComplianceGovernance

Step-Up Authentication

A security mechanism that requires a user to complete additional authentication challenges when attempting to access higher-risk resources or perform sensitive operations within an already authenticated session.

intermediateAuthenticationMFA

System for Cross-domain Identity Management

SCIM

An open standard protocol for automating the exchange of user identity information between identity domains and IT systems, enabling automated provisioning and deprovisioning of user accounts.

intermediateProvisioningStandards & Protocols