Digital Identity Glossary
Your comprehensive reference for 50+ identity, authentication, and security terms. From beginner concepts to advanced protocols.
A
Access Review
A periodic assessment process where managers or application owners review and validate that users' current access rights are appropriate and aligned with their roles and responsibilities.
Active Directory
AD
Microsoft's directory service for Windows domain networks that provides authentication, authorization, directory services, and group policy management for enterprise environments.
Adaptive Authentication
An authentication approach that dynamically adjusts security requirements based on real-time risk assessment, user behavior analysis, and contextual signals, balancing security with user experience.
API Security
The practices, patterns, and technologies used to protect application programming interfaces from unauthorized access, data breaches, and abuse, including authentication, authorization, rate limiting, and input validation.
Attribute-Based Access Control
ABAC
An access control model that evaluates access requests based on attributes of the user, resource, action, and environment, enabling fine-grained, context-aware authorization decisions.
Authorization Code Flow
An OAuth 2.0 grant type where the client receives an authorization code from the authorization server and exchanges it for access and refresh tokens via a back-channel request, providing the most secure flow for server-side applications.
D
Decentralized Identity
TrendingAn identity model where individuals own and control their digital identity data using cryptographic keys and decentralized infrastructure, rather than relying on centralized identity providers.
Deprovisioning
The process of revoking and removing a user's access rights and accounts across IT systems when they no longer need access, such as when they change roles or leave the organization.
F
Federated Identity
A system that allows users to use the same identity credentials across multiple independent organizations or domains, enabled by trust relationships between identity providers and service providers.
FIDO2
TrendingAn open authentication standard by the FIDO Alliance that enables passwordless authentication using public-key cryptography, comprising the WebAuthn web API and CTAP2 client-to-authenticator protocol.
I
Identity Fabric
An architectural pattern that provides a unified, integrated layer of identity services across an organization's hybrid and multi-cloud environment, abstracting the complexity of underlying identity infrastructure.
Identity Federation
The process of establishing trust relationships between separate identity management systems so that users authenticated by one system can access resources managed by another without re-authentication.
Identity Governance and Administration
IGA
A framework of policies, processes, and technologies that manage and govern digital identities and their access rights across an organization, including provisioning, certification, and compliance reporting.
Identity Lifecycle Management
The end-to-end process of managing a digital identity from creation through modification, access changes, and eventual deactivation or deletion, ensuring appropriate access at every stage.
Identity Mesh
A distributed identity architecture concept where identity services are decomposed into modular, interoperable components that can be composed flexibly, rather than relying on a single monolithic identity platform.
Identity Provider
IdP
A service that creates, manages, and verifies digital identities, issuing authentication tokens or assertions that other applications and services trust to grant access.
ISO 27001
An international standard for information security management systems (ISMS) that specifies requirements for establishing, implementing, maintaining, and continually improving an organization's information security posture.
J
JSON Web Token
JWT
A compact, URL-safe token format that encodes claims as a JSON object, digitally signed for integrity verification, commonly used to transmit authentication and authorization information between parties.
Just-in-Time Provisioning
JIT Provisioning
An automated provisioning method that creates or updates user accounts in a target application at the moment of the user's first authentication, rather than pre-provisioning accounts in advance.
L
Least Privilege
A security principle that grants users, applications, and systems only the minimum access rights and permissions necessary to perform their required tasks, reducing the attack surface and blast radius.
Lightweight Directory Access Protocol
LDAP
An open, vendor-neutral protocol for accessing and managing distributed directory information services, commonly used to store and retrieve user identity data, group memberships, and organizational structures.
O
OAuth 2.0
TrendingAn authorization framework that enables third-party applications to obtain limited access to a web service on behalf of a resource owner, without exposing credentials.
OAuth Scopes
A mechanism in OAuth 2.0 that limits the access granted to a client application, defining specific permissions the client can request and the resource owner can approve.
OpenID Connect
TrendingOIDC
An identity layer built on top of OAuth 2.0 that allows clients to verify the identity of an end-user and obtain basic profile information using an ID Token.
P
Passkeys
TrendingA passwordless authentication credential based on FIDO2/WebAuthn that syncs across devices using platform cloud services, providing phishing-resistant authentication without requiring users to manage physical security keys.
Passwordless Authentication
TrendingAn authentication approach that verifies user identity without requiring a traditional password, using alternatives such as biometrics, security keys, magic links, or passkeys.
Privileged Access Management
PAM
A set of cybersecurity strategies, technologies, and practices for controlling, monitoring, securing, and auditing elevated access and permissions for users, accounts, and systems across an IT environment.
Proof Key for Code Exchange
PKCE
An extension to the OAuth 2.0 Authorization Code flow that protects against authorization code interception attacks by requiring the client to create a cryptographic code verifier and challenge.
R
Risk-Based Authentication
RBA
An adaptive authentication method that evaluates contextual risk signals (device, location, behavior patterns) to dynamically adjust the authentication requirements, requesting additional verification only when risk is elevated.
Role-Based Access Control
RBAC
An access control model that assigns permissions to users based on their organizational roles, simplifying access management by grouping permissions into roles rather than assigning them individually.
S
Security Assertion Markup Language
SAML
An XML-based open standard for exchanging authentication and authorization data between an identity provider and a service provider, widely used for enterprise SSO.
Self-Sovereign Identity
SSI
An identity model that gives individuals full ownership and control of their digital identities without relying on any centralized authority, using decentralized identifiers and verifiable credentials.
Separation of Duties
SoD
A security control principle that divides critical tasks among multiple people or roles to prevent any single individual from having enough access to commit fraud or cause significant harm undetected.
Service Provider
SP
An application or service that relies on an identity provider to authenticate users and make authorization decisions, consuming authentication tokens or assertions issued by the IdP.
Session Management
The process of securely handling user sessions after authentication, including session creation, tracking, timeout, invalidation, and protection against session hijacking and fixation attacks.
Single Sign-On
TrendingSSO
An authentication method that allows users to log in once and gain access to multiple applications or systems without re-entering credentials for each one.
SOC 2
A compliance framework developed by the AICPA that defines criteria for managing customer data based on five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.
Step-Up Authentication
A security mechanism that requires a user to complete additional authentication challenges when attempting to access higher-risk resources or perform sensitive operations within an already authenticated session.
System for Cross-domain Identity Management
SCIM
An open standard protocol for automating the exchange of user identity information between identity domains and IT systems, enabling automated provisioning and deprovisioning of user accounts.