Zero Trust Network Access (ZTNA) is a security service that provides secure, identity-aware access to specific applications — replacing traditional VPNs by granting per-session, least-privilege.
Archives: Glossary Terms
Workload IGA
Workload IGA (Identity Governance and Administration) extends traditional IGA processes — access reviews, lifecycle management, entitlement governance — to non-human identities like cloud workloads, service.
Workload IAM
Workload IAM refers to the application of Identity and Access Management principles specifically to non-human identities — cloud workloads, containers, functions, and automated processes —.
Workload Identity
Workload identity is a specific type of machine identity assigned to software-based entities — containers, serverless functions, VMs, microservices — enabling them to authenticate to.
Verified ID
Verified ID (Decentralized Identity) is an emerging identity paradigm where individuals hold and control their own verifiable credentials — cryptographically signed digital proofs of claims.
Vault Certificate
A vault certificate is a digital certificate stored securely within a secrets vault (HashiCorp Vault, CyberArk, Azure Key Vault) — used for machine authentication, TLS,.
User Access Review
A User Access Review (UAR) is a formal, periodic audit where managers, application owners, or data custodians review and certify the access rights of users.
Token Theft
Token theft is an attack where an adversary steals a valid authentication or session token — such as a JWT, OAuth access token, or session.
Stale Accounts
Stale accounts are user accounts or identities that remain active in an organization's IT environment despite being unused for an extended period — typically 30,.
SSH Key
An SSH key is a cryptographic key pair (public + private) used to authenticate to SSH-enabled systems (Linux servers, network devices) — a more secure.