Multi-Factor Authentication

MFA requires users to provide two or more verification factors from different categories — something you know, something you have, or something you are —.

Mandatory Access Control

MAC is a strict access control model where access decisions are made by a central policy authority based on security labels and classifications — users.

Least Privilege

The Principle of Least Privilege states that users, systems, and processes should have only the minimum access rights necessary to perform their intended function —.

LDAP

LDAP is an open protocol for accessing and maintaining distributed directory information services — the standard way applications query directory services like Active Directory for.

JSON Web Token

A JWT is a compact, URL-safe token format used to securely transmit claims between parties. It is digitally signed to verify authenticity without requiring server-side.

Joiner-Mover-Leaver

The Joiner-Mover-Leaver (JML) framework describes the three key identity lifecycle events that trigger access changes: new hires (Joiners), role changes (Movers), and departures (Leavers).

Just-in-Time Access

Just-in-Time (JIT) Access is a PAM strategy where privileged access is granted only when needed, for a limited duration, and automatically revoked when the task.

Insider Threat

An insider threat is a security risk originating from within the organization — employees, contractors, or partners who misuse their legitimate access, either maliciously or.

Identity Lifecycle Management

Identity Lifecycle Management is the process of managing a digital identity from creation through changes to eventual deactivation — covering the Joiner, Mover, and Leaver.

Identity Provider

An Identity Provider (IdP) is a system that creates, maintains, and manages digital identities and provides authentication services to relying applications known as service providers.

Scroll to top