MFA requires users to provide two or more verification factors from different categories — something you know, something you have, or something you are —.
Archives: Glossary Terms
Mandatory Access Control
MAC is a strict access control model where access decisions are made by a central policy authority based on security labels and classifications — users.
Least Privilege
The Principle of Least Privilege states that users, systems, and processes should have only the minimum access rights necessary to perform their intended function —.
LDAP
LDAP is an open protocol for accessing and maintaining distributed directory information services — the standard way applications query directory services like Active Directory for.
JSON Web Token
A JWT is a compact, URL-safe token format used to securely transmit claims between parties. It is digitally signed to verify authenticity without requiring server-side.
Joiner-Mover-Leaver
The Joiner-Mover-Leaver (JML) framework describes the three key identity lifecycle events that trigger access changes: new hires (Joiners), role changes (Movers), and departures (Leavers).
Just-in-Time Access
Just-in-Time (JIT) Access is a PAM strategy where privileged access is granted only when needed, for a limited duration, and automatically revoked when the task.
Insider Threat
An insider threat is a security risk originating from within the organization — employees, contractors, or partners who misuse their legitimate access, either maliciously or.
Identity Lifecycle Management
Identity Lifecycle Management is the process of managing a digital identity from creation through changes to eventual deactivation — covering the Joiner, Mover, and Leaver.
Identity Provider
An Identity Provider (IdP) is a system that creates, maintains, and manages digital identities and provides authentication services to relying applications known as service providers.