Conditional Access is a policy framework that enforces access decisions based on conditions like user identity, device compliance, location, and risk level.
Archives: Glossary Terms
Cloud Identity
Cloud Identity refers to managing digital identities for users, workloads, and devices operating in cloud environments, including governance of cloud-native identities like service accounts.
Customer Identity and Access Management
CIAM is the set of technologies and processes used to manage and secure the digital identities of external users (customers, partners, citizens) who access consumer-facing.
Biometrics
Biometrics uses unique physical or behavioral characteristics — fingerprints, facial recognition, iris scans, voice patterns — to authenticate users.
BeyondTrust
BeyondTrust is a leading Privileged Access Management vendor offering solutions for securing, managing, and auditing privileged accounts across on-premises and cloud environments.
Behavioral Analytics (UEBA)
User and Entity Behavior Analytics (UEBA) uses machine learning to establish baseline behavior patterns and detect anomalies that may indicate compromised accounts or insider threats.
Authorization
Authorization determines what an authenticated user is allowed to do — which resources they can access and what actions they can perform.
Authentication
Authentication is the process of verifying the identity of a user, system, or device — confirming they are who they claim to be before granting.
Attribute-Based Access Control
ABAC is an access control model that grants or denies access based on a combination of attributes — user attributes, resource attributes, environment attributes —.
Adaptive Authentication
Adaptive Authentication dynamically adjusts the level of authentication required based on contextual risk signals such as location, device, time of access, and user behavior.