Glossary

A practical glossary for understanding the technologies behind modern identity, security, and access control.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A
Account Takeover (ATO)

Learn what account takeover (ATO) is, how it works, real-world examples, and best practices to prevent ATO attacks.

Audit Logs

Learn how audit logs enhance security, support compliance, and power identity management

C
Challenge Handshake Authentication Protocol (CHAP)

Learn how CHAP improves authentication over PPP using a secure challenge-response process and protects against replay attacks.

D
Deprovisioning

Learn why deprovisioning is critical to security, compliance, and customer trust and how to do it right.

Discretionary Access Control (DAC)

Learn how DAC works, where it fits in modern systems, and why it often needs support from stronger models.

I
Identity Governance and Administration (IGA)

Discover how Identity Governance and Administration manages digital access, boosts security, and simplifies compliance

M
Mandatory Access Control (MAC)

Explore how MAC works, when to use it, and how to avoid the developer bottlenecks it can create.

Microservices

Explore microservices architecture, its benefits, challenges, and examples. See how it boosts DevOps, scalability, and rapid delivery.

P
Password Authentication Protocol (PAP)

Explore how Password Authentication Protocol works, where it falls short, and what to use instead.

Password Spraying

Learn how password spraying attacks bypass weak passwords & MFA. See real-world examples, detection tips, and defenses.

Policy Management

Discover how centralized policy management enhances security, ensures compliance, and empowers teams to enforce rules safely.

Privileged Identity Management

Learn how PIM enhances security by granting time-limited auditable access to critical roles while reducing risk and enforcing compliance.

R
reCAPTCHA

Explore how reCAPTCHA works, why it's still widely used, and what to consider as bots get smarter.