Solution
Features
Management of arrivals and departures
Automation of account creation
User directory
Account/user associations
IS security
Collaboration and self-service
Multi-structure & MSP
All features
Pricing
Connectors
Articles
Articles
Login
Try it
Demo
IAM Glossary
#
Computer access
Computer access refers to the ability of a user to access a computer system and use its resources, such as files, data, networks and computer services.
#
User directories
A user directory is a database or centralized management system that groups and stores information about the users of a specific network, organization or department.
#
IT audit
An IT audit is an evaluation of your information system, an assessment that leads to recommendations for improvement.
#
Authentication
This is the process by which an entity verifies theidentity of a user or system before granting access.
#
Computer automation
Automation in IT refers to the use of software, scripts and other tools to perform repetitive or complex tasks autonomously, without direct human intervention.
#
Computer authorization
Authorization gives the user explicit permission to access a specific resource or function.
#
CIAM
Customer Identity and Access Management is a sub-category of IAM designed to manage a company's customers or end-users in terms of security and access to online services.
#
CRM
CRM (Customer Relationship Management) is a strategy for effectively managing the relationships and interactions between a company and its customers.
#
Validation circuit
The validation circuit is a process that organizes and automates internal and external requests and validations.
#
Orphan account
An orphan account is an access account that is not attached to a physical user.
#
Connectors
Connectors are software interfaces that enable different applications or computer systems to communicate with each other.
#
Access control
This is a set of measures and policies put in place to regulate access to IT resources.
#
Cyber attack
A cyber attack is a deliberate attempt to compromise the computer security of a system, network or device, using malicious techniques.
#
User life cycle
From an IT point of view, a user's life cycle involves the creation of accounts on arrival, the modification of rights and accesses during internal moves, the suspension of accounts during long absences, and the deletion of accounts when the user leaves.
#
De-provisioning user accounts
User account deprovisioning is the automated process of removing a user's access to a system or IT resources, either because they no longer need them, or because they are leaving the company.
#
Federation ofidentity
Identity federation is a system or protocol that enables an organization to offload authentication tasks by entrusting them to a third-party organization.
#
IAM (Identity and Access Management)
IAM, Identity and Access Management, refers to the processes and tools used to manage user authorizations within a company.
#
Access management
Access Management is the process of controlling user access rights to IT systems and resources, thus ensuring corporate security and compliance.
#
Authorization management
Authorization management means giving the right rights to the right person.
#
Identity management
Identity management is a set of processes and technologies for centrally managing user identification information within an organization.
#
Privilege management
Privilege management refers to the process of controlling and managing the access rights and privileges granted to a given identity .
#
IAM (Identity and Access Management)
IAM is a set of processes and tools enabling a company to manage user authorizations for its various IT resources (software, hardware, etc.).
#
Identification
Identification is the process by which a user is associated with a unique and distinctive set of identifying information, such as a username, e-mail address or ID number.
#
identity digital
Theidentity digital ID is a virtual representation of an entity (person, machine or application) that enables it to be identified and authenticated in a computer system or network.
#
The Least Privilege Principle
The principle of least privilege is a concept that aims to grant users only the access they need to perform their tasks.
#
MFA
Multi-Factor Authentication (MFA) is an IT security method that requires the use of two or more different forms of authentication to verify a user'sidentity .
#
Offboarding
Offboarding consists of all the actions involved in preparing for a user's departure.
#
On-Premise
On-Premise, also known as "on site", is a hosting model where data and software are stored on internal servers within the company.
#
Onboarding
Onboarding is the term used to describe the process of bringing a new employee into a company.
#
Privileged Access Management
PAM is a sub-category of IAM that aims to protect and supervise access to user accounts and privileges, in order to reinforce security and minimize the risks associated with the use of privileged accounts.
#
User account provisioning
User account provisioning is the automated process of creating, modifying, deactivating or deleting user accounts in a system or application.
#
RBAC
Role-Based Access Control (RBAC) controls access to digital resources according to users' roles within the organization.
#
Review of user accounts
This is a very important step in the life of a company which is often carried out out of obligation but which is an integral part of the management of authorisations.
#
Reconciliation of identities
identity reconciliation is the process used to associate existing accounts with existing users.
#
User repository
A user repository lists all the users of an entity.
#
HRIS
HRIS stands for Human Resources Information System. It generally refers to one or more software applications used to manage a company's employees.
#
SSO (Single Sign On)
SSO, or Single Sign On, is a unique authentication method that allows users to enter their password only once to connect to several applications.
#
SaaS
SaaS or "Software as a Service" refers to a software distribution model that uses the cloud.
#
Service IT
Information Technology (IT) services encompass all activities aimed at managing electronic data and information within an organization.
#
Shadow it
Shadow IT refers to the use of software, applications or IT services outside the control or supervision of the corporate IT team.
#
SoD Task segregation
Segregation of Duties (SoD) is an essential IT security practice for managing access rights and privileges.
#
User
A user in the "IAM" sense is a natural person who has a contractual relationship with the entity and for whom one must manage his or her authorisations or access to the entity's various software.
#
Workflows
A workflow is the organized sequence of tasks, activities or steps required to complete a specific process or activity within an organization.
Computer access
User directories
IT audit
Authentication
Computer automation
Computer authorization
CIAM
CRM
Validation circuit
Orphan account
Connectors
Access control
Cyber attack
User life cycle
De-provisioning user accounts
Federation ofidentity
IAM (Identity and Access Management)
Access management
Authorization management
Identity management
Privilege management
IAM (Identity and Access Management)
Identification
identity digital
The Least Privilege Principle
MFA
Offboarding
On-Premise
Onboarding
Privileged Access Management
User account provisioning
RBAC
Review of user accounts
Reconciliation of identities
User repository
HRIS
SSO (Single Sign On)
SaaS
Service IT
Shadow it
SoD Task segregation
User
Workflows
By clicking "Accept", you agree to cookies being stored on your device in order to improve site navigation, analyze site usage and contribute to our marketing efforts. See our
privacy policy
for more information.
Refuse
Accept