- Identity provider (IdP) An entity that provides authentication services to verify the identity of an individual or system. IdPs are commonly used in single sign-on systems to securely verify the identity of users accessing multiple applications. Examples include Google and Microsoft as IDps for their respective services.
- Identity Provisioning Identity provisioning involves setting up and managing individual user accounts and access permissions across various IT systems and services. This process incorporates establishing roles, granting appropriate access based on those roles, and regularly updating or revoking access as needed, especially as users join, move within, or leave the organization.
- Identity Store A database or directory where user profile data is securely stored. An identity store might contain information such as usernames, passwords, roles, and other user attributes necessary for authentication and authorization processes. By keeping all these data in one place, an identity store aids in managing and validating user identities efficiently.
- Identity theft The act of obtaining and using another individual's personal information without their permission for fraudulent purposes. Identity theft is a common concern in the digital world, as personal information can be easily accessed and stolen through cyber-attacks. Examples include using stolen credit card information to make unauthorized purchases or accessing someone's bank account without their knowledge.
- Identity token An identity token is a security token that is digitally signed and contains claims about the identity of a user, which can be verified by a system or application. Identity tokens simplify access management by substituting for traditional credentials and are often used in federated identity and single sign-on (SSO) systems.
- Identity validation The process of verifying that an individual's identity is valid and accurate. It is commonly used in IAM systems to ensure that only authorized individuals are able to access certain resources. Examples of identity validation include checking a user's credentials against a database of authorized users.
- Idle standby A state in which a system or device is ready to be used but is not currently in use. It is commonly used in systems that need to be available at all times, such as backup systems or failover systems. Examples of idle standby systems include standby power generators and backup servers.
- IEEE 802.1x A port-based network access control protocol that provides an authentication mechanism to devices wishing to attach to a network. It is utilized in environments where a higher level of security is required, including preventing unauthorized access to network services and resources. The protocol works by enforcing a client-server model, where a client is authenticated by a server before being granted access to network resources.
- IEEE 802.3 Commonly known as Ethernet, IEEE 802.3 is a family of standards defining the physical layer and data link layer's media access control (MAC) of wired networks. The standard forms the basis for the most widely deployed local area network (LAN) technology, Ethernet, allowing for devices to communicate within the same network and supporting a broad range of applications, including office networks, data centers, and telecommunication services.
- IEEE 802.11 A set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication. Developed by the IEEE, it is the foundation of wireless networking products, commonly known as Wi-Fi, that have revolutionized the way we connect to the Internet and to each other.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.