Sign-on procedure: The process by which a user gains access to a system or network by identifying and authenticating themselves. It typically involves the user entering a unique identifier (such as a username or email address) and providing one or more forms of verification (like a password, biometric data, or a security token). The sign-on procedure ensures that access is granted only to authenticated users, serving as a fundamental security measure in protecting sensitive systems and data from unauthorized access.
Categories: CC D5: Security Operations | CCSP D4: Cloud Application Security | CISM D3: Information Security Program | CISSP D5: Identity and Access Management (IAM) | Security+ D5: Security Program Management and Oversight | SSCP D2: Access Controls
« Back to Glossary Index