所有资源文章
Product Information

IAM Terminology

2026-03-23
文章作者

加入我们的时事通讯,了解最新的功能和版本.

订阅即表示您同意我们的隐私政策并同意接收我们公司的更新.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Terminologies

IAM

Identity and Access Management

Identity Federation

Identity Federation refers to the establishment of mutual trust among multiple applications for federated authentication across different systems.

2C Management

Identity management for customers.

2B Management

Identity management for business partners.

Social Authentication

An authentication method that leverages mutual trust between applications and social platforms, allowing users to verify their identities using social accounts such as WeChat, QQ, Weibo, or DingTalk.

User Profiling

Offers multi-dimensional basic attributes, visit intent, and industry trend analysis to help users understand target audiences, identify emerging topics, and optimize content operations, enabling comprehensive network analysis to uncover potential traffic and maximize the value of user profiling.

Digital Identity

The online representation of an individual, organization, or device within cyberspace. With IAM technologies, it maps physical-world identities to their digital counterparts.

SCIM

System for Cross-domain Identity Management

Authentication

Authentication verifies user identity, addressing the "Who are you?" question with methods such as CA digital certificates, fingerprints, or one-time passwords.

2E Management

Identity management for employees.

Integrated Authentication

Enables organizations to quickly adopt various authentication methods through a unified, plug-and-play architecture with standardized APIs. The framework also supports flexible authentication workflows and configurable security levels for dynamic authentication management.

Device Fingerprint

A unique identifier generated from a device’s hardware, OS, network, and status attributes using proprietary encryption. The device fingerprint can be linked to user identities to enhance authentication security.

IDM

Identity Management

CAS

Central Authentication Service

Identity Credential

The identifier a user employs to gain access to information resources, such as passwords, PKI certificates, or biometric data (including fingerprints, iris scans, facial recognition, and voice recognition).

IoT IDM

Identity Management of Internet of Things

FIDO

Fast IDentity Online

UBA

User Behavior Analytics

AM

Access Management

OAuth 2.0

An open standard that enables users to grant third-party mobile applications access to information stored with other service providers without sharing their usernames and passwords or disclosing all their data to the third party.

Orphan Account

An account that exists in the system but cannot be linked to a specific individual, also known as a ghost account.

User Lifecycle Management

User lifecycle management enables automated synchronization, provisioning, deprovisioning, and management of user attributes, credentials, and access entitlements throughout personnel changes such as onboarding, role changes, offboarding, rehire, and retirement.

ABAC

Attribute-Based Access Control

Valid Account

An account assigned to a specific individual, actively used, and compliant with the organization's internal account management policies.

AD

Active Directory

TBAC

Task-Based Access Control

IDaaS

Identity as a Service

RBAC

Role-Based Access Control

SSO

Single Sign-On

SAML

Security Assertion Markup Language

Duplicate Account

Refers to any of multiple active accounts associated with the same user within an application system.

Permission Management

The process of controlling user permissions for resources based on predefined security rules or policies, ensuring users can access only the resources they have been explicitly granted

Dormant Account

An account associated with specific individuals that remain activated but have not been used for an extended period, such as accounts belonging to former employees.

PIM

Privileged Identity Management

LDAP

Lightweight Directory Access Protocol