Labels
This page lists all labels used throughout this section of the wiki.
-
A
- a
- abbreviation
- absolute-scale
- abuse
- abuse-of-authorizations
- abuse-of-system-privilege
- access
- access-audit
- access-continuum
- access-control
- access-control-list
- access-control-mechanism
- access-control-misconfiguration
- access-control-model
- access-control-policy
- access-granularity
- access-privilege
- access-right
- access-rights
- access-rights-management
- account
- accountability
- account-change
- account-credential-theft
- account-id
- account-lockout
- account-lockout-policy
- account-management
- account-name
- account-takeover
- accreditation
- acl
- acronym
- acronym-entry
- action-research
- activation
- active-impersonation-attack
- administrator
- admissible-scale-transformation
- aggregation
- algebra
- analysis
- annotated-template
- anonymization
- antonym
- ap
- app
- applicant
- application
- application-administrator
- application-instance
- application-level
- application-level-policy
- application-multiplexing
- application-owner
- application-package
- application-program
- architectural-pattern
- architecture
- archive
- arm
- arn
- assurance
- attack
- attestation
- attribute
- attribute-provider
- audit
- auth
- authenticate
- authenticated-users
- authentication
- authentication-burden
- authentication-factor
- authentication-friction
- authenticator
- authenticity
- authn
- authority
- authorization
- authorization-externalization
- authz
- awareness
- aws
- aws-access-control-list
- aws-account-root-user
- aws-acl
- aws-iam
- aws-iam-group
- aws-iam-policy
- aws-iam-principal
- aws-iam-role
- aws-iam-temporary-security-credentials
- aws-iam-user
- axioms-of-conjointness
- axioms-of-extension
- axioms-of-geometry
- axioms-of-interval
- axioms-of-order
-
B
- b
- bank-id
- basic-z-rule
- bbca
- behavior
- behavioral-authentication
- behavior-based-continuous-authentication
- bell-lapadula
- bell-lapadula-model
- between-group
- bibliographic-entry
- biometric-identitification
- biometrics
- birth-certificate
- blast-radius
- bloating
- blockchain
- blp
- bring-your-own-identity
- brute
- brute-force
- brute-force-attack
- built-in
- business-role
- byoi
- byoid
- bzr
-
C
- c
- capability
- capacity
- cardinality
- cdd
- centralization
- centralized-identity-management-system
- centralized-idms
- certification
- certify
- change
- ciam
- ciba
- claim
- claimant
- claim-registry-model
- class
- classification
- clearance
- clearance-level
- client-initiated-backchannel-authentication
- cloud
- cloud-computing
- cloud-identity-management-system
- cloud-idms
- cloud-service-consumers
- cloud-service-provider
- cloud-service-user
- cluster-analysis
- commission
- commission-error
- company-insider
- company-outsider
- compartment
- compartmentalization
- composability
- compromised-account
- conceptual
- concurrent-impersonation-attack
- consent
- constructed-type
- continuous
- continuous-authentication
- continuum
- control
- create-new-page
- credential
- credential-harvesting
- credential-service-provider
- credential-stuffing
- credential-theft
- cryptographic-key
- csc
- csp
- csu
- custodian
- customer-due-diligence
- customer-identification
- customer-identity
- customer-identity-verification
- customer-on-boarding
- cyber-sabotage
-
D
- d
- dac
- data
- data-anonymization
- data-custodian
- data-level
- data-level-policy
- data-lineage
- data-obfuscation
- data-owner
- death-certificate
- decentralized-identifier
- de-duplication
- defaultaccount
- default-account
- default-system-managed-account
- de-provisioning
- dictionary-acronym
- dictionary-entry
- dictionary-term
- did
- digital
- digital-continuity
- digital-id
- digital-identification-system
- digital-identity
- digital-identity-authenticity
- digital-identity-portability
- digital-id-system
- digital-triangulation
- dimension
- discretionary
- discretionary-access-control
- distributed-identity
- distributed-ledger
- domain
- dos-attack
- dsma
- dual-authorization
-
E
- e
- empirical
- empirical-classification
- employee
- employee-promotion
- employee-transfer
- entitlement
- entitlement-based-access-control
- entitlement-management
- entitlement-management-process
- entity
- eps
- excessive
- excessive-privilege-abuse
- excessive-privilege-based-abuse
- exhaustive
- expanded-password-system
- exploited-identity
- explosion
- extensible-access-control-markup-language
- externalization
- extreme
-
F
- f
- fake
- fake-digital-identity
- fake-identity
- fapi
- fatf
- federated-identity-management
- federated-identity-management-system
- federated-identity-scheme
- federated-idms
- federation
- federation-bridge
- file
- fim
- financial-grade-api
- fintech
- flexibility
- flow
- force
- forged
- forged-identity
- forging
- formal-verification
- foundational-identification-system
- four-eyes-check
- four-eyes-principle
- fraud
- friction
- full-typology
- fully-polythetic-class
- functional-identification-system
-
G-H
-
I
- i
- iag
- iam
- iam-arn
- iam-dictionary-entry
- iap
- id
- idaas
- ideal-type
- identification
- identifier
- identifier-registry-model
- identitification-system
- identity
- identity-aggregation
- identity-and-access-governance
- identity-as-a-service
- identity-assurance
- identity-attribute
- identity-aware-proxy
- identity-federation
- identity-guardian
- identity-lifecycle
- identity-management-system
- identity-portability
- identity-proofing
- identity-propagation
- identity-repository
- identity-sprawl
- identity-takeover
- identity-usurpation
- idms
- idmss
- impersonation
- impersonation-attack
- index-page
- information
- information-asset
- information-custodian
- information-flow
- information-flow-policy
- information-owner
- information-security
- information-security-domain
- information-system
- insider
- insider-attack
- insider-threat
- instance
- insufficient-granularity-of-access-control
- intentional-error
- intermediate
- interoperability
- isolated-identity-management-system
- isolated-idms
- it-sabotage
-
J-K
-
L
- l
- label
- lattice-based-access-control
- layer
- layers
- layers-architectural-pattern
- lbac
- lead-time
- least-privilege
- least-privilege-principle
- legal-entity-identifier
- legitimate
- legitimate-privilege-abuse
- legitimate-privilege-based-abuse
- lei
- level
- levels-of-assurance
- lexical
- lexical-relation
- lexicon
- liberal
- liberal-dac
- liberal-discretionary-access-control
- list
- loa
- local
- localservice
- lockout
- logic-bomb
- login
- login-id
- login-identifier
- login-name
- loss
-
M
- m
- manageability
- management
- man-in-the-middle
- man-in-the-middle-attack
- mechanism
- meronym
- meronymy
- metadata
- metadirectory
- meta-directory
- methodology
- microstructure
- mining
- misconfiguration
- mitd
- mitd-attack
- model
- modeling
- monothetic-class
- multidimensional
- multilevel-security
- multiple-accounts
- multiplexing
- multi-user
- muma
- mutual-authentication
- mutually-exhaustive
-
N-O
- n
- name
- near-synonym
- network
- networkservice
- new-joiner
- non-worker
- no-tranquility
- not-tranquil
- numerical-identity
- numerical-taxonomy
- o
- oauth
- object
- omission
- omission-error
- opa
- open-policy-agent
- operational-taxonomic-unit
- opposite
- organization-insider
- organization-outsider
- orphan
- orphan-account
- orphaned-account
- orphan-file
- orphan-object
- orphan-process
- orphan-product
- orphan-role
- orphan-system
- outsider
-
P
- p
- parsimony
- partial-typology
- passive-impersonation-attack
- password
- passwordless
- passwordless-authentication
- password-rotation
- password-spraying
- password-spraying-attack
- pattern
- persona
- personalization
- platypus
- plt
- pms-dictionary-entry
- polar
- polar-type
- policy
- policy-analysis
- policy-centralization
- policy-interoperability
- policy-manageability
- policy-mining
- policy-modeling
- polythetic-class
- portability
- principal
- principle
- privacy
- private-key
- private-key-loss
- privilege
- privilege-abuse
- privilege-chaining
- privilege-escalation
- process
- product
- production-lead-time
- program
- promotion
- property
- protocol
- provisioning
-
Q-R
- q
- qr-code
- qr-code-authentication
- qualitative
- qualitative-classification
- qualitative-identity
- quantitative-classification
- quantity
- r
- rba
- rbac
- re-authentication
- reference-monitor
- registry
- rejoiner
- relation
- relying-party
- remote-identity-proofing
- repository
- research-dictionary-entry
- review
- revocation
- ridp
- right
- rights
- risk-based-approach
- risk-based-authentication
- role
- role-based-access-control
- role-bloating
- role-capacity
- role-cardinality
- role-cardinality-activation-control
- role-explosion
- role-management
- root-user
-
S
- s
- s-1-5-11
- sabotage
- sam
- sam-database
- saml
- scim
- scim-1-0
- scim-1-1
- scim-2-0
- sdp
- secure
- secure-production-identity-framework-for-everyone
- secure-system
- security
- security-accounts-manager
- security-assertion-markup-language
- security-class
- security-clearance
- security-clearance-level
- security-compartment
- security-domain
- security-identifier
- security-label
- segregation-of-duties
- self-sovereign-identity
- separation-of-duties
- service
- service-account
- service-centric
- service-centric-identity-management-system
- session
- session-re-authentication
- sid
- silo
- siloed-identity-repository
- similarity
- social
- social-authentication
- social-honeypot
- social-network
- sod
- software-defined-perimeter
- spelled-out-form
- spiffe
- spraying
- ssh-key
- ssi
- stability-of-access-decision-factors
- start-date
- step-up-authentication
- strict
- strict-dac
- strict-discretionary-access-control
- strong
- strong-property
- strong-tranquility-property
- stuffing
- sub-domain
- subject
- supply-chain
- supply-chain-attack
- sweden
- sybil
- sybil-attack
- synonym
- synthetic-identity
- synthetic-identity-fraud
- sysadmin
- system
- system-account
- system-administrator
- system-boundaries
- system-owner
-
T
- t
- table-of-contents
- takeover
- task
- task-based-access-control
- taxa
- taxon
- taxonomy
- tco
- tec-014
- temporary
- term
- terms-and-conditions
- theft
- threat
- throughput-time
- ticket
- to-authorize
- toc
- total-cost-of-ownership
- total-product-cycle-time
- tranquility
- tranquility-principle
- tranquility-property
- transfer
- transitivity
- trust
- trust-asymmetry
- trust-composability
- trust-personalization
- trust-transitivity
- two-person-control
- type
- typing
- typing-biometrics
- typology
-
U-V
- u
- uin
- unanticipated-user
- unauthorized
- unauthorized-access
- uncorrelated-account
- unidimensional
- unique-id-number
- unprivileged
- unprivileged-insider
- user
- user-account
- user-agnostic
- user-centric-identity-management-system
- user-de-provisioning
- user-entitlement-review
- user-id
- user-identifier
- username
- user-name
- user-provisioning
- usr
- usurpation
- v
- verifiable
- verifiable-claim
- virtual-directory
- virtual-private-network
- virtual-risk-and-security-review
- vpn
-
W-Z
- w
- water-mark
- weak
- weak-property
- weak-tranquility-property
- window-of-vulnerability
- windows
- windows-default-local-user-account
- windows-local-user-account
- windows-security-identifier
- windows-system-account
- within-group
- worker
- workforce-jml
- workforce-joiner
- workforce-joiner-hire-date
- workforce-joiner-lead-time
- workforce-joiner-mover-leaver
- workforce-joiner-process
- workforce-joiner-start-date
- x
- xacml
- y
- z
- zero-trust-access
- zombie
- zombie-account
- zombie-user
- zta
-
0-9
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.