Glossary
This is a glossary of terms, used on MAYI ID related sites, materials and systems.
A |
|
Access Control | The selective restriction of access to data, systems, or resources, ensuring that only authorized users can perform specific actions. |
ACME | Automatic Certificate Management Environment, a certificate automation protocol. |
Active Directory (AD) Integration | The ability of MAYI HILL to synchronize user identities with Microsoft Active Directory (AD), enabling seamless user authentication and access management. |
Alert logs | Alert logs are specialized log files that record significant events, warnings, and error messages generated by a system or application. They serve as a critical resource for system administrators and developers to monitor system health, diagnose issues, and ensure the smooth operation of software and hardware components. |
Agent | The agent works as an automatic credential injector for selected web/desktop apps. The agent is activated by receiving a deep link from MAYI PAM which is handled by the agent. |
Authentication | The process of verifying the identity of a user, device, or entity, typically as a prerequisite to granting access to resources in an information system. |
Authentication Token | A digital key used to verify a user's identity in a secure system. |
Authorization | The process of determining what actions an authenticated entity is permitted to perform within a system, such as accessing specific data or executing particular functions. |
Automation portal |
Automation Portal is a standalone application allowing Partners, their Customers or Tenant Managers to configure and deploy Tenant on their own without any IT support. |
Audit Logs | A detailed record of privileged access and user activity, ensuring visibility for compliance, security monitoring, and forensic investigations. |
Automation Protocols | Various standardized methods (e.g., SCEP, WCCE, ACME, F5, AWS, Azure Key Vault, EST, MS Intune) that automate the distribution and renewal of digital certificates. |
Automated Certificate Management Enrolment (ACME) | A protocol used to automate the issuance and renewal of TLS/SSL certificates, widely adopted by services like Let's Encrypt. |
Application Catalogue | A centralized repository that organizes and manages applications accessible to users. It ensures proper group assignments and integrates with IAM solutions to streamline application access. |
Approval Workflows | Automated processes within MAYI HILL that ensure user access requests and privilege modifications go through structured approval chains to maintain security and compliance. |
B |
|
Bookmarks |
When coming back to MAYI ID platform you can set which page you will land after the Signin in. |
Biometric Authentication | A security process that relies on the unique biological characteristics of an individual, such as fingerprints, facial recognition, or iris scans, to verify identity. |
Bring Your Own Key (BYOK) | A security model that allows organizations to use their own encryption keys rather than relying on vendor-provided ones. |
Bring Your Own Encryption (BYOE) | A strategy where organizations implement their own encryption mechanisms to maintain control over their data security. |
Backup of HSM Partition | A feature that allows secure backup and restoration of encryption keys, ensuring business continuity and compliance with regulatory standards. |
C |
|
Certificate Lifecycle Management (CLM) | A process that automates the issuance, renewal, revocation, and tracking of digital certificates to maintain security compliance. |
CLM vs CMAS | Certificate Lifecycle Management (CLM) is formerly known as a Certificate Management and Automation System (CMAS) |
Certificate Take-over | The ability to transfer ownership of a certificate from one user or group to another, managed through approval workflows. |
Certificate Authority (CA) | An entity that issues and verifies digital certificates, ensuring the authenticity of public keys used in encryption. |
CMP | Certificate Management Protocol |
CSR | Certificate Signing Request (CSR) will validate whether you can use the common name in Certificates |
Connection Manager | A tool that facilitates seamless logins using a central secret, supporting both modern and legacy authentication methods, including Single Sign-On (SSO) and desktop agents. |
Central Login Point | A unified authentication portal simplifying the login process across multiple applications and services. |
Centralized Management | The ability to oversee and administer multiple identity and access management processes from a single platform. |
Credentials | Data used to verify the identity of a user, system, or process to grant access to digital resources |
Credential Injection | A method of providing login credentials to applications without requiring users to enter them manually. |
Credential Rotation | A process where privileged account credentials are automatically changed at regular intervals to enhance security and prevent unauthorized access |