Skip to main content

Glossary

This is a glossary of terms, used on MAYI ID related sites, materials and systems.

A

Access Control The selective restriction of access to data, systems, or resources, ensuring that only authorized users can perform specific actions.
ACME Automatic Certificate Management Environment, a certificate automation protocol.
Active Directory (AD) Integration The ability of MAYI HILL to synchronize user identities with Microsoft Active Directory (AD), enabling seamless user authentication and access management.
Alert logs Alert logs are specialized log files that record significant events, warnings, and error messages generated by a system or application. They serve as a critical resource for system administrators and developers to monitor system health, diagnose issues, and ensure the smooth operation of software and hardware components.
Agent The agent works as an automatic credential injector for selected web/desktop apps. The agent is activated by receiving a deep link from MAYI PAM which is handled by the agent.
Authentication The process of verifying the identity of a user, device, or entity, typically as a prerequisite to granting access to resources in an information system.
Authentication Token A digital key used to verify a user's identity in a secure system.
Authorization The process of determining what actions an authenticated entity is permitted to perform within a system, such as accessing specific data or executing particular functions.
Automation portal
Automation Portal is a standalone application allowing Partners, their Customers or Tenant Managers to configure and deploy Tenant on their own without any IT support.
Audit Logs A detailed record of privileged access and user activity, ensuring visibility for compliance, security monitoring, and forensic investigations.
Automation Protocols Various standardized methods (e.g., SCEP, WCCE, ACME, F5, AWS, Azure Key Vault, EST, MS Intune) that automate the distribution and renewal of digital certificates.
Automated Certificate Management Enrolment (ACME) A protocol used to automate the issuance and renewal of TLS/SSL certificates, widely adopted by services like Let's Encrypt.
Application Catalogue A centralized repository that organizes and manages applications accessible to users. It ensures proper group assignments and integrates with IAM solutions to streamline application access.
Approval Workflows Automated processes within MAYI HILL that ensure user access requests and privilege modifications go through structured approval chains to maintain security and compliance.

B

Bookmarks

When coming back to MAYI ID platform you can set which page you will land after the Signin in.

Biometric Authentication A security process that relies on the unique biological characteristics of an individual, such as fingerprints, facial recognition, or iris scans, to verify identity.
Bring Your Own Key (BYOK) A security model that allows organizations to use their own encryption keys rather than relying on vendor-provided ones.
Bring Your Own Encryption (BYOE) A strategy where organizations implement their own encryption mechanisms to maintain control over their data security.
Backup of HSM Partition A feature that allows secure backup and restoration of encryption keys, ensuring business continuity and compliance with regulatory standards.

C

Certificate Lifecycle Management (CLM) A process that automates the issuance, renewal, revocation, and tracking of digital certificates to maintain security compliance.
CLM vs CMAS Certificate Lifecycle Management (CLM) is formerly known as a Certificate Management and Automation System (CMAS)
Certificate Take-over The ability to transfer ownership of a certificate from one user or group to another, managed through approval workflows.
Certificate Authority (CA) An entity that issues and verifies digital certificates, ensuring the authenticity of public keys used in encryption.
CMP Certificate Management Protocol
CSR Certificate Signing Request (CSR) will validate whether you can use the common name in Certificates
Connection Manager A tool that facilitates seamless logins using a central secret, supporting both modern and legacy authentication methods, including Single Sign-On (SSO) and desktop agents.
Central Login Point A unified authentication portal simplifying the login process across multiple applications and services.
Centralized Management The ability to oversee and administer multiple identity and access management processes from a single platform.
Credentials Data used to verify the identity of a user, system, or process to grant access to digital resources
Credential Injection A method of providing login credentials to applications without requiring users to enter them manually.
Credential Rotation A process where privileged account credentials are automatically changed at regular intervals to enhance security and prevent unauthorized access