Glossary
Infrastructure access security terminology and definitions.
Zero Trust
Security model that requires verification from everyone trying to access resources.
PAM
Privileged Access Management - securing access to critical systems and data.
JIT Access
Just-in-Time Access - temporary elevated permissions granted on demand.
RBAC
Role-Based Access Control - permissions based on organizational roles.
SSO
Single Sign-On - one set of credentials for multiple applications.
MFA
Multi-Factor Authentication - multiple verification methods.
IAM
Identity and Access Management - managing digital identities.
Certificate Authority
Entity that issues digital certificates.
mTLS
Mutual TLS - both client and server authenticate via certificates.
Session Recording
Recording of interactive sessions for audit purposes.
Bastion Host
Hardened server providing access to private networks.
SAML
Security Assertion Markup Language - XML-based authentication standard.
OIDC
OpenID Connect - identity layer on top of OAuth 2.0.
SCIM
System for Cross-domain Identity Management - user provisioning standard.
Ready to Secure Your Infrastructure?
Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.
No credit card required • 14-day free trial • Enterprise support available