Whether you’re new to the industry or just need a quick refresher, the IAM glossary below contains a lot of termes every IT specialist should know.

A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z



Access management (AM) will enforce the rules set forth by, ideally, the identity management and identity governance systems. More on AM

Access Methods

There are 3 main types of access methods. By combining access methods from these different types a multi factor authentication is crafted. The 3 types are: Knowledge factors, Possession factors and Biometric factors.


Is commonly known as 'logging in', it's the process of validating the identity, to check of the person or entity says is who they claim to be.


Is the process of evaluation to determine what the user or identity has access to, can actually see and wether or not they can adjust or edit the requested resource.


Customer Identity Access Management (CIAM)

Customer Identity Access Management (CIAM) is an IAM solution focused specially on the concept of managing the identities and profile data of customers or consumers. Customers who need access to digital platforms like for example web portals, web shops and large corporate websites. In a CIAM solution the customers themselves keep on managing their accounts and profile data.


A credential is an item used by someone (a person or an entity) which proves its identity to a specific system or platform. Most often this credential is a login like name and password. But also the following forms are credentials: ID badges, fingerprints, USB tokens, facial recognition, ...



Getting things done as easy and seamlessly as possible while maintaining a quality experience. In other words, digital transformation is about removing friction.



Identity and Access Management (IAM) is the management of individuals and their access within an IT infrastructure. It makes sure the right individuals have access to the right (IT) resources at the right time.

These resources can include systems, applications, files and networks. An IAM solution is crucial these days because they make things more secure, efficient and easier. Discover all the different solutions and their advantages below. More on IAM


Identity governance & Administration (IGA) provides tools for managing roles. Where identity management focuses on the lifecycle of a user, roles (technical to business) also have a lifecycle to manage. The roles associated with a person evolve over time and it is important to review assigned roles on a regular basis. Left unmanaged, accounts continue to gather entitlements which leads to accounts with access to multiple resources which they might no longer need (privilege creep). More on IGA


Identity management (IDM) provides a central point to manage each user account, the identity, their access to systems and the appropriate rights on these systems and data. The identity management system defines the rights and rules for obtaining access to systems and data. More on IDM



Multi-factor authentication (MFA) typically uses two or more independent access methods like passwords, security tokens, and biometric verification. This creates a defense of multiple layers. More on MFA



Privileged Account Management (PAM) is a solution that helps secure, control, manage and monitor privileged access to critical assets. More on PAM


A privileged user is someone who has more rights than a standard user, so an identity who has administrative access to a systems. For example these extra rights can include adding and deleting users and giving 'normal users' access to additional assets.



Single Sign-On (SSO) is an authentication process that allows a user to access multiple applications with one set of login credentials, reducing user friction by lowering the number of credentials prompts and ensuring productivity. More on SSO



Time-based One-Time Password (TOTP) is a form of Multi-Factor Authentication which uses unique numeric passwords that are generated by an algorithm. The algorithm uses the current time as an input to create the password. As they use time-based passwords, they expire after a short amount of time which increases the security tremendously.

Ready to take a deep dive into Identity and Access Management?