Glossary

A

Access Certification: Review and approval of user access rights.
Access Control: Restricting access to resources based on user identity.
Access Creep: Accumulation of unnecessary access rights.
Access Management: Process of granting, managing, and revoking access.
Adaptive Authentication: Authentication that adjusts based on context.
API (Application Programming Interface): Set of rules for software interaction.
Application Access: Access granted to specific applications.
Approval Workflow: Automated process for access requests.
Attribute-Based Access Control (ABAC): Access based on user and resource attributes.
Automated Provisioning: Automatic creation of user accounts.
Automation: Use of technology to streamline processes.
Authorization: Determining what a user is allowed to do.

 

B

Background Check: Verification of an individual's history.
Biometric Authentication: Authentication using biological traits.
Business Process Management (BPM): Managing and optimizing business processes.
Bot: Automated software application.

 

Thousands of Customers Trust Aquera for HR & Identity Integrations
californiaclosets-2
chipotle
toyota
greatPhiladelphiaymca
allbirds-2
adt-1
lesschwabtires
warbyparker-1
carvana-1
gentivahealth-1
cornerstone-1
dayforce-1
weightwatchers-1
fairlife-1
utz-1
koa-1
fareway-1
wingstop-1
sunwings

The Aquera 360 HR & Identity Integration as a Service Platform seamlessly integrates any HCM with your organization’s HR, finance, identity directory and IT ecosystems, ensuring automated, end-to-end, employee lifecycle processes, data synchronization, and user account provisioning.

These processes include candidate and employee on/off-boarding, payroll management, and employee access to directories and downstream applications.

Choose from over 900 pre-built connectors for leading business applications including applicant tracking systems, ERPs, third-party HCMs, learning management systems, ticketing systems, payroll services, and identity directories.

Any HR. Any Identity Directory. All Apps.

C

Cloud Identity: Identity management in a cloud environment.
Compliance: Adherence to regulations and policies.
Context-Aware Access: Access based on user context.
Continuous Authentication: Ongoing verification of user identity.
Credential Management: Managing user credentials.
Cybersecurity: Protecting computer systems and networks.

D

Data Governance: Managing the availability, usability, integrity, and security of data.
De-Provisioning: Revoking user access rights.
Delegated Administration: Granting administrative rights to others.
Directory Services: Centralized storage of user information.
Digital Identity: Electronic representation of a person or entity.
Dynamic Authorization: Authorization that changes based on context.

E

Employee Lifecycle Management: Managing all stages of an employee's tenure.
Entitlement Management: Managing user entitlements to resources.
Event-Driven Provisioning: Provisioning triggered by events.
Extensible Markup Language (XML): Data format for information exchange.

F

Federated Identity: Linking identities across different systems.
First-Factor Authentication: Initial authentication method.

G

Governance: Ensuring compliance and managing risk.
Granular Access Control: Fine-grained control over access rights.

H

HR Automation: Automating HR processes.
HRIS (Human Resource Information System): Software for managing HR data.

I

IAM (Identity and Access Management): Managing user identities and access.
IGA (Identity Governance and Administration): Managing and governing user identities and access.
Identity: Unique attributes that identify a person or entity.
Identity Lifecycle Management: Managing the entire lifecycle of a digital identity.
Identity Provider (IdP): Service that provides authentication.
Information Security: Protecting information assets.
Integration: Connecting different systems together.
IT Governance: Governance of IT resources and processes.

J

Just-in-Time Provisioning: Provisioning user accounts when needed.

K

Key Management: Managing cryptographic keys.

L

Least Privilege: Granting only necessary access rights.
Lifecycle Management: Managing the stages of a resource or identity.

M

Multi-Factor Authentication (MFA): Using multiple authentication methods.
Metadata: Data about data.

O

OAuth (Open Authorization): Authorization framework.
Okta: Cloud-based identity management platform.
One-Time Password (OTP): Password valid for a single use.
Orchestration: Automating and coordinating tasks.

P

Password Management: Managing user passwords.
Policy Enforcement: Enforcing security policies.
Privileged Access Management (PAM): Managing access to privileged accounts.
Provisioning: Creating and managing user accounts.

R

RBAC (Role-Based Access Control): Access based on user roles.
Reconciliation: Comparing user access rights with defined policies.
Regulatory Compliance: Compliance with legal regulations.
Risk Management: Identifying and mitigating risks.
Role Mining: Discovering and defining user roles.
Role Modeling: Defining roles based on business needs.
Resource Access: Access granted to specific resources.
Review and Certification: Process of reviewing and certifying user access.

S

SaaS (Software as a Service): Software delivered over the internet.
SailPoint: Identity governance platform.
SAML (Security Assertion Markup Language): XML-based framework for authentication.
Saviynt: Identity governance platform.
SCIM (System for Cross-domain Identity Management): Standard for automating user provisioning.
Second-Factor Authentication: Additional authentication method.
Security Information and Event Management (SIEM): Security monitoring and analysis.
Single Sign-On (SSO): Accessing multiple applications with one set of credentials.
Smart Card: Physical card used for authentication.
Social Login: Logging in using social media accounts.
SOX (Sarbanes-Oxley Act): US law related to financial reporting.

T

Threat Detection: Identifying potential security threats.
Tokenization: Replacing sensitive data with tokens.
Two-Factor Authentication (2FA): Using two authentication factors.

U

User Access Review: Reviewing user access rights.
User Account: Record of a user in a system.
User Lifecycle Management: Managing the lifecycle of a user account.

V

Virtual Directory: Directory service that aggregates data from multiple sources.

W

Workflow Automation: Automating business workflows.