Cloud Identity
Manage identity and access in cloud and multi-cloud environments. Covers cloud IAM for AWS, Azure, and GCP, federation, CIAM, identity brokering, and modern identity architectures including identity mesh and identity fabric.
Key Terms
Single Sign-On
TrendingSSO
An authentication method that allows users to log in once and gain access to multiple applications or systems without re-entering credentials for each one.
OpenID Connect
TrendingOIDC
An identity layer built on top of OAuth 2.0 that allows clients to verify the identity of an end-user and obtain basic profile information using an ID Token.
Security Assertion Markup Language
SAML
An XML-based open standard for exchanging authentication and authorization data between an identity provider and a service provider, widely used for enterprise SSO.
Identity Provider
IdP
A service that creates, manages, and verifies digital identities, issuing authentication tokens or assertions that other applications and services trust to grant access.
Service Provider
SP
An application or service that relies on an identity provider to authenticate users and make authorization decisions, consuming authentication tokens or assertions issued by the IdP.
System for Cross-domain Identity Management
SCIM
An open standard protocol for automating the exchange of user identity information between identity domains and IT systems, enabling automated provisioning and deprovisioning of user accounts.
Customer Identity and Access Management
TrendingCIAM
A specialized subset of IAM focused on managing and securing external customer identities, providing seamless registration, authentication, and profile management for consumer-facing applications.
Federated Identity
A system that allows users to use the same identity credentials across multiple independent organizations or domains, enabled by trust relationships between identity providers and service providers.
Identity Federation
The process of establishing trust relationships between separate identity management systems so that users authenticated by one system can access resources managed by another without re-authentication.
Just-in-Time Provisioning
JIT Provisioning
An automated provisioning method that creates or updates user accounts in a target application at the moment of the user's first authentication, rather than pre-provisioning accounts in advance.
User Provisioning
The process of creating, managing, and maintaining user accounts and their associated access rights across IT systems and applications, ensuring users have the appropriate access to perform their roles.
Identity Mesh
A distributed identity architecture concept where identity services are decomposed into modular, interoperable components that can be composed flexibly, rather than relying on a single monolithic identity platform.
And 1 more terms... View all in glossary
Recommended Books
Solving Identity Management in Modern Applications
Yvonne Wilson
Solving Identity Management in Modern Applications
Yvonne Wilson, Abhishek Hingnikar
This book provides a practical guide to identity management for modern applications. It covers the fundamentals of authentication, authorization, OAuth 2.0, OpenID Connect, and SAML 2.0, explaining when and how to use each. The second edition includes updated coverage of passwordless authentication, passkeys, and decentralized identity.
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
This practical guide covers Keycloak from installation to advanced configuration. Learn how to secure applications using OpenID Connect and OAuth 2.0, configure social login, implement fine-grained authorization, manage users and roles, and integrate Keycloak with existing infrastructure.
IAM for Cloud Infrastructure
Marcus Young
IAM for Cloud Infrastructure
Marcus Young
A practical guide to identity and access management across major cloud platforms. Covers AWS IAM, Azure AD (Entra ID), and GCP IAM including policies, roles, service accounts, cross-cloud identity federation, and infrastructure-as-code for IAM.
Practical Cloud Security
Chris Dotson
Practical Cloud Security
Chris Dotson
Practical Cloud Security covers the essential security considerations for cloud deployments including identity management, network security, data protection, logging, and incident response across IaaS, PaaS, and SaaS models.
Securing DevOps
Julien Vehent
Securing DevOps
Julien Vehent
Securing DevOps covers the integration of security practices into CI/CD pipelines and cloud-native infrastructure. Topics include securing the pipeline, infrastructure security, identity management for DevOps, secrets management, and security testing automation.
The CIAM Handbook
Martin Kuppinger
The CIAM Handbook
Martin Kuppinger, Anne Bailey
A comprehensive guide to Customer Identity and Access Management covering user registration, progressive profiling, consent management, social login, identity verification, and the balance between security and user experience in consumer-facing applications.