Saviynt Glossary of Terms, Abbreviations, and Acronyms

Some general terms, abbreviations, and acronyms that might be relevant to a cybersecurity or identity and access management context, which are areas that Saviynt specializes in

  1. Identity and Access Management (IAM): The framework of policies, processes, and technologies used to manage and secure digital identities and their access to resources.
  2. Role-Based Access Control (RBAC): A method of regulating access to systems and resources based on the roles individuals have in an organization.
  3. Least Privilege: The principle of providing users with only the minimum permissions necessary to perform their tasks, reducing the risk of unauthorized access.
  4. Privileged Access Management (PAM): The practice of managing and securing access to privileged accounts and ensuring only authorized users can perform administrative tasks.
  5. Multi-Factor Authentication (MFA): A security process that requires users to provide multiple forms of verification before gaining access to a system or resource.
  6. Identity Governance and Administration (IGA): The process of managing digital identities and controlling their access to resources while ensuring compliance with policies.
  7. Entitlement: A specific permission or access right granted to a user or role within an organization’s systems.
  8. User Provisioning: The process of creating, managing, and updating user accounts and their access rights to various resources.
  9. Access Certification: The process of regularly reviewing and verifying user access rights to ensure they are appropriate and compliant.

Abbreviations and Acronyms:

  1. IAM: Identity and Access Management
  2. RBAC: Role-Based Access Control
  3. PAM: Privileged Access Management
  4. MFA: Multi-Factor Authentication
  5. IGA: Identity Governance and Administration
  6. LDAP: Lightweight Directory Access Protocol
  7. SSO: Single Sign-On
  8. API: Application Programming Interface
  9. AD: Active Directory
  10. SAML: Security Assertion Markup Language
  11. PCI DSS: Payment Card Industry Data Security Standard
  12. GDPR: General Data Protection Regulation
EIC :Enterprise Identity Cloud
SAV Roles :Roles defined to manage the Saviynt application and are default available with specified access, create or edit rights.

Users Import :Are imported from HRMS applications that are available as flat files or from a live connection
Username, Email, System Username :Is automatically generated for every user record that is imported, according to a predefined rule. Also, data is loaded for custom attributes of User Schema.
Onboarding Applications:Relates to defining connectivity and application metadata create rules (user account correlation, account name rules) and importing the required data (accounts, entitlements, access).
Entitlement:Entitlement refers to the abstract representation of privilege within a system or application. Entitlements are usually associated with accounts in account repositories.
Delegate User:Allocating or transferring tasks to the other user. For example, the user can assign the task to another user within the organization or group to work on. The delegatee is granted with the edit rights and can execute the task.
Orphan Accounts:An orphaned user account refers to the active accounts still lying in the accounts identity database which do not have any user associated with the account.
Zero-day provisioning:The zero day provisioning flag is defined in user imports. This flag allows you to enable and allow access to minimal basic endpoint applications the day an employee joins an organization.
Runtime Analytics: The analytics scheduled, will be fetched from the DB in real time, while the application is running and displayed in the form of graphical representation, based on the condition or key word set.
Custom Analytics Control: The analytics can also be customized based on user requirements, the data to be analyzed can be provided as input and all the relevant matches will be fetched from the DB and displayed in the form of graphical representation
Mitigating Control:Controls that can be implemented to mitigate the risk posed by a user violating a SOD or critical access rule.

Get Quote