Glossary

This page contains the commonly used terms in Customer Privileged Access Management.

A · B · C · D · E · F · G · H · I · J · K · L · M · N · O · P · Q · R · S · T · U · V · W

A

Concept Description
Access The ability to use a system, application, or data resource. Access is typically controlled through security settings that determine who can view, modify, or manage information.
Access Request A formal request by an internal or external user to gain permission to use a system, application, or resource. Access requests often go through an approval process managed by System Administrators.
Access Schedule A set of rules that define the dates and times when a user or a user group is allowed to access a system or application. Access schedules are often used to limit access for security reasons.
Active Directory (AD) A Microsoft directory service used to manage users, computers, and other resources in a network. AD provides authentication and authorization, ensuring that only approved users can access systems.
Activity Log A record of events and actions taken within a system, such as logins, file changes, or administrative updates. Activity logs are used for monitoring, troubleshooting, and security auditing.
Admin Console The Graphic User Interface (GUI) for the CPAM server, accessible only to the internal users.
Administrator A user with elevated privileges who manages systems, applications, or networks. Administrators control access, configure settings, and ensure security policies are enforced.
API Application Programming Interface. A set of rules that allow different software programs to communicate with each other. APIs let developers integrate systems or extend functionality.
API Key A unique code used to identify and authenticate an application or user when interacting with an API. API keys help protect systems from unauthorized access.
Application A software program designed to perform specific functions for a user or system. Applications can run on computers, mobile devices, or cloud environments.
Application (PAS) A Gateway or Gatekeeper system that holds a collection of services on various hosts and ports.
Archiving The process of securely storing data or records for long-term retention. Archiving ensures information is preserved but not necessarily kept in active use.
Asset Any valuable item within a system, such as data, software, infrastructure, platforms, and applications. Assets are tracked and protected to maintain security and compliance.
Audit A formal review of system activities, records, or settings to verify accuracy, compliance, and security. Audits help identify issues and confirm that policies are being followed.
Auditability The ability of a system to provide reliable records of activities and events. Auditability ensures that actions can be traced back to users or processes for accountability.
Authentication The process of verifying a user’s identity before granting access to a system or resource. Common authentication methods include passwords, badges, and biometric scans.
Authorization The process of determining what a user is allowed to do in a system. Authorization defines the specific resources and actions available to each user.

B

Concept Description
Backup A copy of data stored separately from the original, used for recovery in case of loss or failure. Backups are essential for disaster recovery and business continuity.
Bandwidth The amount of data that can be transmitted over a network in a given time period. Higher bandwidth allows faster communication and more simultaneous usage.
Best Practices Established methods or guidelines that are widely accepted as the most effective way to achieve a desired outcome.
Browser A software program used to access websites and online applications, for example: Chrome, Safari, Edge, and Firefox.
Browser-Based Sessions A type of session that enables the secure connection of a vendor's remote support agent to a target customer's environment through a web browser.
Built-In Service The services that comes included with a Gatekeeper application by default.

C

Concept Description
Certificate A digital file that proves the identity of a user, system, or organization. Certificates are often used to enable secure connections over the internet.
Certificate Installer The component that enables users to install digital certificates during a session.
Component An individual part of a larger system or application.
Configuration The arrangement of settings that define how a system, application, or device operates.
Connection Manager The component that leverages the connections between a user and the target device's assets, while also managing the available services in a Gatekeeper.
Connectivity The ability of systems, devices, or applications to communicate with each other over a network.
Containerized Network A feature that uses a virtual interface to connect a service without using a limited loopback interface.
CPAM Customer Privileged Access Management, an Imprivata application for third-party access.
CPAM Server

The virtual or on-premise appliance that manages the CPAM application and its components

CPU Central Processing Unit, the main chip in a virtual or physical computer that performs calculations and runs instructions.
Credential Information, such as a username and password, used to prove a user’s identity when accessing a system. Credentials may also include digital certificates or biometric data.
Credential Pool A shared collection of user credentials that can be assigned dynamically to individuals or systems.
Cryptographic Relating to methods of securing information through encryption, hashing, or digital signatures.
Custom Service Services where users can define the host and port to access the remote assets.
Customer An individual or organization that uses a product or service.

D

Concept Description
Dashboard The feature in CPAM that enables users to create custom reports about their server.
Data Information stored, processed, or transmitted by a system. Data can be structured, like numbers in a database, or unstructured, like text and images.
Debug and Diagnostics The feature in CPAM that enables users to dentify and fix errors or issues in the server, and upgrade their server version.
Degraded Performance A state where a Gatekeeper is still running but with non-optimal resources.
Department A division within an organization responsible for specific functions. A feature in the server to mimic organizations for easier access and security.
Desktop Sharing A feature that allows one user to share their computer screen with others.
Disk Space The amount of digital storage available on a device or server.
Distribution List An email group that forwards messages to multiple recipients.
Domain A unique name that identifies a network, organization, or website. For example: @imprivata.com

E

Concept Description
Email A method of sending and receiving electronic messages over the internet.
Encryption The process of converting information into a coded format to prevent unauthorized access.

F

Concept Description
Fail Over Instance A backup Gateway Instance that automatically takes over if the main one fails.
Feature A specific function or capability within a product or service.
File Transfer Protocol (FTP) The built-in service for transferring files between two systems during a session.
Firewall A security system that monitors and controls network traffic based on rules.
Flagging Marking an item, event, or activity for attention or review.

G

Concept Description
Gatekeeper The component with built-in services that enables the connection between a user and a target computer's assets.
Gateway The component that enables the traffic control and access between a user and a customer's applications and Gatekeepers.
Global Configuration The settings that apply to the entire CPAM server.

H

Concept Description
Hardware The physical components of a computer or device, such as processors, memory, and hard drives.
Host A computer, server, or device connected to a network that provides services or resources. Each host is identified by a unique network address.
Host Alias An alternate name assigned to a host for easier identification. Host aliases simplify system management and access.
Host Name Mapping The process of linking hostnames to IP addresses. Host name mapping ensures that devices and applications can locate and communicate with each other.
Hostname The unique name assigned to a device on a network. Hostnames make it easier to identify devices instead of using numerical IP addresses.
HTML5 Client A web-based client application that runs in a browser using HTML5 technology. See Browser-Based Sessions.
HTTP(S) Hypertext Transfer Protocol (HTTP) and its secure version HTTPS are methods for transferring data between a browser and a web server. HTTPS adds encryption for security.

I

Concept Description
Identity Provider (IdP) A service that manages and verifies user identities for authentication.
InfoSec Information Security, this refers to practices and policies that protect data from unauthorized access, use, or destruction.
Infrastructure The underlying systems and resources, such as servers, networks, and storage, that support applications and services. Infrastructure can be on-premises or in the cloud.
Installation Wizard A step-by-step tool that guides users through installing software.
Instance A single running copy of a software program, server, or virtual machine.
Interactions The ways users or systems communicate and exchange information.
Internal Access Policy A policy rule that forces an Internal User to raise an access request before granting them access to an application.
IP Address A unique numerical label assigned to a device on a network.
IT Information Technology, which refers to the use and management of computers, networks, and systems.

J

Concept Description
Java A widely used programming language and platform. Java is known for its ability to run on many different devices and operating systems.

K

Concept Description
Key A piece of information, often cryptographic, used to lock or unlock access to data or systems.

L

Concept Description
LAN Local Area Network (LAN), a network that connects computers and devices within a small geographic area.
Latency The delay between sending and receiving data over a network.
Lightweight Directory Access Protocol (LDAP) A standard method for accessing and managing directory information, such as user accounts.
Linux An open-source operating system widely used on servers, devices, and embedded systems.
Log In The action of entering credentials, such as a username and password, to access a system.
Log Out The action of ending a session and disconnecting from a system.
Logging The process of recording system events, activities, or errors.

M

Concept Description
MacOS Apple’s operating system for desktop and laptop computers.
Maintenance Routine activities performed to keep systems running smoothly, such as updates, patches, or hardware checks.
Module A self-contained component within a system or application that provides a specific function.
Monitoring The continuous observation of systems, networks, or applications to detect issues or changes.
Multi-Factor Authentication (MFA) A security method requiring two or more ways to verify a user’s identity, such as a password plus a fingerprint.

N

Concept

Description

Network A collection of connected devices, such as computers and servers, that share information.
Notification An alert or message that informs users of events, changes, or required actions. Notifications can appear on-screen, via email, or through applications.

O

Concept Description
OpenSSH An open-source tool for secure communication between computers over a network.
Operating System (OS) Software that manages a computer’s hardware and applications, for example: Windows, macOS, and Linux.

P

Concept Description
Password A secret string of characters used to verify identity when logging in.
Password Rotation The practice of regularly changing passwords to reduce the risk of compromise.
Permission A setting that determines what a role is allowed to do within a system.
Platform The underlying environment that supports applications and services.
Plugin A small software add-on that extends the functionality of an application.
Pooled Instance A shared instance of a Gateway Application that can be used by multiple users as needed.
Port A virtual endpoint through which data enters or leaves a computer over a network. Ports are numbered and used by applications to communicate securely.
Privileged Access Special access rights given to administrators or other trusted users.
Protocol A set of rules that define how data is transmitted and understood between systems. Common protocols include HTTP, FTP, and SSH.
Proxy A server that acts as an intermediary between a user and another system.
Pruning The process of cleaning up or removing unnecessary data, accounts, or records.

Q

Concept Description
Quick Connect A feature in CPAM that generates a single-use key to connect to a remote system.

R

Concept Description
RAM Random Access Memory (RAM), the temporary computer memory used to store data.
RedHat A commercial Linux distribution widely used in enterprise environments.
Registration Code A unique code used to activate or verify the Gatekeeper installation.
Remote Connection The access to a system or computer through the Gatekeeper software.
Remote Desktop Protocol (RDP) The built-in services that allows internal users to control a remote computer through a graphical interface.
Remote Support The process of assisting users by connecting to their devices from a different location.
Report A structured summary of system data, events, or activities.
Requirements Conditions or capabilities needed for a system or application to function.

S

Concept Description
Safety Measures and practices designed to protect people and systems from harm.
SAML Security Assertion Markup Language,a standard that allows secure exchange of authentication information between systems.
Secrets Sensitive information, such as passwords, keys, or tokens, that must be kept secure.
Secure Connection A network connection protected by encryption, such as HTTPS or VPN.
Secure Support A method of providing technical support through encrypted and authenticated connections.
Security Department The organizational unit responsible for protecting systems, data, and networks.
Server A computer or system that provides services, resources, or data to other devices on a network.
Server Settings Configuration options that determine how the server operates.
Server URL The web address used to reach the CPAM server.
Server Version The release number of a CPAM server.
Service A built-in or custom process or application in the server.
Session A period of connection between a user and a target system and its assets.
Single-Use Key A key that can be used only once to authenticate or unlock access.
Software Programs and applications that run on computers or devices.
SSH Secure Shell (SSH), a protocol for securely accessing and managing remote systems.
SSH Key Pair A pair of cryptographic keys (public and private) used with SSH for secure authentication.
SSO A security method that allows users to log in once with a single set of credentials and gain access to multiple applications or systems.
Status The current condition or state of a system, service, or process.
Support Agent A person who provides technical help to users.
SUSE A commercial Linux distribution widely used in enterprise environments.
System A collection of hardware, software, and processes working together.
System Administrator A person responsible for managing and maintaining a system.

T

Concept Description
Target System The specific computer, server, or device being accessed, managed, or monitored.
Task A specific action or job carried out by a system, application, or user.
TELNET A network protocol that allows remote communication with another computer.
Traffic The flow of data across a network. The flow of users in a server.
Troubleshooting The process of diagnosing and resolving problems in systems or applications.
Tunneling A method of securely sending data through a network by encapsulating it inside another protocol.

U

Concept Description
Ubuntu A commercial Linux distribution widely used in enterprise environments.
Unix A family of operating systems that form the basis of Linux and macOS.
Upgrade The process of installing a newer version of software or hardware.
URL Uniform Resource Locator (URL) is the web address used to access resources on the internet.
User A person who interacts with a system, application, or service.
User ID A unique identifier assigned to a user within a system.
User Interface The part of a system that users interact with, such as menus, buttons, and screens.
User Role A defined set of permissions assigned to a user.

V

Concept Description
Vault A secure storage system for sensitive data, such as passwords, certificates, or secrets.
Vendor A company that provides products or services to customers.
Vendor Representative (Vendor Rep) An individual who works on behalf of a vendor to provide products, services, or support.
Virtual Appliance A preconfigured virtual machine image that provides a specific service or application.
VPAM Vendor Privileged Access Management, an Imprivata application for third-party access.
VPAM Server The virtual or on-premise appliance that manages the VPAM application and its components

W

Concept Description
Web Application A software application that runs in a web browser instead of being installed on a computer.
Web Application Firewall (WAF) A security system that filters and monitors traffic to and from web applications.
Web Browser A software program used to access websites and online applications, for example: Chrome, Safari, Edge, and Firefox.
Web-Based Client An application accessed through a web browser instead of a local installation.
Windows Microsoft’s widely used operating system for desktops, laptops, and servers.
Wizard A step-by-step tool that guides users through a process, such as installing software or configuring settings.
Wrapper A program or code layer that allows one system or application to work with another.