Glossary
This page contains the commonly used terms in
A · B · C · D · E · F · G · H · I · J · K · L · M · N · O · P · Q · R · S · T · U · V · W
A
Concept | Description |
---|---|
Access | The ability to use a system, application, or data resource. Access is typically controlled through security settings that determine who can view, modify, or manage information. |
Access Request | A formal request by an internal or external user to gain permission to use a system, application, or resource. Access requests often go through an approval process managed by System Administrators. |
Access Schedule | A set of rules that define the dates and times when a user or a user group is allowed to access a system or application. Access schedules are often used to limit access for security reasons. |
Active Directory (AD) | A Microsoft directory service used to manage users, computers, and other resources in a network. AD provides authentication and authorization, ensuring that only approved users can access systems. |
Activity Log | A record of events and actions taken within a system, such as logins, file changes, or administrative updates. Activity logs are used for monitoring, troubleshooting, and security auditing. |
Admin Console | The Graphic User Interface (GUI) for the |
Administrator | A user with elevated privileges who manages systems, applications, or networks. Administrators control access, configure settings, and ensure security policies are enforced. |
API | Application Programming Interface. A set of rules that allow different software programs to communicate with each other. APIs let developers integrate systems or extend functionality. |
API Key | A unique code used to identify and authenticate an application or user when interacting with an API. API keys help protect systems from unauthorized access. |
Application | A software program designed to perform specific functions for a user or system. Applications can run on computers, mobile devices, or cloud environments. |
Application (PAS) | A Gateway or Gatekeeper system that holds a collection of services on various hosts and ports. |
Archiving | The process of securely storing data or records for long-term retention. Archiving ensures information is preserved but not necessarily kept in active use. |
Asset | Any valuable item within a system, such as data, software, infrastructure, platforms, and applications. Assets are tracked and protected to maintain security and compliance. |
Audit | A formal review of system activities, records, or settings to verify accuracy, compliance, and security. Audits help identify issues and confirm that policies are being followed. |
Auditability | The ability of a system to provide reliable records of activities and events. Auditability ensures that actions can be traced back to users or processes for accountability. |
Authentication | The process of verifying a user’s identity before granting access to a system or resource. Common authentication methods include passwords, badges, and biometric scans. |
Authorization | The process of determining what a user is allowed to do in a system. Authorization defines the specific resources and actions available to each user. |
B
Concept | Description |
---|---|
Backup | A copy of data stored separately from the original, used for recovery in case of loss or failure. Backups are essential for disaster recovery and business continuity. |
Bandwidth | The amount of data that can be transmitted over a network in a given time period. Higher bandwidth allows faster communication and more simultaneous usage. |
Best Practices | Established methods or guidelines that are widely accepted as the most effective way to achieve a desired outcome. |
Browser | A software program used to access websites and online applications, for example: Chrome, Safari, Edge, and Firefox. |
Browser-Based Sessions | A type of session that enables the secure connection of a vendor's remote support agent to a target customer's environment through a web browser. |
Built-In Service | The services that comes included with a Gatekeeper application by default. |
C
Concept | Description |
---|---|
Certificate | A digital file that proves the identity of a user, system, or organization. Certificates are often used to enable secure connections over the internet. |
Certificate Installer | The component that enables users to install digital certificates during a session. |
Component | An individual part of a larger system or application. |
Configuration | The arrangement of settings that define how a system, application, or device operates. |
Connection Manager | The component that leverages the connections between a user and the target device's assets, while also managing the available services in a Gatekeeper. |
Connectivity | The ability of systems, devices, or applications to communicate with each other over a network. |
Containerized Network | A feature that uses a virtual interface to connect a service without using a limited loopback interface. |
CPAM | Customer Privileged Access Management, an Imprivata application for third-party access. |
CPAM Server |
The virtual or on-premise appliance that manages the CPAM application and its components |
CPU | Central Processing Unit, the main chip in a virtual or physical computer that performs calculations and runs instructions. |
Credential | Information, such as a username and password, used to prove a user’s identity when accessing a system. Credentials may also include digital certificates or biometric data. |
Credential Pool | A shared collection of user credentials that can be assigned dynamically to individuals or systems. |
Cryptographic | Relating to methods of securing information through encryption, hashing, or digital signatures. |
Custom Service | Services where users can define the host and port to access the remote assets. |
Customer | An individual or organization that uses a product or service. |
D
Concept | Description |
---|---|
Dashboard | The feature in |
Data | Information stored, processed, or transmitted by a system. Data can be structured, like numbers in a database, or unstructured, like text and images. |
Debug and Diagnostics | The feature in |
Degraded Performance | A state where a Gatekeeper is still running but with non-optimal resources. |
Department | A division within an organization responsible for specific functions. A feature in the server to mimic organizations for easier access and security. |
Desktop Sharing | A feature that allows one user to share their computer screen with others. |
Disk Space | The amount of digital storage available on a device or server. |
Distribution List | An email group that forwards messages to multiple recipients. |
Domain | A unique name that identifies a network, organization, or website. For example: @imprivata.com |
E
Concept | Description |
---|---|
A method of sending and receiving electronic messages over the internet. | |
Encryption | The process of converting information into a coded format to prevent unauthorized access. |
F
Concept | Description |
---|---|
Fail Over Instance | A backup Gateway Instance that automatically takes over if the main one fails. |
Feature | A specific function or capability within a product or service. |
File Transfer Protocol (FTP) | The built-in service for transferring files between two systems during a session. |
Firewall | A security system that monitors and controls network traffic based on rules. |
Flagging | Marking an item, event, or activity for attention or review. |
G
Concept | Description |
---|---|
Gatekeeper | The component with built-in services that enables the connection between a user and a target computer's assets. |
Gateway | The component that enables the traffic control and access between a user and a customer's applications and Gatekeepers. |
Global Configuration | The settings that apply to the entire |
H
Concept | Description |
---|---|
Hardware | The physical components of a computer or device, such as processors, memory, and hard drives. |
Host | A computer, server, or device connected to a network that provides services or resources. Each host is identified by a unique network address. |
Host Alias | An alternate name assigned to a host for easier identification. Host aliases simplify system management and access. |
Host Name Mapping | The process of linking hostnames to IP addresses. Host name mapping ensures that devices and applications can locate and communicate with each other. |
Hostname | The unique name assigned to a device on a network. Hostnames make it easier to identify devices instead of using numerical IP addresses. |
HTML5 Client | A web-based client application that runs in a browser using HTML5 technology. See Browser-Based Sessions. |
HTTP(S) | Hypertext Transfer Protocol (HTTP) and its secure version HTTPS are methods for transferring data between a browser and a web server. HTTPS adds encryption for security. |
I
Concept | Description |
---|---|
Identity Provider (IdP) | A service that manages and verifies user identities for authentication. |
InfoSec | Information Security, this refers to practices and policies that protect data from unauthorized access, use, or destruction. |
Infrastructure | The underlying systems and resources, such as servers, networks, and storage, that support applications and services. Infrastructure can be on-premises or in the cloud. |
Installation Wizard | A step-by-step tool that guides users through installing software. |
Instance | A single running copy of a software program, server, or virtual machine. |
Interactions | The ways users or systems communicate and exchange information. |
Internal Access Policy | A policy rule that forces an Internal User to raise an access request before granting them access to an application. |
IP Address | A unique numerical label assigned to a device on a network. |
IT | Information Technology, which refers to the use and management of computers, networks, and systems. |
J
Concept | Description |
---|---|
Java | A widely used programming language and platform. Java is known for its ability to run on many different devices and operating systems. |
K
Concept | Description |
---|---|
Key | A piece of information, often cryptographic, used to lock or unlock access to data or systems. |
L
Concept | Description |
---|---|
LAN | Local Area Network (LAN), a network that connects computers and devices within a small geographic area. |
Latency | The delay between sending and receiving data over a network. |
Lightweight Directory Access Protocol (LDAP) | A standard method for accessing and managing directory information, such as user accounts. |
Linux | An open-source operating system widely used on servers, devices, and embedded systems. |
Log In | The action of entering credentials, such as a username and password, to access a system. |
Log Out | The action of ending a session and disconnecting from a system. |
Logging | The process of recording system events, activities, or errors. |
M
Concept | Description |
---|---|
MacOS | Apple’s operating system for desktop and laptop computers. |
Maintenance | Routine activities performed to keep systems running smoothly, such as updates, patches, or hardware checks. |
Module | A self-contained component within a system or application that provides a specific function. |
Monitoring | The continuous observation of systems, networks, or applications to detect issues or changes. |
Multi-Factor Authentication (MFA) | A security method requiring two or more ways to verify a user’s identity, such as a password plus a fingerprint. |
N
Concept |
Description |
---|---|
Network | A collection of connected devices, such as computers and servers, that share information. |
Notification | An alert or message that informs users of events, changes, or required actions. Notifications can appear on-screen, via email, or through applications. |
O
Concept | Description |
---|---|
OpenSSH | An open-source tool for secure communication between computers over a network. |
Operating System (OS) | Software that manages a computer’s hardware and applications, for example: Windows, macOS, and Linux. |
P
Concept | Description |
---|---|
Password | A secret string of characters used to verify identity when logging in. |
Password Rotation | The practice of regularly changing passwords to reduce the risk of compromise. |
Permission | A setting that determines what a role is allowed to do within a system. |
Platform | The underlying environment that supports applications and services. |
Plugin | A small software add-on that extends the functionality of an application. |
Pooled Instance | A shared instance of a Gateway Application that can be used by multiple users as needed. |
Port | A virtual endpoint through which data enters or leaves a computer over a network. Ports are numbered and used by applications to communicate securely. |
Privileged Access | Special access rights given to administrators or other trusted users. |
Protocol | A set of rules that define how data is transmitted and understood between systems. Common protocols include HTTP, FTP, and SSH. |
Proxy | A server that acts as an intermediary between a user and another system. |
Pruning | The process of cleaning up or removing unnecessary data, accounts, or records. |
Q
Concept | Description |
---|---|
Quick Connect | A feature in |
R
Concept | Description |
---|---|
RAM | Random Access Memory (RAM), the temporary computer memory used to store data. |
RedHat | A commercial Linux distribution widely used in enterprise environments. |
Registration Code | A unique code used to activate or verify the Gatekeeper installation. |
Remote Connection | The access to a system or computer through the Gatekeeper software. |
Remote Desktop Protocol (RDP) | The built-in services that allows internal users to control a remote computer through a graphical interface. |
Remote Support | The process of assisting users by connecting to their devices from a different location. |
Report | A structured summary of system data, events, or activities. |
Requirements | Conditions or capabilities needed for a system or application to function. |
S
Concept | Description |
---|---|
Safety | Measures and practices designed to protect people and systems from harm. |
SAML | Security Assertion Markup Language,a standard that allows secure exchange of authentication information between systems. |
Secrets | Sensitive information, such as passwords, keys, or tokens, that must be kept secure. |
Secure Connection | A network connection protected by encryption, such as HTTPS or VPN. |
Secure Support | A method of providing technical support through encrypted and authenticated connections. |
Security Department | The organizational unit responsible for protecting systems, data, and networks. |
Server | A computer or system that provides services, resources, or data to other devices on a network. |
Server Settings | Configuration options that determine how the server operates. |
Server URL | The web address used to reach the |
Server Version | The release number of a |
Service | A built-in or custom process or application in the server. |
Session | A period of connection between a user and a target system and its assets. |
Single-Use Key | A key that can be used only once to authenticate or unlock access. |
Software | Programs and applications that run on computers or devices. |
SSH | Secure Shell (SSH), a protocol for securely accessing and managing remote systems. |
SSH Key Pair | A pair of cryptographic keys (public and private) used with SSH for secure authentication. |
SSO | A security method that allows users to log in once with a single set of credentials and gain access to multiple applications or systems. |
Status | The current condition or state of a system, service, or process. |
Support Agent | A person who provides technical help to users. |
SUSE | A commercial Linux distribution widely used in enterprise environments. |
System | A collection of hardware, software, and processes working together. |
System Administrator | A person responsible for managing and maintaining a system. |
T
Concept | Description |
---|---|
Target System | The specific computer, server, or device being accessed, managed, or monitored. |
Task | A specific action or job carried out by a system, application, or user. |
TELNET | A network protocol that allows remote communication with another computer. |
Traffic | The flow of data across a network. The flow of users in a server. |
Troubleshooting | The process of diagnosing and resolving problems in systems or applications. |
Tunneling | A method of securely sending data through a network by encapsulating it inside another protocol. |
U
Concept | Description |
---|---|
Ubuntu | A commercial Linux distribution widely used in enterprise environments. |
Unix | A family of operating systems that form the basis of Linux and macOS. |
Upgrade | The process of installing a newer version of software or hardware. |
URL | Uniform Resource Locator (URL) is the web address used to access resources on the internet. |
User | A person who interacts with a system, application, or service. |
User ID | A unique identifier assigned to a user within a system. |
User Interface | The part of a system that users interact with, such as menus, buttons, and screens. |
User Role | A defined set of permissions assigned to a user. |
V
Concept | Description |
---|---|
Vault | A secure storage system for sensitive data, such as passwords, certificates, or secrets. |
Vendor | A company that provides products or services to customers. |
Vendor Representative (Vendor Rep) | An individual who works on behalf of a vendor to provide products, services, or support. |
Virtual Appliance | A preconfigured virtual machine image that provides a specific service or application. |
VPAM | Vendor Privileged Access Management, an Imprivata application for third-party access. |
VPAM Server | The virtual or on-premise appliance that manages the VPAM application and its components |
W
Concept | Description |
---|---|
Web Application | A software application that runs in a web browser instead of being installed on a computer. |
Web Application Firewall (WAF) | A security system that filters and monitors traffic to and from web applications. |
Web Browser | A software program used to access websites and online applications, for example: Chrome, Safari, Edge, and Firefox. |
Web-Based Client | An application accessed through a web browser instead of a local installation. |
Windows | Microsoft’s widely used operating system for desktops, laptops, and servers. |
Wizard | A step-by-step tool that guides users through a process, such as installing software or configuring settings. |
Wrapper | A program or code layer that allows one system or application to work with another. |