
Glossary
Identity security used to mean protecting employee accounts. That's no longer the whole picture.
AI agents, non-human identities, and automated pipelines now authenticate, pull data, and make decisions around the clock often with the same privileges as a senior employee. The security models built for human users weren't designed for this.
This glossary covers the key terms shaping that shift from agentic AI to identity observability written for security teams who need more than definitions. As identity becomes the primary control plane for modern infrastructure, a shared vocabulary isn't a nice-to-have. It's how you start seeing risk before it becomes a problem.
Access Certification
Governance
Category:
Access Governance
Governance
Category:
Access Review
Governance
Category:
Access Token Security
Credential Security
Category:
Account Takeover Detection
ITDR
Category:
Active Directory Security
Identity Infrastructure
Category:
Adaptive Authentication
Authentication
Category:
Agentic AI Identity Security
AI Identity Security
Category:
Agentic AI Security
AI Security
Category:
Agentic AI Security Posture Management (AI-SPM)
AI Security
Category:
AI Agent Access Analytics
Analytics
Category:
AI Agent Access Control
Access Control
Category:
AI Agent Access Governance
Governance
Category:
AI Agent Access Monitoring
Monitoring
Category:
AI Agent Access Path Analysis
Risk Analysis
Category:
AI Agent Activity Monitoring
Monitoring
Category:
AI Agent Authorization
Authorization
Category:
AI Agent Credential Lifecycle
Credential Security
Category:
AI Agent Credential Security
Credential Security
Category:
AI Agent Discovery
Discovery
Category:
AI Agent Execution Monitoring
Monitoring
Category:
AI Agent Governance
AI Security
Category:
AI Agent Identity Governance
Governance
Category:
AI Agent Identity Management
Identity Management
Category:
AI Agent Identity Risk
Risk
Category:
AI Agent Identity Security
AI Identity Security
Category:
AI Agent Identity Visibility
Visibility
Category:
AI Agent Observability
Observability
Category:
AI Agent Privilege Management
Privilege Management
Category:
AI Agent Risk Management
Risk
Category:
AI Agent Runtime Security
AI Security
Category:
AI Agent Security
AI Security
Category:
AI Agent Shadow Access
AI Security
Category:
API Token Security
Credential Security
Category:
Attribute-Based Access Control (ABAC)
Access Control
Category:
Authentication
Authentication
Category:
Authorization
Authorization
Category:
Autonomous AI Security
AI Security
Category:
Credential Abuse Detection
ITDR
Category:
Credential Leakage
Threat
Category:
Credential Rotation
Credential Security
Category:
Federated Identity
Identity Infrastructure
Category:
Identity Access Analytics
Analytics
Category:
Identity Activity Monitoring
Monitoring
Category:
Identity and Access Management (IAM)
Identity Management
Category:
Identity Attack Path Analysis
ITDR
Category:
Identity Attack Surface Management
Attack Surface
Category:
Identity Behavior Analytics
Analytics
Category:
Identity Blast Radius
Risk
Category:
Identity Compromise Detection
ITDR
Category:
Identity Control Plane
IAM
Category:
Identity Federation
Identity Infrastructure
Category:
Identity Governance and Administration (IGA)
Identity Management
Category:
Identity Graph
Observability
Category:
Identity Lifecycle Management
IAM
Category:
Identity Observability
Observability
Category:
Identity Provider (IdP)
Identity Infrastructure
Category:
Identity Risk Exposure
Risk
Category:
Identity Security
Identity Security
Category:
Identity Security Control Plane
IAM
Category:
Identity Security Posture Management (ISPM)
Identity Security
Category:
Identity Telemetry
Observability
Category:
Identity Threat Detection
ITDR
Category:
Identity Threat Detection and Response (ITDR)
Identity Security
Category:
Identity Visibility
Visibility
Category:
Identity Visibility and Intelligence Platforms (IVIP)
Visibility
Category:
Identity-Centric Security
Security Framework
Category:
Least Privilege Access
Privilege Management
Category:
Machine Identity
Identity Type
Category:
Machine Identity Security
Identity Security
Category:
MFA Bypass
Threat
Category:
MFA Fatigue Attack
Threat
Category:
MFA Governance
Governance
Category:
MFA Security
Authentication
Category:
Multi-Factor Authentication (MFA)
Authentication
Category:
NHI Access Monitoring
Monitoring
Category:
NHI Discovery
Discovery
Category:
NHI Governance
Governance
Category:
NHI Inventory
Discovery
Category:
NHI Posture Management
Posture
Category:
NHI Privilege Management
Privilege Management
Category:
NHI Risk Management
Risk
Category:
NHI Security
Identity Security
Category:
NHI Threat Detection
Threat Detection
Category:
NHI Visibility
Visibility
Category:
Non-Human Identity (NHI)
Identity Type
Category:
OAuth Security
Authentication
Category:
OAuth Token Security
Credential Security
Category:
Privilege Escalation Detection
ITDR
Category:
Privileged Access Management (PAM)
Access Control
Category:
Privileged Session Management
PAM
Category:
Role-Based Access Control (RBAC)
Access Control
Category:
SAML Authentication
Authentication
Category:
Secret Exposure Detection
Threat Detection
Category:
Secrets Management
Credential Security
Category:
Service Account Security
Identity Security
Category:
Unified Identity Security
Identity Security
Category:
Workload Identity
Identity Type
Category:
Workload Identity Security
Identity Security
Category:
Zero Trust Identity
Security Framework
Category:
