Glossary
Table: Terms and Definitions
| Term | Definition |
|---|---|
| Access Explorer | A Platform UI page (Inventory > Access Explorer) that displays visual representations of the relationships between identities, assets, and access policies, based on the filters and sources selected. You can use the Access Explorer to find out how an identity gains access to an asset, which identities have access to an asset, or when access or membership was granted. |
| Active Directory (AD) | Active Directory (AD) is a proprietary directory service developed by Microsoft® to manage the authentication and authorization of users and machines on a Windows domain network. Active Directory runs on Windows Server and stores information related to user accounts, computer objects, groups, policies, and other entities on the network. |
| Active Directory (AD) Connector | The AD Connector enables secure communication between the Platform, Active Directories, and various services within your internal network. For enhanced reliability and efficiency, it is recommended to deploy multiple Connectors to enable failover capabilities and load distribution. |
| AD | See Active Directory (AD) |
| Agent | An agent is software installed on a computer that can act autonomously to achieve goals set by humans. An agent has self-governing attributes and capabilities in reasoning, learning, adaptability, decision-making, policy-following, and execution. |
| Attribute (ILM) | In Platform ILM, an Attribute is a property of a Business Object (ILM). Attributes typically contain metadata including data type and validation rules. Although the terms attribute and field are sometimes used interchangeably, an attribute is a backend entity that may or may not be represented in the UI as a field. Attribute is more frequently used by people working directly with code and the data, such as developers and data architects, and others working with APIs and integrations. See Field (ILM). |
| Audit | A record of actions that are typically user initiated but may also include some system actions. An audit is designed for consumption by users - mainly security overseers like SecOps and CISOs. |
| Audit Collector Workload | A workload run by the Platform Engine that enables Privilege Control for Servers (on the Delinea Platform) to receive audit data about events and actions during session recording captured by the privilege control agent deployed on audited computers. More than one Platform Engine and Audit Collector workload can be deployed for greater resilience and/or scale. Minimum requirement: two Audit Collector workloads to ensure uninterrupted auditing. |
| Authentication | Authentication is a way for a user to prove that they are still the person they claimed to be during the identification phase by inputting something a person knows, such as a password or security question; something a person has, such as a token, smart card, ID card, or cryptographic key; or something a person "is," using biometric data such as a fingerprint or facial scan. |
| Authentication Challenge | A mechanism on the Delinea Platform to challenge a user attempting to log in. Examples include password, phone call, email confirmation code, and security questions. |
| Authentication Profile | On the Delinea Platform, an authentication profile specifies the authentication challenges required to log in to the Platform and the length of time that must elapse before a user is prompted for authentication again. |
| Authorization | Authorization is the process of verifying what specific applications, files, and data a user has access to. |
| Birthright User Type (ILM) | In |
| Business Object (ILM) | In |
| Catalog (ILM) | In |
| CID | See Continuous Identity Discovery (CID) |
| CIEM | See Cloud Infrastructure Entitlement Management (CIEM) |
| Cloud Infrastructure Entitlement Management (CIEM) | Cloud Infrastructure Entitlement Management (CIEM) is a security approach for controlling access rights to cloud resources. CIEM solutions identify all existing privileges across cloud and multi-cloud environments, then identify privileges that are higher than they should be, such as privileges that are stale and no longer needed to help reduce the risk of unauthorized access. |
| cloudadmin | A local Delinea Platform “break-glass” account that is created for you. It follows the format cloudadmin@your_platform_tenant_name. cloudadmin is the first account you need to perform initial Platform provisioning, login, upgrade, and setup tasks. |
| Collection (ILM) | In |
| Collection (Platform Inventory) | On the platform, a collection is an inventory query that is saved for future reuse. A collection can also be used to build custom dashboards, detection rules, and scheduled reports. All collections on the Platform are automatically updated daily and can also be updated on demand. |
| Command Relay Workload | A workload run by the Platform Engine that enables Privilege Control for Servers to send commands and parameters through an SSH connection for execution on a customer’s servers. The Command Relay workload depends on a service account that can modify the Active Directory domain to update policies. |
| Continuous Identity Discovery (CID) | Continuous Identity Discovery (CID) extends the discovery capability of Secret Server Cloud on the Delinea Platform to cover cloud identities, including privileged accounts, service accounts, admins, and shadow admins. |
| Data Type (ILM) | In |
| Default Granted User Type (ILM) | In |
| Default Not Granted User Type (ILM) | In |
| Delinea Expert | A secure AI chatbot that answers questions about the Platform features, components, or best practices, and provides links to support its answers. Delinea Expert cannot access your data or see which Platform page you are on. Delinea Expert can sometimes make mistakes — always check important information. If an answer seems inaccurate, please click the Flag icon to alert us. |
| Distributed Engine | An engine used by Secret Server on Platform, Secret Server Cloud, and Secret Server On-Premises to take actions in the customer environment and update secrets. In the future, Secret Server on Platform will use only the Platform Engine for these actions. |
| Dynamic Collection (ILM) | In |
| Engine Management | A Platform UI page (Settings > Engine Management) where admins manage Platform Engines, the Sites where the engines are deployed, and the Workloads that the engines run. |
| Engine Site | A group of engines selected on a common principle, e.g. network or subnet, or geographical location (office, city, etc.), or data center, or any other characteristics that the IT personnel finds appropriate. Workload settings are organized at the Engine Site level. |
| Engine Workload | A background service managed and deployed by us, provisioned and run by Platform Engines, and configured by administrators in Engine Management. Engine Workloads include Audit Collector, Command Relay, PRA, and ITP for Active Directory. Workloads are updated automatically by the Engine when a new version of the workload is available. Other independent Engines (such as Distributed Engine) or Connectors will be converted over time into workloads to be downloaded and provisioned by the Platform Engine as necessary. |
| Entitlement (ILM) | In |
| Field (ILM) |
In |
| Form (ILM) | In |
| Identity (ILM) | In |
| Identity Lifecycle Management (ILM) | Identity Lifecycle Management (ILM) assigns identities (Joiner, Mover, Leaver) to employees, contractors, or equipment to ensure secure and appropriate access throughout the identities' lifecycle in an organization. |
| Identity Threat Protection (ITP) | Identity Threat Protection solutions safeguard identities and the systems they access by detecting and preventing identity-based threats like malicious insiders, account takeovers, and privilege escalations. |
| ILM | See Identity Lifecycle Management (ILM) |
| Joiner (ILM) | In |
| Leaver (ILM) | In |
| Log | A record of background events typically related to systems, performance, outages, etc. A log is typically consumed by IT/Ops to help them ensure that things are running optimally and delivered according to the appropriate SLA. |
| Marketplace | The Delinea Platform Marketplace is an integration ecosystem for shared services where you can find applications, scripts, utilities, and other software that you can use with the Delinea Platform. By default, the Admin User role has access to Marketplace and they can control Marketplace access permissions for users. |
| MFA | See Multi-Factor Authentication (MFA) |
| MFA for Secrets | Multi-factor Authentication (MFA) for secrets gives Delinea Platform administrators the option to add one or more security requirements to access specified secrets. This functionality is available exclusively through the Platform and supports many types of MFA, such as email, the Credential Manager (mobile) App, YubiKey, and other devices using the FIDO2 protocol. |
| Mover (ILM) | In |
| Multi-Factor Authentication (MFA) | Multi-factor Authentication (MFA) adds an extra layer of security by requiring users to prove their identity using two or more different factors, such as something they know (like a password), something they have (like a phone or security token), or something they are (like a fingerprint or facial scan). Even if a password is compromised, MFA can prevent unauthorized access because the attacker would still need to obtain the additional verification methods. |
| PCCE | See Privilege Control for Cloud Entitlements (PCCE) |
| PCS | See Privilege Control for Servers (PCS) |
| Platform Admin | A Delinea Platform role with extensive permissions that is automatically assigned to all members of the System Administrator group. |
| Platform Engine | Software installed on servers in a network segment (a Site) that enables the Delinea Platform to perform various actions on that network via Workloads, such as discovery, remote access, authentication, or session recording collection. The Platform Engine acts as a single installer that will dynamically deploy the workloads as needed. For redundancy and high availability, admins can deploy two or more Platform Engines per site. |
| PRA | See Privileged Remote Access (PRA) |
| Privilege Control for Cloud Entitlements (PCCE) | Privilege Control for Cloud Entitlements (PCCE) discovers privileged identities across complex multi-cloud environments, identities and fixes identity misconfigurations and enforces the principle of Least Privilege access. |
| Privilege Control for Servers (PCS) | Privilege Control for Servers (PCS) carries the PAM capabilities of the Delinea Platform into the individual servers and computer endpoints in your corporate network. |
| Privileged Remote Access (PRA) | Privileged Remote Access (PRA) enables secure remote access to computers that is audited and session recorded. Formerly Remote Access Service (RAS). |
| RBAC | See Role-Based Access Control (RBAC) |
| Resilient Secrets | A feature of Secret Server on Platform, Secret Server Cloud, and Secret Server On-Premises that duplicates all secrets and configurations from one Secret Server (the source) to a backup store (the replica). The feature is officially called Resilient Secrets, but the UI says Disaster Recovery. |
| Resource (ILM) | In |
| Role (ILM) | In |
| Role-Based Access Control (RBAC) | Role-Based Access Control (RBAC) is the process of mapping access permissions to organizational roles, essentially to define what an individual is allowed to have access to if they have a particular role or roles within the organization. RBAC is important when designing an IGA implementation, as it enables you to make sense of all the varied access requirements across the organization and prevent access from being a ‘free for all’. |
| SCIM | See System for Cross-Domain Identity Management (SCIM) |
| Secret | Information that is stored and managed in the Secret Server vault. Typical secrets include privileged passwords on routers, servers, applications, and devices. Files can also be stored in secrets, such as private key files, SSL certificates, license keys, network documentation, Microsoft Word or Excel documents, and more. Secrets are derived from secret templates. |
| Secret Server | The Delinea Platform secrets vault. Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud, and Secret Server On-Premises for distinctions. |
| Secret Server Cloud | Secret Server Cloud is the Platform secrets vault deployed from the cloud. Customers who purchased Secret Server Cloud before November 2023 must perform upgrade procedures to manage Secret Server as a fully integrated component of the Delinea Platform. See Secret Server on Platform and Secret Server On-Premises for comparisons. |
| Secret Server On-Premises | Secret Server On-Premises is the Platform secrets vault installed on a customer server (instead of the cloud). Secret Server On-Premises can be connected to the Delinea Platform as a limited integration to enable customers to launch PRA from a secret. It does not enable any other Secret Server functionality from the Delinea Platform. See Secret Server Cloud and Secret Server on Platform for comparisons. |
| System Administrator | Platform users who belong to the System Administrator group inherit the Platform Admin role, with extensive administrative permissions. The System Administrator group cannot be renamed or deleted. Compare to cloudadmin. |
| System for Cross-Domain Identity Management (SCIM) | System for Cross-Domain Identity Management (SCIM) is an open standard that automates the exchange of user identity information between systems. It's used to manage user accounts and access to cloud-based applications. |
| Task (ILM) | In |
| Identity Type (ILM) | In |
| Identity Type Access Model (ILM) | In |
| View (ILM) | In |