Glossary of Terms and Abbreviations
While working with PAM360, you will come across some terminologies having unique meanings. It is worthwhile to take a note of those terminologies before proceeding further:
1. Glossary of Terms
Term | Description |
---|---|
Resource |
Denotes the server/application/device whose user accounts and passwords are to be managed by PAM360. |
Resource Group |
Denotes the group to which a particular resource belongs. For example, if you have some Windows XP servers among a number of other windows servers, you can group all the XP servers as one resource group. |
User Account |
Denotes the 'User Account' & 'Password' that are to be managed by PAM360. |
User |
Denotes the PAM360 user accounts created as part of PAM360 User Management. |
User Group |
Group of PAM360 Users. |
Agent |
PAM360 utilizes an agent for establishing connections with the remote resources. |
Password Policy |
See this document. |
Audit |
PAM360 maintains the complete record of every single action performed by the users within the application by using timestamp and IP address. Three types of audit are performed, Resource Audit, User Audit and Task Audit. Read more |
Reports |
PAM360 presents the entire password management process in your enterprise in the form of comprehensive reports. Read more |
ZRLE |
ZRLE stands for Zlib Run-Length Encoding . It is considered to be best for low-bandwidth network environments. |
Raw |
The raw encoding sends width*height pixel values. Raw encoding minimizes processing time and increases connection speed when the server and VNC viewer are on the same machine. |
Tight |
Tight encoding is considered to be the best choice for low-bandwidth network environments such as e.g. slow modem connections. Tight encoding uses zlib library to compress raw pixel data, but it pre-processes data to maximize compression ratios and to minimize CPU usage on compression. JPEG compression may be used to encode color-rich screen areas. |
Hextile |
Hextile encoding is considered to be the best choice for high-speed network environments such as Ethernet local-area networks. |
CopyRect |
Copy Rectangle or CopyRect encoding is useful when data is being moved; the only data sent is the location of a rectangle from which data is to be copied to the current location. |
Request |
The user has to make a request to view the password. |
Waiting for Approval |
User's password release request is pending with administrator(s) for approval. |
Check Out |
Administrator has approved the request and the user can view the password. |
Approve/Reject |
Administrator can either approve or reject the password request. |
Yet to Use |
Indicates that the user is yet to view the password released by the administrator. |
In Use |
Password is being used exclusively by a user. |
Check In |
Giving up/revoking password access. |
2. Abbreviations
Abbreviation | Expansion |
---|---|
AD |
Active Directory |
LDAP |
Lightweight Directory Access Protocol |
RADIUS |
Remote Authentication Dial-In User Service |
SSO |
Single Sign-On |
SAML |
Security Assertion Markup Language |
TFA |
Two Factor Authentication |
MFA |
Multi-Factor Authentication |
ADFS |
Active Directory Federation Services |
RSA |
Rivest-Shamir-Adleman |
SSH |
Secure Shell |
SSL |
Secure Socket Layer |
CLI |
Computing Command-line Interface |
CI/CD |
Continuous integration and Continuous Delivery |
DevOps |
Development and Operations |
IIS |
Internet Information Server |
FQDN |
Fully Qualified Domain Name |
HA |
High Availability |
CA |
Certificate Authority |
RDP |
Remote Desktop Protocol |
HSM |
Hardware Security Module |
PCIe |
Peripheral Component Interconnect Express |
PKI |
Public Key Infrastructure |