From ABAC to XML, here are the most common identity management acronyms.
It can be a challenge to keep up with all of the Identity Management acronyms floating around. We’ve compiled 50+ of the most commonly used acronyms along with what they represent. If you’re looking for additional resources, check out our Identity Management Reference Guide: Key Terms and Definitions.
50+ Identity Management Acronyms
Acronym | Expanded Form |
ABAC | Attribute-based Access Control |
AD | Active Directory |
ADAM | Active Directory Application Mode |
ADFS | Active Directory Federation Services |
ADSI | Active Directory Services Interface |
API | Application Programming Interface |
AuthN | Authentication |
AuthZ | Authorization |
Azure AD | Azure Active Directory (Cloud) |
CA | Certificate Authority |
CASB | Cloud Access Security Broker |
CSV | Comma Separated Value (file) |
DB | Database |
DDNS | Dynamic DNS |
DLL | Dynamic Link Library |
DNS | Domain Name System |
ERP | Enterprise Resource Planning |
FIDO2 | Fast Identity Online |
GUID | Global Unique Identifier |
IA | Identity Assurance |
IAM | Identity and Access Management |
IGA | Identity, Governance, and Administration |
IDaaS | Identity as a Service |
IdM | Identity Management |
IdP | Identity Provider |
LDAP | Lightweight Directory Access Protocol |
LDIF | LDAP Directory Interface Format |
MFA | Multi-factor Authentication |
MSP | Managed Service Provider |
MX | Mail eXchanger Record |
OID | Object Identifier |
OAuth | Open Authorization |
OTP | One-Time Password |
PACS | Physical Access Control Systems |
PAM | Privileged Account Management or |
PAP | Policy Administration Point |
PBAC | Policy Based Access Control |
PDP | Policy Decision Point |
PEP | Policy Enforcement Point |
PIM | Privileged Identity Management |
PIP | Policy Information Point |
PIV | Personal Identity Verification |
PKI | Public Key Infrastructure |
PUM | Privileged User Management |
RBAC | Role Based Access Control |
REST | Representational State Transfer |
RFID | Radiofrequency Identification |
RSO | Reduced Sign-On |
SaaS | Software as a Service |
SAM | Security Account Manager |
SAML | Security Assertion Markup Language |
SCIM | Simple Cloud Identity Management |
SDK | Software Development Kit |
SEM | Security Event Management |
SIEM | Security Information Event Management |
SIM | Security Information Management |
SMTP | Simple Mail Transfer Protocol |
SOAP | Simple Object Access Protocol |
SoD | Segregation/Separation of Duties |
SoR | System of Record |
SQL | Structured Query Language |
SSL | Secure Sockets Layer |
SSO | Single Sign-On |
SSPR | Self-Service Password Reset |
STS | Secure Token Service |
TLS | Transport Layer Security |
UI | User Interface |
VDS | Virtual Directory Services |
XML | Extensible Markup Language |
Follow @Idenhaus on Twitter and subscribe to our Identity Management biweekly or our healthcare IT biweekly newsletter.
Idenhaus is honored to be featured in the Top 10 Identity Governance and Administration Consulting/Service Companies of 2019.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us