Glossary

Please select from the menu above


  • is the more advanced version of the self-service functionalities offered in Identify*Admin

  • Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of […]
  • ADFS
    Active Directory Federation Services (ADFS) is a software component developed by Microsoft that can be installed on Windows Server operating systems to provide users with single sign-on access to systems and applications located across organizational boundaries.
  • Application pools
    Application pools are used to separate sets of IIS worker processes that share the same configuration and application boundaries. Application pools are used to isolate a web application for better security, reliability, and availability and performance and to keep it […]
  • Authentication Connection
    Authentication Connection specifies an authentication method that can be used to get access to a Relying Party
  • captcha
    a program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites.
  • CAPTCHA
    A CAPTCHA (an acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”) is a type of challenge-response test used in computing to determine whether or not the user is human.
  • Claim
    A Claim is a statement that one subject makes about itself or another subject. The statement can be about a name, identity, key, group, privilege, or capability, for example. Claims are issued by a provider, and they are given one […]
  • Claim Transformation
    Claim Transformations are steps in the Claim Pipeline that transform the claim set attached to a token
  • Claim Transformations
    Claim Transformations are steps in the Claim Pipeline that transform the claim set attached to a token
  • Claim type
    The type of statement in the claim that is made. Examples of claim types include First Name and Role
  • Claims
    Claim is a statement that one subject makes about itself or another subject. The statement can be about a name, identity, key, group, privilege, or capability, for example. Claims are issued by a provider, and they are given one or […]
  • Claims set
    Claims set is basically just a way to tie together a number of claims.
  • CPR Number
    CPR – Centrale Person Register number consists of ten digits. The first six digits are your date of birth, and the last four are your unique identification number. The last digit of your CPR number indicates your sex. If it is […]
  • CRUD
    Create, read, update and delete (CRUD) (Sometimes called SCRUD with an “S” for Search) are the four basic functions of persistent storage.
  • discrete claim
    A discrete claim is a multi- or single-select field with predefined options
  • DLL
    A dynamic link library (DLL) is a collection of small programs, any of which can be called when needed by a larger program that is running in the computer.
  • DoS
    Denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
  • DTD
    A document type definition is a set of markup declarations that define a document type for an SGML-family markup language (SGML, XML, HTML).
  • EntityID
    An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IdP) or a Service Provider (SP)
  • FedAuth
    FedAuth Cookie is what is used with Claims Authentication. SharePoint STS will issue the FedAuth Cookie which contains the references to the claims token. Claim tokens are actually stored separately.
  • FedAuth cookie
    FedAuth Cookie is what is used with Claims Authentication. SharePoint STS will issue the FedAuth Cookie which contains the references to the claims token. Claim tokens are actually stored separately.
  • free claim
    A free claim is a free text field without any predefined value.
  • Globeteam
    Globeteam is a consultancy firm with a high level of professionalism, growth and many satisfied clients.
  • Identity Provider
    An Identity Provider is an entity that issues identities to other entities through issuing identity tokens.
  • IdP
    An Identity Provider (IdP) is an entity that issues identities to other entities through issuing identity tokens.
  • IIS
    Internet Information Services is an extensible web server created by Microsoft for use with Windows NT family
  • LDAP
    The Lightweight Directory Access Protocol (LDAP) is a directory service protocol that runs on a layer above the TCP/IP stack. It provides a mechanism used to connect to, search, and modify Internet directories.
  • LDAP-WS
    LDAP Web Service is a Web Service that authenticates and peforms searches against Active Directory.
  • Microsoft SQL Server
    Microsoft SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data.
  • MMC
    Microsoft Management Console (MMC) is an application that developers use to write tools (called snap-ins) for administering Windows-based environments.
  • MongoDB
    MongoDB is a cross-platform document-oriented database. Classified as a NoSQL database.
  • MSDTC
    The Distributed Transaction Coordinator (MSDTC) service is a component of modern versions of Microsoft Windows that is responsible for coordinating transactions that span multiple resource managers, such as databases, message queues, and file systems.
  • MSSQL
    Microsoft SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data
  • MSSQLServer
    Microsoft SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications which may run either on […]
  • MVC
    MVC is one of three ASP.NET programming models. MVC is a framework for building web applications using a MVC (Model View Controller) design.
  • NemID
    NemID (literally: EasyID) is a common log-in solution for Danish Internet banks, government websites and some private companies.
  • NLB
    NLB uses a distributed algorithm to load balance network traffic across a number of hosts, helping to enhance the scalability and availability of mission critical, IP-based services, such as Web, Virtual Private Networking, streaming media, terminal services, proxy and so on
  • OAuth
    OAuth is an open standard for authorization. OAuth provides client applications a ‘secure delegated access’ to server resources on behalf of a resource owner. It specifies a process for resource owners to authorize third-party access to their server resources without […]
  • OCES
    The Danish public standard for electronic services. OCES has been formed in order to create a type of certificates that are easier and faster to issue than the qualified certificates.
  • OIOSAML
    OIOSAML is an implementation of SAML 2.0 compliant Service Provider for various platform. Generic version of OIOSAML is developed as a part of a Danish eGovernment project.
  • OTP
    A one–time password (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device.
  • Protocol Connection
    Protocol Connection specifies Requestors that will be allowed to use Identify*Runtime as Identity Provider; typically Relying Party that need Authentication via Identity*Runtime.
  • RelayState
    RelayState is a parameter of the SAML protocol that is used to identify the specific resource the user will access after they are signed in and directed to the relying party’s federation server
  • Relying Party
    Relying Party (RP), also known as Service Provider or Destination Site, is Entities Entity that requests and receives tokens from Identity Providers.
  • RP
    Relying Party (RP), also known as Service Provider or Destination Site, is Entities Entity that requests and receives tokens from Identity Providers.
  • Safewhere*Identify
    Identify is a new kind of user identification and administration service, providing externalized and seamless authentication and authorization across organizations.
  • SAML
    “Security Assertion Markup Language 2.0 is a version of the SAML standard for exchanging authentication and authorization data between security domains.”. In short, SAML is used to define the tokens.
  • SAML
    Security Assertion Markup Language 2.0 is a version of the SAML standard for exchanging authentication and authorization data between security domains. In short, SAML is used to define the tokens.
  • SAML2WIF
    a Service Provider Demo website that is created when installing SAML 2.0 for WIF Service Provider Framework
  • SCIM
    The Smart Common Input Method platform (SCIM) is an input method platform supports more than thirty languages for POSIX-style operating systems including Linux and BSD.
  • SMTP
    Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321 – which is the protocol […]
  • SOAP
    SOAP, originally an acronym for Simple Object Access protocol, is a protocol specification for exchanging structured information in the implementation of web services in computer networks.
  • SP
    Service Provider (SP), also known as Replying Party or Destination Site, is Entities Entity that requests and receives tokens from Identity Providers.
  • SSL
    SSL provides a secure connection between internet browsers and websites, allowing you to transmit private data online.
  • STORK
    Secure idenTity acrOss boRders linKed (STORK) establishes interoperability of different approaches at national and EU level, eID for persons, eID for legal entities and the facility to mandate.
  • STS
    A Security Token Service (STS) is a software based identity provider responsible for issuing security tokens, especially software tokens, as part of a claims-based identity system.
  • test glossary term
    test etset tes test set est set est estes set test etset tes test set est set est estes set test etset tes test set est set est estes set test etset tes test set est set est estes set. […]
  • Two-factor authentication
    Two-factor authentication (also known as 2FA) provides unambiguous identification of users by means of the combination of two different components.
  • WAYF
    WAYF is connecting institutions with external services used by the institutions’ users.
  • WIF
    Windows Identity Foundation (WIF) is a Microsoft software framework for building identity-aware applications. It provides APIs for building ASP.NET or WCF based security token services as well as tools for building claims-aware and federation capable applications.
  • WS-Federation
    WS-Federation (Web Services Federation) is an Identity Federation specification, developed by BEA Systems, BMC Software, CA Inc., IBM, Layer 7 Technologies, Microsoft, Novell, and VeriSign.
  • WS-Trust
    WS-Trust is a WS-* specification and OASIS standard that provides extensions to WS-Security, specifically dealing with the issuing, renewing, and validating of security tokens
  • WSFed
    WS-Federation (Web Services Federation) is an Identity Federation specification, developed by BEA Systems, BMC Software, CA Inc., IBM, Layer 7 Technologies, Microsoft, Novell, and VeriSign.
  • XSS
    Cross-site scripting is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into Web pages viewed by other users
  • YubiKey
    A YubiKey is a small hardware device that offers two-factor authentication with a simple touch of a button.