Search the Knowledge Base

Quick answers to your questions from Identacor's Support Team

Identacor Terminology


Your account with Identacor.

Administrator (or Admin)

The person responsible for the complete management of the Identacor platform and associated services. The administrator defines guidelines for installation and system maintenance. He/she is a member of the Super Admin Group in Identacor.

Application Portal

The Application Portal is the place where all corporate and personalized applications (apps) can be accessed.  The page represents a user's central control panel for single sign-on access and lists the applications that a user can access based on assignment by the Identacor administrator.  All applications on the Identacor Application Portal can be accessed with a single click.


Activity Log

The place where all system-generated log entries or system activities are archived. The permanent Activity Log allows you to monitor activities that run/occur within Identacor.


Image-Based Authentication

Provides out-of-band, two-factor authentication that empowers users to use secure, image-based validation. The authentication creates a one-time password, where upon login, the user is prompted to recognize which picture or image fits his/her chosen secret authentication categories.



An interface implemented by an application that allows other applications to communicate with it. Identacor’s RESTful API enables customers and integrators to manage users and groups programmatically in Identacor.


A piece of data produced by a Security Assertion Markup Language (SAML) authority that is an act of authentication performed on an App, attributes information about the app, or authorizes data that applies to the app with respect to a user or specified user group. The SAML assertion in Identacor is a message that identifies the user to the service provider (app) he/she accesses.

Application (App)

A program, or group of programs, designed to benefit the end user. Identacor users can configure multiple apps for corporate or personal use.


A changeable property or characteristic of an entity in a program that can be set to different values. Application attributes describe items for potential end-users. To implement customized access, Identacor administrators can configure attributes for an app.


The process operating systems use to detect and record security-related events. For Identacor, Auditing helps system administrators keep a record of user authorization and access information to ensure compliance with the organization-wide security policy.

Audit Trail

The record of activities that help Identacor administrators oversee and examine a given sequence of authorization events for a user or user groups.


The process that validates an end-user’s authorization details for an app connected to the Identacor Application Portal or as designated by the Identacor administrator. In general, it validates the user.

Authentication Context

Describes the context in which an Identacor user provides credentials. Authentication context is different for different environments. Example:  In the Identacor portal, if a user provides authentication credentials via a desktop workstation (internal to the network); the context is different than the same credentials provided via a smartphone.


A user is allowed access based on the user’s level of privileges and permissions. An Identacor administrator defines different levels of authorization for different apps based on application usage or hierarchy within the organization.

Authorization Context

Contains the additional information needed by the Identacor decision engine to determine the validity of the policy. Environmental variables (time of day or day of the week), access request location (internal network or external network), end-user IP address, and other information defined by the administrator comprise the authorization context.

Cloud Computing (the Cloud)

Distributed computing over a network where an app may run on several connected devices at the same time. It relies on sharing resources instead of local servers to handle applications. Identacor Identity and Access Management (IAM) solution ensures that the resource sharing or application access is secure.


The secure data, such as application ID, password, or permission bits, etc., that indicates whether the Identacor user has permission to access an app or a service.


This tool in Identacor provides essential insight into user behavior and application usage. You can monitor run-time metrics, active applications, groups, and recent activity logs. In addition, it allows you to add new applications or users, review security settings, and apply branding to customize the look and feel of the Identacor portal.


The process of removing a user’s access to an app in the Identacor Portal. Only administrators can provision or de-provision a user.


The transformation of data into a form that is unreadable by anyone without a secret decryption key. To ensure privacy, information is kept hidden from anyone for whom it is not intended, including those who can see the encrypted data. Identacor takes encryption to an upper level with its secure identity and access management solution.


A mix of applications and software that are integrated to work together. Identacor provides users seamless authentication across different applications and resources with a single, federated login.

Form-Based Authentication

A technique used to automate the login process for Identacor users. The form-based authentication mechanism injects user credentials into the form and submits them to the application.


A collection of users. Identacor allows administrators to create groups based on job description, department, hierarchy, or organizational role, etc., to streamline user management. The idea is to assign multiple rights to the group, instead of assigning rights/authentication multiple times to each user that belongs to the group.

Identity Provider (IDP)

Asserts identity to others. The IDP, such as the cloud-based provider Identacor, validates user authentication and assigns a password or token so that cloud-based apps can be accessed through a single sign-on (SSO).

IDP-Initiated SSO (Unsolicited Web SSO)

The federation process that allows Identacor to send an unsolicited SAML response to the service provider via a browser.


The set of attributes associated with a person or entity over the Web. Identacor, with its secure Identity and Access Management (IAM), strives to protect online identities to prevent unauthorized access or information theft.

Identity and Access Management (IAM)

Policies, practices, and infrastructure related to establishing, maintaining, and using digital identities. Identacor IAM solutions are focused on providing individuals and enterprise users the flexibility to access diverse applications with a single login in a secure environment.


An object (a string of data) or a unique attribute mapped to an Identacor user or application (app) that uniquely refers to the user or app.


Authentication protocol that works based on “tickets” to allow users to communicate over a non-secure network so as to prove his/her identity to an app in a secure way. It relies on a trusted entity, such as Identacor, to perform the authentication of users.


Defines a user's credentials for an app. Identacor secures application logins and enables a single sign-on for a multitude of applications.


Information about data or other items.

One-Time Password

A password that can only be used once. The advantage of one-time passwords is that even if an eavesdropper gets hold of it, it cannot be used again.

Persistent Login

Improves the end-user’s experience. It enables users to access applications using the Identacor portal; after the user is logged in, Identacor secures access details. When the end-user accesses the app again, using the same device, Identacor allows automatic login with no required credentials.


A personal identification (ID) number used during the authentication process. Identacor uses a PIN to recognize specific users and delivers to the user select authorization to an app or resource.



Policy governs how users should interact with the Identacor portal and applications. It is an overall plan, principle, or guideline for improved and secure user access throughout the organization.


The process of pushing access management information to Identacor, which provides users with appropriate access to enterprise or personalized apps.

Secure Auto-Login

Secure Auto-Login enables Single Sign On (SSO) into all cloud and web applications.  Identacor’s Secure Auto-Login provides a secure way to access those applications that don’t support a single sign-on protocol like SAML or WS-Federation. Identacor stores the passwords securely on the server side and injects them into an application’s login page during sign-on.

Security Assertion Markup Language (SAML)

A standard specified by the OASIS Security Services Technical Committee (SSTC). It is the core of the Identity and Access Management (IAM) solution offered by Identacor. It allows secure exchange and interpretation of commands between Identacor and the service provider, application.


A lasting interaction between Identacor users and applications (apps). It records the duration of the interaction.

Single Sign-On (SSO)

The functionality that enables Identacor users to access protected applications (apps) without being asked for credentials a second time. It saves users from the hassle of remembering multiple passwords.

Service Provider (SP)

The service that a user wants to access (enterprise or personal apps). Applications integrated to the Identacor Application Catalog are referred to as services because they provide a type of service to the end-user.

SP-Initiated SSO

As the first step in the federation process, the application generates an authentication request to the Identacor app portal, and then Identacor returns a SAML-response based on the query.

Tile Link

This icon appears on an end user's Identacor application portal and represents each application the user wants to access through Identacor. The user can immediately sign in and be authenticated for a selected application by clicking the tile link.




An object that provides credentials for the purpose of authentication. In Identacor, a token is a message that contains user identification details.

User Assignment

The assignment of enterprise profiles to Identacor users. Through assignment of enterprise profiles, users inherent associated application roles.

User Lifecycle

The process where a user account is created, managed, and removed in the Identacor application platform when a user leaves an enterprise.

User Management

The process of creating, managing, and removing user accounts from the Identacor application portal, as needed.

User Self-Service

The ability for Identacor users to manage a part of his/her enterprise profile. It includes user contact info, address, and password reset.

User or End User

The person who uses the Identacor IAM solution to secure their enterprise application usage.

User Status

Status indicates what a user can or cannot manage in an Identacor account. An Identacor account may have one of the following statuses:  Active, Pending Activation, Deactivated, Locked Out, or Password Reset.

User Type

Identacor has two different types of users:  (1) Regular users and (2) Admins.

Have more questions? Submit a request


Powered by Zendesk