Skip to main content
Identity Glssary
We've put together a glossary of identity terms for newcomers and seasoned developers, alike. Hopefully this helps put any identity terminology confusion to rest.
Auth
App
Workspace
Provider
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Access Token
A credential utilized by an application to gain access to an API, serving as an authorization indicator that confirms the bearer's permission to interact with the API and execute particular actions.
To know more, see Access Token
Actions
Actions serve as a pivotal means for customizing and expanding capabilities within a system by implementing bespoke logic tailored to specific needs and requirements. This empowers users to fine-tune the functionality and behavior of the system.
To know more, see Actions
Application
This the central hub for managing and customizing your verification services. It serves as the cornerstone of your interaction with the ezto auth platform, offering a range of features and settings to ensure a seamless and secure verification experience.
To know more, see Application
Activity
It encompasses a wide range of actions, operations, and interactions. These activities play a vital role in the management and oversight of verification processes, guaranteeing their smooth execution, security, and alignment with your specified requirements.
To know more, see Activity
App ID
This is a unique identifier generated for an application to distinguish it from others. It serves as a means to reference and manage the application within a system or platform.
To know more, see App ID
App Secret
An App Secret is a confidential and integral piece of information employed to authenticate and ensure security within an application. Its primary purpose lies in verifying the application's identity during interactions with external services or APIs, and it is safeguarded as a precautionary measure to thwart unauthorized access.
To know more, see App Secret
Audit
This serves as a comprehensive record(logs) of all actions executed within the dashboard , offering detailed information to empower organizations to operate with greater effectiveness and responsibility, facilitating continuous improvement.
To know more, see Audit
Admin
A Workspace Admin in ezto auth ,refers to the primary account creator and the individuals designated as co-administrators within the workspace. During the initial setup of a Workspace, users are given the opportunity to appoint co-administrators.
To know more, see Admin
Account Usage
Account Usage section provides users with detailed insights into their usage metrics. This section offers information regarding the utilization of various services, Emails , SMS ,and WhatsApp ,within the ezto auth platform.
To know more, see Account Usage
Account Status
Account Status, encompasses a comprehensive collection of information and metrics regarding various aspects of an account's usage and performance. This includes details related to WhatsApp usage, transaction statistics, email activity, and SMS.
To know more, see Account Status
Anomaly Detection
It is a data analysis technique that involves identifying uncommon or a typical occurrences within a dataset that largely consists of typical or expected data points. This method is employed to pinpoint rare or unusual events or patterns within ezto auth ,which can be crucial for tasks such as problem detection and fraud prevention.
To know more, see Anomaly Detection
Admin Logs
Admin Logs are dedicated record or log page that tracks and displays all actions associated with administrators. These logs provide detailed information, including the timestamp (TIME), the type of action (TYPE), the user responsible for the action (USER), and the type of resource or element affected by the action (RESOURCE TYPE).
To know more, see Admin Logs
Bruteforce Detection
This is a crucial cybersecurity mechanism designed to monitor login attempts and detect indications of brute force attacks. These attacks involve adversaries attempting numerous password guesses systematically or attacks that occur from a single IP address and target a single user account.
To know more, see Bruteforce Detection
Branding
The process of tailoring the visual identity and user interface of the ezto auth platform to align with an organization's branding preferences and user expectations. By customizing ezto auth resources, organizations can create a consistent and recognizable user experience that instills confidence among users, emphasizing the platform's reputation as a secure and reputable service provider.
To know more, see Branding
Custom Domain
The capability of personalizing your Workspace URL by replacing the default domain name with a custom and user-defined domain name.
To know more, see Custom Domain
Claims
An attribute contained within a security token represents a statement or assertion made by the issuer of the token regarding a specific entity. This field is available in all ezto auth templates.
To know more, see Claims
Docs
Docs refers to a set of written materials and resources that provide comprehensive information, specifications, and instructions about our product, process, and service.
To know more, see Docs
Default
Refers as a predefined or standard setting, state, or value that is automatically applied when no specific alternative or user-defined choice is made. In various contexts, default settings serve as a starting point or a fallback option when a user or system does not provide explicit instructions or preferences.
Email Provider
Feature or component within an application or system that is specifically designed to facilitate the integration of various email service providers. Its primary purpose is to manage and streamline the process of sending and receiving email notifications by enabling communication via email.
To know more, see Email Provider
IDP
An Identity Provider (IDP) serves as a reliable online service or system tasked with the authentication and validation of users or entities, granting them secure access to a variety of applications, services, or resources.
Keys
Keys, in the realm of information security, are cryptographic components used to secure digital communication, protect data, verify identities, and uphold the core principles of information security: confidentiality, integrity, and authenticity. Keys are instrumental in encryption and decryption processes, serving as secret codes or parameters that govern how data is transformed into a secure format and back to its original state.
To know more, see Keys
Logs
Logs are chronological records or entries that capture specific events, activities, or transactions within a computer system, network, application, or device. Logs are essential for monitoring, troubleshooting, auditing, and security analysis, providing a historical record of system behavior and user interactions.
To know more, see Logs
Policy
A policy refers to a predefined set of guidelines, rules, or conditions that dictate how transactions are processed, monitored, or controlled within a system or application. These policies can encompass various aspects, such as metadata handling, historical IP changes, IP blacklisting, webhook notifications, and IP range restrictions, among others.
To know more, see Policy
Rotate Secret
It is a security practice in which the confidential authentication key or secret key used by an application is periodically changed or updated.
To know more, see Rotate Secret
Security Defense
A comprehensive set of protective measures, strategies, and mechanisms implemented within an information technology environment to safeguard against unauthorized access, cyber threats, and vulnerabilities.
To know more, see Security Defense
Subscription Plan
A payment arrangement where users are required to pay a recurring fee to access and utilize the services and features offered by ezto auth .
To know more, see Subscription Plan
SMS Provider
An SMS Provider is a specialized service or platform that offers the capability to send, receive, and manage Short Message Service (SMS) messages, commonly known as text messages, over a telecommunications network.
To know more, see SMS Provider
Workspace
The ezto auth Workspace / Dashboard is where you manage all aspects of your ezto auth subscription and configuration.
To know more, see Workspace
Workspace Setting
It refers to a collection of configurable options and parameters within a worksapce. These settings allow users, administrators, or workspace owners to customize and manage various aspects of the workspace's functionality and behavior. Workspace settings often include components such as subscription settings, general settings, workspace admin settings, and workspace attributes.
To know more, see Workspace Setting