The Corma Glossary
The key expressions being used inside Corma so you are always sure what is going on in and around Corma.
The key expressions being used inside Corma so you are always sure what is going on in and around Corma. We try to have our terms as easy to understand and as comprehensible as possible but sometimes it gets a bit technical.
Shadow IT
Unauthorised software used by employees
Identity Provider
A system responsible for securely storing user credentials and verifying user identities, often facilitating access to multiple applications via SSO
SSO
An authentication method allowing users to access multiple independent applications with one set of login credentials, managed by an identity provider (IdP)
SCIM
An open standard protocol that automates the provisioning, management, and deprovisioning of user identities and groups across cloud-based applications using RESTful APIs
API
A defined set of protocols and endpoints enabling software components or systems to interact, exchange data, and execute functions programmatically
Last updated