An identity is the identifier of an entity. (id + entity = identity)

The key is a mathematical entity, while the owner – and the connection between owner and key – are not.

If we generalize an identity is just an identifier (key).


The identity unique key is called a principal


An identity may be:

  • anonymous (we don’t know anything about this person/device yet),
  • or named (we know something about them such as an email address / id )

Discover More
Card Puncher Data Processing
Analytics - User Id (Person identity)

This page is a user identity (id). A person’s identity can be: anonymous (we don’t know anything this person yet), or named (we know something them such as an email address.) The most...
Attack / Abuse / Vulnerability

Most of the attacks try: to steal or to impersonate an identity by using a vulnerablity
Authentication - (Authentication|Identity) Provider

An Authentication Provider implements the authentication method and is also known as an identity provider. The providers implementation differs primarily by: the data store that is request. the methods...
Authentication - Method / Protocol / Scheme

The authentication methods / construct / protocol validates the identity of a user (ie validates who you are). The method is implemented by a (identify|authentication) provider. In the traditional...
How does Single Sign-on (SSO) authentication work?

Single Sign-On (SSO, trusted sign-on) is the ability: to require a user to sign once and gain access to different applications. SSO is also known as: as Trusted sign-on or Multi-Domain Security...
Identification - Impersonation / Proxy

impersonation is when a process or user are taking the identity of another process or user impersonation is also known as proxy. impersonation or proxy is used to: acts as of your were an other...
Data System Architecture
Logical Data Modeling - Global Identifier (Fully Qualified Name, Canonical Form)

A global identifier identify uniquely a primary element (entity or relationship) in the global scope It's also generally known as: the fully qualified id the fully qualified name the canonical...
Data System Architecture
Logical Data Modeling - Id attribute

An id is an label attribute with a numeric representation that identify uniquely an entity or a relationship in a local scope. name If the id attribute is chosen as the local identifier, it will be:...
Public key infrastructure (PKI)

A public key infrastructure (PKI) is the management and database system for: the creation, the signature the storage, the revocation and the distribution of digital certificates and public...
Security - (Identity+Authenticator=Credential)

Credentials are electronic information that is used to verify an identity. They are provided by client application (ie user, browser, application) to prove their identity Credentials are also known as:...

Share this page:
Follow us:
Task Runner