Identity Provider (IdP)

An Identity Provider (IdP) is tasked with verifying users’ identities and communicating with the service provider to log them in so they can access more resources with fewer logins. An IdP creates, maintains, and manages identity information for Users in your Organization. It delivers authentication capabilities to reliant applications, such as the Banyan Command Center.

There are several IdPs in today’s market: Okta, Google Identity, OneLogin, Azure Active Directory, Duo Access Gateway, and Ping Identity are a few popular ones. IdPs use the SAML protocol to express that the IdP authenticated a user.

Related Terms

Access Tier

An Access Tier is an identity-aware proxy and gateway that mediates access into a private network segment within ...

Advanced Persistent Threat (APT)

An Advanced Persistent Threat (APT) is a targeted and prolonged cyber attack by skilled attackers who gain ...

Anti-Phishing

Techniques and mechanisms implemented in SWGs to detect and block phishing attacks, which attempt to deceive users ...

API

Application Programming Interface, a set of protocols and tools that allows different software applications to ...

API Attack Surface

The set of all endpoints and functions exposed by an application programming interface (API) that could be ...

APT35

Overview: APT35, also known as Charming Kitten, Newscaster, or Mint Sandstorm, conducts long-term, ...

APT39

Overview: APT39, also known as Chafer, surveils individuals and entities considered to be a threat to Iranian ...

APT41

Overview: APT41, also known as Brass Typhoon. Espionage targeting healthcare, telecoms, and the high-tech sector, ...

Aquatic Panda

Overview: Aquatic Panda collects intelligence and conducts industrial espionage. Suspected Attribution: ...

Attack Surface

The total sum of all potential points or areas in a system, network, or application that are susceptible to ...

Attack Surface Analysis

The process of evaluating and understanding the various entry points and potential weaknesses in a system or ...

Attack Surface Reduction

Strategies and practices aimed at minimizing the overall attack surface by eliminating unnecessary services, ...