Glossary

ARP
Address Resolution Protocol - protocol used for mapping Internet layer addresses (IP addresses) to the physical - link layer addresses (MAC addresses).
DNS
Domain Name Server - name server service which maps IP addresses to hosts names which are easier to remember.
SSH
Secure Shell - networking protocol for secure communication with remote systems.
Syslog
Events logging standard in computer systems. Syslog server collects and stores log data from networked devices, which can be later used for analysis and reporting.
Fingerprint
Characters string being a result of a hash function on input data, allowing to determine if the input data has been altered.
RDP
Remote Desktop Protocol - remote access protocol to computer systems running Microsoft operating system.
VNC
Remote access protocol to graphical user interfaces.
RADIUS
Remote Authentication Dial In User Service - networking protocol used to control access to different services within IT infrastructure.
Static password
Basic user authorization method which uses login and password combination to determine users’s identity.
Public key
Authentication method which uses a pair of keys - private (held only by the user) and public (publicly available) to determine user’s identity.
CERB
Complete user authentication and authorization solution, supporting different authentication methods i.e., mobile token (mobile phone application), static password, SMS one-time passwords, etc.
LDAP
Lightweight Directory Access Protocol - distributed catalog services management and access protocol in IP networks.
Active Directory
Users authorization and authentication in Windows domain.
AD
Active Directory - users authorization and authentication in Windows domain.
CIDR
Short notation of network addressing, in which the IP address is written according to the IPv4 standard, and the subnet mask is provided as a number of 1 in the subnet mask in binary system (192.168.1.1 - 255.255.255.0; 192.168.1.1/24).
heartbeat
Network packet used for informing other cluster nodes about machine’s current state. If a cluster node does not receive a heartbeat packet in a given timeframe, it will take over the master node role and will start processing users’ requests.
anonymous safe
An anonymous safe has at least one anonymous account assigned to it and it can only have that type of accounts assigned. You cannot assign users to anonymous safes.
AAPM
AAPM (Application to Application Password Manager) module enables secure password exchange between applications.
Efficiency Analyzer
Efficiency Analyzer module delivers statistical information on users’ activity.
PSM (Privileged Session Management)
PSM module is used for recording remote access sessions.
server
servers
Server is a definition of the IT infrastructure resource, which can be accessed over one of the specified protocols.
listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its specifics.
user
User defines a subject entitled to connect to servers within monitored IT infrastructure. Detailed object definition (i.e. unique login and domain combination, full name, email address etc.) enables precise accountability of user actions when login and password are substituted with a shared account login credentials.
account
accounts
Account defines the privileged account existing on the monitored server. It specifies the actual login credentials, user authentication mode: anonymous (without user authentication), regular (with login credentials substitution) or forward (with login and password forwarding); password changing policy as well as the password changer itself.
safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features, policies and other details concerning users and servers relations.
hot-swap
Hot-swap mechanism enables replacing hardware components without the necessity to turn the system off.
time policy
Time policy mechanism enables defining time periods during which users are allowed to connect to monitored hosts.
password changer
Tool which enables facilitating automated password changing on a server.
policy
Mechanism which enables defining patterns which in case of being detected will trigger defined actions.
shared session
User session which was joined by another user.
fudopv
AAPM module script, installed on the server, which enables secure password exchange between applications.
SSH access
Service access to Fudo PAM over SSH protocol.
VLAN
Virtual networks mechanism, enabling separation of broadcast domains.
DHCP
Mechanism for dynamic IP addressing management i LAN networks.
timestamp
Session data hash value, which enables verifying that the data has not been modified.
external authentication server
Server storing user data used for verification of user login credentials when connecting to Fudo PAM or the monitored server.
passwords repository
Passwords repository manages password to privileged accounts on monitored hosts.
data retention
Data retention mechanism automatically deletes session data after define time period transpires.
OATH
Open Authentication - open standard enabling implementation of strong, two-factor user and devices authentication.
redundancy group
Defined group of IP addresses, which in case of a system failure, will be seamlessly carried over to another cluster node to maintain the availability of the services.
RDP connections broker
Remote sessions management mechanism for server farms.
PSM
PSM (Privileged Session Monitoring) module enables monitoring and recording remote access sessions.
WWN
World Wide Name - unique object identifier in external storage solutions.
OCR
Optical Character Recognition - image processing for identifying and indexing text.