Attack Surface
An attack surface in permissions management refers to the sum total of all potential vulnerabilities that an unauthorized entity could exploit to gain access to a system or data.
Managing identities and permissions for your databases is made easier with native, custom identity provider connections because they leverage your existing identity provider to simplify authentication and managing permissions. It does this by making it possible to share identity metadata to your database from your identity provider. These connections serve as a robust login system, enabling the retrieval of user identity information from an organization’s own Database (referred to as a legacy identity store) for the purpose of user authentication. This process begins by integrating the database with an Identity Provider (IDP), establishing an interface that facilitates communication between the IDP and the Database.
A
C
G
I
J
L
M
O
P
R
S
T
V
Z