Core ConceptsGlossaryGlossaryThis glossary provides definitions for common terms used throughout the authentik documentation. Views:A-ZTagsABCDEFGIJLNOPRSTUVWAAccess TokenBearer token used to access protected APIs.▶ Show detailsAssertion Consumer Service (ACS)Service Provider endpoint that receives SAML assertions.▶ Show detailsApplicationAn application is what you authenticate into with authentik, and they are displayed on the "My applications" page on the User interface.▶ Show detailsAudience (aud)Intended recipient of a token.▶ Show detailsAuthorization codeShort-lived code exchanged for tokens.▶ Show detailsAuthorization endpointEndpoint where users authenticate and consent.▶ Show detailsAuthorization Server (AS)OAuth2 role that issues tokens and hosts authorization endpoints.▶ Show detailsBBack-channel logoutServer-to-server logout notification.▶ Show detailsBack-channelDirect server-to-server communication.▶ Show detailsBlueprintsDeclarative files to template and reconcile authentik config.▶ Show detailsBrandPer-domain settings for UI, default flows, and behavior.▶ Show detailsBase DNRoot DN (Distinguished Name) under which LDAP searches occur.▶ Show detailsBind DNAccount DN (Distinguished Name) used to authenticate to LDAP.▶ Show detailsCClaimA piece of information about a subject.▶ Show detailsDDynamic in-memory stageEphemeral stage appended at runtime; exists only in memory.▶ Show detailsDistinguished Name (DN)Unique path identifying an entry in LDAP.▶ Show detailsEEntity IDUnique identifier for an IdP or Service Provider.▶ Show detailsFFlowAn ordered sequence of stages.▶ Show detailsFront-channel logoutLogout via browser redirects or iframes.▶ Show detailsFront-channelBrowser-mediated communication via the user's agent.▶ Show detailsGGrant typeOAuth2 mechanism for obtaining tokens.▶ Show detailsIID tokenOIDC token describing the authenticated user.▶ Show detailsIdentity Provider (IdP)Authority that authenticates users and issues assertions/tokens.▶ Show detailsIdP-initiated SSOSSO flow started at the Identity Provider.▶ Show detailsIntrospection endpointEndpoint to validate opaque tokens.▶ Show detailsIssuer (iss)Entity that issued the token.▶ Show detailsJJWKJSON representation of a cryptographic key.▶ Show detailsJWKSJSON Web Key Set used to verify JWTs.▶ Show detailsJWTCompact, signed JSON token format.▶ Show detailsLLDAP search filterExpression selecting entries to return.▶ Show detailsLDAPLightweight Directory Access Protocol for directory services.▶ Show detailsNNameIDPrimary identifier for a user in SAML.▶ Show detailsNotification rulePolicy-filtered event triggers that send notifications via transports.▶ Show detailsNetwork Access Server (NAS)Device that sends RADIUS requests to the server.▶ Show detailsOObjectClassSchema class that defines required/allowed attributes.▶ Show detailsOIDC discovery documentProvider metadata at the well-known URL.▶ Show detailsOpenID Provider (OP)OIDC authority that authenticates users and issues tokens.▶ Show detailsOutpostSeparate component providing services like reverse proxying, deployable anywhere.▶ Show detailsPPasskeyDiscoverable FIDO2 credential, often synced across devices for passwordless login.▶ Show detailsPKCEProof Key for Code Exchange hardens the code flow.▶ Show detailsPolicyA yes/no gate evaluated by type and settings.▶ Show detailsProperty mappingsDefine how data is exposed to apps and stored from sources.▶ Show detailsProviderA way for other applications to authenticate against authentik.▶ Show detailsRRADIUS auth methodsPAP, CHAP, MS‑CHAPv2, and EAP methods.▶ Show detailsRADIUS messagesAccess‑Request/Accept/Reject and Accounting messages.▶ Show detailsRADIUS shared secretPre‑shared key between NAS and RADIUS server.▶ Show detailsRADIUSRemote Authentication Dial-In User Service protocol.▶ Show detailsRedirect URICallback URL the provider redirects to.▶ Show detailsRefresh tokenLong-lived credential to obtain new access tokens.▶ Show detailsRelying Party (RP)OIDC client that relies on the OP for identity.▶ Show detailsResponse typeOAuth/OIDC response expected from the authorization endpoint.▶ Show detailsRevocation endpointEndpoint to invalidate access or refresh tokens.▶ Show detailsSSAML assertionSAML statement with authentication and attribute data.▶ Show detailsSAML bindingTransport mechanism for SAML messages.▶ Show detailsSCIM endpoints (Users,Groups)RESTful endpoints for provisioning operations.▶ Show detailsSCIM externalIdClient-supplied stable identifier for correlation.▶ Show detailsSCIM provisioning lifecycleCreate, update, deactivate, and delete user records.▶ Show detailsSCIM PATCHStandardized partial update operation.▶ Show detailsSCIM resourceTyped object like User or Group managed via SCIM.▶ Show detailsSCIMSystem for Cross-domain Identity Management.▶ Show detailsScopePermission strings requested by a client.▶ Show detailsService Provider (SP)Application that relies on the IdP to authenticate users.▶ Show detailsSingle Logout (SLO)Terminates sessions across parties in a federation.▶ Show detailsSourceLocation from which users and their attributes can be accessed by authentik.▶ Show detailsSP-initiated SSOSSO flow started at the Service Provider.▶ Show detailsStageA single verification or logic step within a flow.▶ Show detailsSubject (sub)Unique identifier of the token's principal.▶ Show detailsSystem tasksLonger-running background tasks in authentik.▶ Show detailsTToken endpointExchanges codes or credentials for tokens.▶ Show detailsUUserInfo endpointOIDC endpoint returning user claims.▶ Show detailsVVendor‑Specific Attribute (VSA)Attribute namespace for vendor extensions.▶ Show detailsWWebAuthnW3C standard for phishing‑resistant authentication with FIDO2 authenticators.▶ Show details
Assertion Consumer Service (ACS)Service Provider endpoint that receives SAML assertions.▶ Show details
ApplicationAn application is what you authenticate into with authentik, and they are displayed on the "My applications" page on the User interface.▶ Show details
Authorization Server (AS)OAuth2 role that issues tokens and hosts authorization endpoints.▶ Show details
Identity Provider (IdP)Authority that authenticates users and issues assertions/tokens.▶ Show details
Notification rulePolicy-filtered event triggers that send notifications via transports.▶ Show details
OutpostSeparate component providing services like reverse proxying, deployable anywhere.▶ Show details
PasskeyDiscoverable FIDO2 credential, often synced across devices for passwordless login.▶ Show details