ProficientNowTechRFCs

Appendix A: Glossary

RFC-PAM-0001                                                  Appendix A
Category: Standards Track                                      Glossary

Appendix A: Glossary

← Previous: Evolution | Index | Next: Appendix B →


A.1 Term Definitions

Access Management Terms

Access Broker A system that mediates access between users and target resources. In this architecture, Teleport serves as the access broker for all privileged infrastructure access.

Access Request A formal request for elevated or temporary access. Access requests include requester identity, requested permissions, duration, and justification.

Authorization Ceiling The principle that downstream systems cannot grant permissions exceeding those available from upstream systems. Azure AD group memberships define the ceiling; Keycloak and Teleport can only grant subsets.

Certificate-Based Authentication Authentication using cryptographically signed certificates instead of passwords or static keys. Certificates contain identity claims and have limited validity periods.

Dynamic Credentials Credentials generated on-demand with limited lifetime. Vault generates dynamic credentials for database access, eliminating standing passwords.

Ephemeral Credentials Short-lived credentials that automatically expire. Used interchangeably with dynamic credentials in this RFC.

Just-in-Time (JIT) Access Access granted only when needed, for a limited duration, typically requiring explicit approval. Contrasts with standing access.

Principal In SSH certificate context, the Unix usernames that a certificate holder is permitted to use. For example, a certificate with principals ubuntu and ec2-user allows login as either user.

Privileged Access Access to infrastructure resources that requires elevated permissions, such as SSH to servers, database connections, or Kubernetes exec.

Session Recording Capture of all activity during a privileged session for audit and compliance purposes. Includes terminal I/O, queries, and metadata.

Standing Access Permanent or long-lived access that exists regardless of current need. This architecture eliminates standing access in favor of JIT.

Zero Direct Access The principle that no direct connections are permitted from user workstations to target resources; all access must flow through the access broker.

Component Terms

Auth Service Teleport's control plane component responsible for authentication, certificate issuance, and RBAC enforcement.

Database Agent Teleport component that proxies database connections and enables query logging.

eBPF (extended Berkeley Packet Filter) Linux kernel technology used for low-latency session capture in containers without modifying applications.

External Secrets Operator (ESO) Kubernetes operator that synchronizes secrets from external stores (Vault) to Kubernetes Secrets.

Kubernetes Agent Teleport component that enables governed kubectl exec/attach/port-forward operations.

Proxy Service Teleport's data plane component responsible for routing connections to agents.

SSH Agent Teleport component running on target hosts that handles SSH connections and session recording.

SSH Certificate Authority (CA) The system that signs SSH certificates. In this architecture, Vault's SSH secrets engine acts as the CA.

Teleport The access broker platform providing unified access to SSH, databases, Kubernetes, and applications with session recording and access control.

Protocol Terms

mTLS (Mutual TLS) TLS where both client and server present certificates for mutual authentication. Used between Teleport components.

OIDC (OpenID Connect) Authentication protocol used for Teleport integration with Keycloak.

SSH Certificate A signed document asserting that a public key belongs to a specific identity with specific permissions (principals) for a limited time.

Workflow Terms

Approval Chain The sequence of approvers required for an access request. May require one approver (OR logic) or multiple approvers (AND logic).

Break-Glass Emergency access procedure that bypasses normal controls. Subject to enhanced audit and review.

TTL (Time To Live) The duration for which a credential or access grant remains valid.


A.2 Diagram Index

All diagrams included in this RFC:

Diagram NameTypeSection
System Overviewflowchart§3.1
Zero Direct Access Modelflowchart§3.2.1
Trust Hierarchyflowchart§3.3.1
Trust Boundariesflowchart§3.5.1
Authentication FlowsequenceDiagram§3.6.1
SSH Access FlowsequenceDiagram§3.6.2
Database Access FlowsequenceDiagram§3.6.3
Kubernetes Exec FlowsequenceDiagram§3.6.4
Teleport Cluster Diagramflowchart§4.1.5
Agent Architectureflowchart§4.2.5
SSH CA Integrationflowchart§4.3.1
Certificate FlowsequenceDiagram§4.3.4
Credential LifecyclesequenceDiagram§4.4.4
ESO Secret Distributionflowchart§4.5.3
Resource Enrollmentflowchart§4.6.4
Keycloak SSO Integrationflowchart§5.1.1
Group-to-Role Mappingflowchart§5.2.1
Authorization Ceiling Enforcementflowchart§5.3.1
Session EstablishmentsequenceDiagram§5.5.1
User Onboardingflowchart§5.6.1
User Offboardingflowchart§5.6.2
User Certificate FlowsequenceDiagram§6.4.1
Principal Hierarchyflowchart§6.5.3
Database Agent Flowflowchart§7.3.2
Credential Lifecycle (Database)sequenceDiagram§7.4.1
Kubernetes Exec FlowsequenceDiagram§8.1.3
Namespace Security Boundaryflowchart§8.3.1
Dual Authorizationflowchart§8.4.1
Storage Architectureflowchart§9.2.3
Session JoinsequenceDiagram§9.4.2
Log Correlationflowchart§9.5.4
JIT Access Request FlowsequenceDiagram§10.2.1
Access LifecyclestateDiagram§10.4.3
Request-Session Linkingflowchart§10.6.2
Repository Structuretext§11.1.2
Role Hierarchyflowchart§11.2.3
GitOps Workflowflowchart§11.2.4
ESO Distributionflowchart§11.4.3
Multi-Region Deploymentflowchart§13.2.3

A.3 Abbreviations

AbbreviationExpansion
AADAzure Active Directory
APIApplication Programming Interface
CACertificate Authority
CLICommand Line Interface
DBADatabase Administrator
eBPFextended Berkeley Packet Filter
ESOExternal Secrets Operator
GCSGoogle Cloud Storage
HAHigh Availability
HTTPSHypertext Transfer Protocol Secure
IAMIdentity and Access Management
IdPIdentity Provider
JITJust-in-Time
JWTJSON Web Token
K8sKubernetes
MFAMulti-Factor Authentication
mTLSMutual Transport Layer Security
OIDCOpenID Connect
OTPOne-Time Password
PAMPrivileged Access Management
PRPull Request
RBACRole-Based Access Control
RDPRemote Desktop Protocol
RFCRequest for Comments
S3Simple Storage Service (AWS)
SAService Account
SAMLSecurity Assertion Markup Language
SCIMSystem for Cross-domain Identity Management
SIEMSecurity Information and Event Management
SRESite Reliability Engineering
SSHSecure Shell
SSMSystems Manager (AWS)
SSOSingle Sign-On
TLSTransport Layer Security
TTLTime To Live
UIUser Interface
VPNVirtual Private Network
YAMLYAML Ain't Markup Language

A.4 ADR Index

Architectural Decision Records documented in this RFC:

ADR IDDecision SummaryRationale Section
ADR-PAM-001Teleport as access broker§12.1
ADR-PAM-002Certificate-based SSH authentication§12.3.1
ADR-PAM-003Vault as SSH CA§6.2
ADR-PAM-004Dynamic database credentials§12.3.3
ADR-PAM-005Separate from RFC-WORKLOAD-IDENTITY§12.4
ADR-PAM-006Session recording mandatory§9.1.1
ADR-PAM-007GitOps for role definitions§11.5
ADR-PAM-008JIT for elevated access§10.1

Document Navigation


End of Appendix A

On this page