Glossary
In this article
Key Terms
| Name | Definition |
|---|---|
| Access operation | An action that is allowed for a user to execute in relation to a group of specific objects |
| Access role | A set of access rights that the administrator can assign to users and groups of users, which includes a set of privileges and a specific name |
| Agent | - Monitoring agent: The operavix.agent application that is installed on an employee’s workstation and collects employee activity statistics.- Automation agent: An application that executes scripts in the system. It allows you to save server resources because you can add multiple agents to the system that do not depend on each other or on the server |
| API Key | An access key that is used for authorization to access system data |
| Authentication | A process to prevent impersonation. The comparison of the entered login/password combination with the one that is stored in the database |
| Authorization | The process of granting rights to perform certain actions and the process of verifying (confirming) these rights when attempting to perform these actions (for example, when logging into the system) |
| Connection | - Connection to ClickHouse in Data storages: A connection between the Operavix application and the ClickHouse DBMS. The first connection that needs to be configured is called a System connection; the following ones are User connections. - Connections section in System settings: Configuration of an outgoing mail server for sending email notifications from the system. - Connection (in a workspace or automation block): A connection between the system and various databases to load data from them. It can be configured at the workspace level or at the script block level |
| Dashboard | The means of graphic and table display of system data based on the Data Model |
| Employee profile | Information about an employee that includes general information, access settings, and the list of information collection sources |
| GraphQL | A standard for declaring the structure of data and methods for obtaining it that acts as a layer between the client and the server |
| HTTPS | An extension to the HTTP protocol that supports encryption in order to enhance security. Data in HTTPS is transmitted over the SSL or TLS cryptographic protocols |
| Password hash | Conversion of an input data array (password) of arbitrary length into an output bit string of fixed length that is performed by a specific algorithm (SHA256) |
| Package | - In a workspace: An entity that contains a set of specific settings, scripts, connections, dashboards, an application, or a widget. - In automation: A system or user-defined set of entities that include the parameters of automation blocks and a connection that operates within the current script |
| Privilege | A set of rights that allows a user to perform certain operations in the system in relation to a group of specific objects |
| Security log | A file that contains records of information security events |
| System | The Operavix system |
| Tag | An application label that serves to make the search process easier |
| Visual mapping | Determination of data correspondence between potentially different semantics of one or more objects. For example, one database uses "yes" and "no" for element designation, and another database uses "1" and "0" to designate the same elements. Therefore, the codes of one database are mapped in accordance with the codes of another database. In the system, it is used to refer to the fields that were obtained in the previous block of the script |
| Workspace | A separate independent part of the ClickHouse database. The workspace for an analyst that includes the Data Model and dashboards |
Key Abbreviations
| Abbreviation | Description |
|---|---|
| AR | Access role |
| AS | Automated system |
| CARM | Configuration and analytical reporting module |
| DB | Database |
| DBMS | Database management system |
| EAW | Employee automated workstation |
| EUAMM | Extended user activity monitoring module |
| IS | Information system |
| ISA | Information security administrator |
| ISEC | Information security |
| IST | Information security tool |
| OS | Operating system |
| PC | Personal computer |
| SW | Software |
| UAMM | User activity monitoring module |
Was the article helpful?
Yes
No