Top.Mail.Ru
Glossary
CTRL+K

Glossary

In this article
  • Glossary
  • Key Terms
  • Key Abbreviations

Key Terms

NameDefinition
Access operationAn action that is allowed for a user to execute in relation to a group of specific objects
Access roleA set of access rights that the administrator can assign to users and groups of users, which includes a set of privileges and a specific name
Agent- Monitoring agent: The operavix.agent application that is installed on an employee’s workstation and collects employee activity statistics.
- Automation agent: An application that executes scripts in the system. It allows you to save server resources because you can add multiple agents to the system that do not depend on each other or on the server
API KeyAn access key that is used for authorization to access system data
AuthenticationA process to prevent impersonation. The comparison of the entered login/password combination with the one that is stored in the database
AuthorizationThe process of granting rights to perform certain actions and the process of verifying (confirming) these rights when attempting to perform these actions (for example, when logging into the system)
Connection- Connection to ClickHouse in Data storages: A connection between the Operavix application and the ClickHouse DBMS. The first connection that needs to be configured is called a System connection; the following ones are User connections.
- Connections section in System settings: Configuration of an outgoing mail server for sending email notifications from the system.
- Connection (in a workspace or automation block): A connection between the system and various databases to load data from them. It can be configured at the workspace level or at the script block level
DashboardThe means of graphic and table display of system data based on the Data Model
Employee profileInformation about an employee that includes general information, access settings, and the list of information collection sources
GraphQLA standard for declaring the structure of data and methods for obtaining it that acts as a layer between the client and the server
HTTPSAn extension to the HTTP protocol that supports encryption in order to enhance security. Data in HTTPS is transmitted over the SSL or TLS cryptographic protocols
Password hashConversion of an input data array (password) of arbitrary length into an output bit string of fixed length that is performed by a specific algorithm (SHA256)
Package- In a workspace: An entity that contains a set of specific settings, scripts, connections, dashboards, an application, or a widget.
- In automation: A system or user-defined set of entities that include the parameters of automation blocks and a connection that operates within the current script
PrivilegeA set of rights that allows a user to perform certain operations in the system in relation to a group of specific objects
Security logA file that contains records of information security events
SystemThe Operavix system
TagAn application label that serves to make the search process easier
Visual mappingDetermination of data correspondence between potentially different semantics of one or more objects. For example, one database uses "yes" and "no" for element designation, and another database uses "1" and "0" to designate the same elements. Therefore, the codes of one database are mapped in accordance with the codes of another database.
In the system, it is used to refer to the fields that were obtained in the previous block of the script
WorkspaceA separate independent part of the ClickHouse database. The workspace for an analyst that includes the Data Model and dashboards

Key Abbreviations

AbbreviationDescription
ARAccess role
ASAutomated system
CARMConfiguration and analytical reporting module
DBDatabase
DBMSDatabase management system
EAWEmployee automated workstation
EUAMMExtended user activity monitoring module
ISInformation system
ISAInformation security administrator
ISECInformation security
ISTInformation security tool
OSOperating system
PCPersonal computer
SWSoftware
UAMMUser activity monitoring module

Was the article helpful?

Yes
No
Previous
Network Scheme of the Operavix Application
We use cookies to improve our website for you.