Orientation

Choose a concept or boundary explanation.

Boundary
Read-only
Authority
idm, collection
Evidence
architecture-boundary

Explanation

This index is the routing point for the explanation section.

Page Outcome
What is eigenstate.ipa? Understand the collection at a high level.
IdM as an automation state plane Understand why automation reads live IdM state.
Authority boundaries Understand which system owns which responsibility.
Secret boundary Understand the IdM vault boundary and non-goals.
Kerberos keytab boundary Understand retrieval, rotation, and residual risk.
Certificate boundary Understand CSR, CA, certificate, and private-key responsibilities.
Temporary access boundary Understand lease-like access and what it is not.
AAP execution model Understand EE, Controller, inventory sync, and job evidence boundaries.
OpenShift identity and workload model Understand OpenShift identity and workload Secret flows.
Evidence and reporting model Understand why reports are evidence and not enforcement.
Comparison with Vault and CyberArk expectations Compare IdM-native workflows with vault and PAM expectations.
Security threat model Understand assumptions, controls, risks, and residual risk.