Explanation
This index is the routing point for the explanation section.
| Page | Outcome |
|---|---|
| What is eigenstate.ipa? | Understand the collection at a high level. |
| IdM as an automation state plane | Understand why automation reads live IdM state. |
| Authority boundaries | Understand which system owns which responsibility. |
| Secret boundary | Understand the IdM vault boundary and non-goals. |
| Kerberos keytab boundary | Understand retrieval, rotation, and residual risk. |
| Certificate boundary | Understand CSR, CA, certificate, and private-key responsibilities. |
| Temporary access boundary | Understand lease-like access and what it is not. |
| AAP execution model | Understand EE, Controller, inventory sync, and job evidence boundaries. |
| OpenShift identity and workload model | Understand OpenShift identity and workload Secret flows. |
| Evidence and reporting model | Understand why reports are evidence and not enforcement. |
| Comparison with Vault and CyberArk expectations | Compare IdM-native workflows with vault and PAM expectations. |
| Security threat model | Understand assumptions, controls, risks, and residual risk. |