Essential Terminology
On this page
The Permguard Essential Terminology section explains key terms and concepts essential for understanding the architecture. Use this resource to quickly find definitions for terms used throughout the documentation.
Core Concepts
Zero Trust: Zero Trust is a security model that does not assume implicit trust for any user, device, or system, whether inside or outside the network. It requires continuous verification for every access request to maintain strong security. Learn more about Zero Trust.
ZTAuth*: A Zero Trust compliant protocol for secure, identity-based access at the application edge. It supports eventual consistency and resilient synchronization across network disruptions. Built with a delegation-first model, it is ideal for systems that require secure and auditable delegation.. Learn more about ZTAuth*.
Application Boundaries: Application boundaries define the logical scope of an application, including its access control and data management.