Skip to content
GitHubLinkedIn

Glossary

Use this section as a shared dictionary for terms we use across the docs.

Definitions here stay generic. If LEF uses a term in a narrower or special way, that usage is described in the relevant Architecture or How-we-work pages.

  • Link the first meaningful occurrence of a term on a page to its glossary entry.
  • Don’t link every repetition (it hurts readability).
  • If a page depends heavily on a set of terms, add a short “Definitions used” line with links.
TermWhat it means
ACMEAutomated certificate issuance and renewal protocol.
APIApplication Programming Interface; interaction contract.
Aspect modelDescribe a service through development, delivery, security, and operations.
BackupData copy created so it can be restored.
BackendServer-side logic/data (or a proxy routing target).
C4 model“Zoomable” diagramming model for software architecture.
Certificate authority (CA)Issues and signs certificates used by TLS.
ComponentA responsibility boundary inside a container.
ContainerMajor runtime building block inside a system (app or data store).
DeploymentReleasing changes and/or mapping software onto infrastructure.
DNSName resolution: maps domains/hostnames to records.
DTAPDevelopment → Test → Acceptance → Production lifecycle flow.
EndpointWhere clients connect (URL / hostname+port).
Entry pointUser/system-facing way to access a service or system.
EnvironmentIsolated deployment context (DTAP).
ESGEnvironmental, Social, and Governance considerations for organizations.
GuidelineRecommended default approach (adaptable with context).
HostnameHuman-readable name for a host/service in DNS.
Identity provider (IdP)Authenticates users and issues identities/tokens.
IncidentUnplanned interruption or degradation requiring response.
IngressInbound traffic path into a system.
LaneNamed lifecycle track/stage used to separate risk and access.
Least privilegeMinimum necessary access for the shortest time.
Multi-factor authentication (MFA)Authentication using two or more factors.
Object storageStores data as objects accessed via APIs.
ObservabilityUnderstand system state via logs, metrics, traces.
OpenID Connect (OIDC)Modern SSO via tokens on top of OAuth 2.0.
PlatformShared capabilities foundation for building and running services.
PolicyIntent/rules that set expectations and constraints.
PrincipleStable, decision-shaping rule or stance.
ProcedureRepeatable steps to achieve a goal.
RequirementMandatory condition that must be met.
RDPRemote Desktop Protocol (GUI remote access).
RestoreRecovering from backups to regain availability/integrity.
Reverse proxyRoutes client requests to backends.
RootlessRunning without root privileges to reduce blast radius.
RunbookStep-by-step ops guide for tasks/incidents.
S3Widely used object storage API.
SAMLSSO standard for exchanging authentication assertions.
ServiceCapability provided via a defined interface.
Single sign-on (SSO)Authenticate once to access multiple apps/services.
Software systemCoherent system delivering value to people/systems.
Split-horizon DNSDifferent DNS answers for internal vs external clients.
SSHEncrypted remote access for shell sessions and tunneling.
Subject alternative name (SAN)X.509 certificate field listing additional hostnames covered by the certificate.
TCP proxyRoutes raw TCP connections to backends.
TLSEncrypts network connections; authenticates endpoints.
TroubleshootingSystematic diagnosis via hypotheses and verification.
UpstreamProxy/load balancer target (often a server group).
Virtual host (vhost)Multiple sites/services hosted by hostname/port.
Virtual machine (VM)Software-defined computer running an OS on shared hardware.
VPNEncrypted remote access into a private network.