Identity and access management

From CNM Wiki
Revision as of 23:09, 29 January 2019 by Gary (talk | contribs)
Jump to: navigation, search

In cyber-security, identity and access management (alternatively known by its acronym, IAM, as well as identification and access management or, simply, identity management; hereinafter, IAM) is practice and a set of concepts based on that practice of identifying users accessing the system and granting each of them a right system-user role.

"enable the right individuals to access the right resources at the right times, and for the right reasons". It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.[1]

The terms "identity management" (IdM) and "identity and access management" are used interchangeably in the area of Identity access management.[2] "Identity management" comes under the umbrella of IT security.[3][need quotation to verify]

concept and practice that combines business processes, policies and technologies.