Difference between revisions of "Identity and access management"
Line 1: | Line 1: | ||
− | In [[cyber-security]], [[identity and access management]] (alternatively known by its acronym, [[IAM]], as well as [[identification and access management]] or, simply, [[identity management]]; hereinafter, ''IAM'') is a concept and practice that combines business processes, policies and technologies. | + | In [[cyber-security]], [[identity and access management]] (alternatively known by its acronym, [[IAM]], as well as [[identification and access management]] or, simply, [[identity management]]; hereinafter, ''IAM'') is practice and a set of concepts based on that practice of identifying users accessing the system and granting each of them a right [[system-user role]]. |
+ | |||
+ | "enable the right individuals to access the right resources at the right times, and for the right reasons". It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.[1] | ||
+ | |||
+ | The terms "identity management" (IdM) and "identity and access management" are used interchangeably in the area of Identity access management.[2] "Identity management" comes under the umbrella of IT security.[3][need quotation to verify] | ||
+ | |||
+ | concept and practice that combines business processes, policies and technologies. |
Revision as of 23:09, 29 January 2019
In cyber-security, identity and access management (alternatively known by its acronym, IAM, as well as identification and access management or, simply, identity management; hereinafter, IAM) is practice and a set of concepts based on that practice of identifying users accessing the system and granting each of them a right system-user role.
"enable the right individuals to access the right resources at the right times, and for the right reasons". It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.[1]
The terms "identity management" (IdM) and "identity and access management" are used interchangeably in the area of Identity access management.[2] "Identity management" comes under the umbrella of IT security.[3][need quotation to verify]
concept and practice that combines business processes, policies and technologies.