Difference between revisions of "User management"
(Created page with "'''User management''' describes the ability for administrator(s) to manage user access to various IT resources like systems, devices, applications, storage s...") |
|||
Line 1: | Line 1: | ||
− | '''User management''' describes the ability for [[administrator]](s) to manage user access to various IT resources like [[systems]], [[devices]], [[applications]], [[storage systems]], [[networks]], [[SaaS | + | '''User management''' describes the ability for [[administrator]](s) to manage user access to various IT resources like [[systems]], [[devices]], [[applications]], [[storage systems]], [[networks]], [[SaaS]] services, and more. [[User management]] is a core part to any directory service and is a basic security essential for any organization. User management enables admins to control user [[access]] and [[on-board]] and [[off-board]] users to and from IT resources. Subsequently a directory service will then [[authenticate]], [[authorize]], and [[audit]] user [[access]] to IT resources based on what the IT admin had dictated. |
Traditionally, user management has been grounded with [[on-prem servers]], [[databases]], and closed [[virtual private networks]] (VPN). However, recent trends are seeing a shift towards [[cloud-based identity]] and [[access management]] (IAM), granting administrators even greater control over digital assets | Traditionally, user management has been grounded with [[on-prem servers]], [[databases]], and closed [[virtual private networks]] (VPN). However, recent trends are seeing a shift towards [[cloud-based identity]] and [[access management]] (IAM), granting administrators even greater control over digital assets |
Revision as of 21:36, 15 December 2018
User management describes the ability for administrator(s) to manage user access to various IT resources like systems, devices, applications, storage systems, networks, SaaS services, and more. User management is a core part to any directory service and is a basic security essential for any organization. User management enables admins to control user access and on-board and off-board users to and from IT resources. Subsequently a directory service will then authenticate, authorize, and audit user access to IT resources based on what the IT admin had dictated.
Traditionally, user management has been grounded with on-prem servers, databases, and closed virtual private networks (VPN). However, recent trends are seeing a shift towards cloud-based identity and access management (IAM), granting administrators even greater control over digital assets