Difference between revisions of "Identity and access management"
Line 1: | Line 1: | ||
− | In [[cyber-security]], [[identity and access management]] (alternatively known by its acronym, [[IAM]], as well as [[identification and access management]] or, simply, [[identity management]]; hereinafter, ''IAM'') is practice and a set of concepts based on that practice of | + | In [[cyber-security]], [[identity and access management]] (alternatively known by its acronym, [[IAM]], as well as [[identification and access management]] or, simply, [[identity management]]; hereinafter, ''IAM'') is practice and a set of concepts based on that practice of granting each user of some system a right [[system-user role]]. |
− | "enable the right individuals to access the right resources at the right times, and for the right reasons | + | The goal of ''IAM'' can be stated as to "enable the right individuals to access the right resources at the right times, and for the right reasons" (as quoted in [[Wikipedia:Identity management|Wikipedia]]. ''IAM'' combines business processes, policies, and technologies. |
− | |||
− | |||
− | |||
− |
Revision as of 23:14, 29 January 2019
In cyber-security, identity and access management (alternatively known by its acronym, IAM, as well as identification and access management or, simply, identity management; hereinafter, IAM) is practice and a set of concepts based on that practice of granting each user of some system a right system-user role.
The goal of IAM can be stated as to "enable the right individuals to access the right resources at the right times, and for the right reasons" (as quoted in Wikipedia. IAM combines business processes, policies, and technologies.