Identity and access management
In cyber-security, identity and access management (alternatively known by its acronym, IAM, as well as identification and access management or, simply, identity management; hereinafter, IAM) is practice and a set of concepts based on that practice of granting each user of some system a right system-user role.
The goal of IAM can be stated as to "enable the right individuals to access the right resources at the right times, and for the right reasons" (as quoted in Wikipedia. IAM combines business processes, policies, and technologies.