Identity and Access Management

Overview[1]#

Identity and Access Management (IDAM, IAM, IdMA) is the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".

Identity and Access Management combines Identity Management and Access Control.

Typically Identity and Access Management provides Digital Identity State to the Organizational Entity. Identity and Access Management answers questions about Digital Identity State.

Identity and Access Management addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.

The terms "Identity Management" (IdM) and "Identity and Access Management" are used in our discussions interchangeably in the area of Identity access management.

Identity Management Architecture includes the products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and software applications.

Identity and Access Management covers issues such as how users gain an Digital Identity, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).

Key survey findings#

Ponemon Institute, a privacy and information management research firm, conducted this inaugural study on identity compliance. The goal of the study was to better understand how business and government organizations are ensuring correct identity and access management (IAM) rights within their enterprises.

More Information#

There might be more information for this subject on one of the following: