Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Identity and access management
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Technical and Policy systems to give users appropriate access}} {{Redirect|IdAM|Tamil/Sanskrit word|Idam}} {{Use dmy dates|date=November 2022}} '''Identity and access management''' ('''IAM''' or '''IdAM''') or '''Identity management''' ('''IdM'''), is a framework of policies and technologies to ensure that the right users (that are part of the [[Software ecosystem|ecosystem]] connected to or within an enterprise) have the appropriate access to technology resources. IAM systems fall under the overarching umbrellas of [[computer security|IT security]] and [[data management]]. Identity and access management systems not only identify, authenticate, and control access for individuals who will be utilizing IT resources but also the hardware and applications employees need to access.<ref>{{Cite journal|last1=Silva|first1=Edelberto Franco|last2=Muchaluat-Saade|first2=Débora Christina|last3=Fernandes|first3=Natalia Castro|date=2018-01-01|title=ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations|url=http://www.sciencedirect.com/science/article/pii/S0167739X17316060|journal=Future Generation Computer Systems|language=en|volume=78|pages=1–17|doi=10.1016/j.future.2017.07.049|issn=0167-739X|url-access=subscription}}</ref> The terms "identity management" (IdM) and "identity and access management" are used interchangeably in the area of identity access management.<ref>{{cite news|url=http://searchsecurity.techtarget.com/definition/identity-management-ID-management |title= identity management (ID management) |publisher=SearchSecurity |date=2013-10-01 |access-date=2017-03-02}}</ref> [[Identity management systems|Identity-management systems]], products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and [[software application]]s. IdM covers issues such as how users gain an [[digital identity|identity]], the roles, and sometimes the permissions that identity grants, the protection of that identity, and the technologies supporting that protection (e.g., [[protocol (computing)|network protocols]], [[public key certificate|digital certificates]], [[password]]s, etc.).
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)