Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Identity and access management
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Management systems== An '''identity-management system''' refers to an [[information system]], or to a set of technologies that can be used for enterprise or cross-network identity management. The following terms are used in relationship with "identity-management system":<ref>{{Cite web |title=What is identity management (ID management)? Definition from SearchSecurity |url=https://www.techtarget.com/searchsecurity/definition/identity-management-ID-management |access-date=2023-04-16 |website=Security |language=en}}</ref> * Access-governance system * Identity and [[access management]] system * Entitlement-management system *[[User provisioning software|User provisioning system]] '''Identity management''', otherwise known as identity and access management (IAM) is an identity security framework that works to authenticate and authorize user access to resources such as applications, data, systems, and cloud platforms. It seeks to ensure only the right people are being provisioned to the right tools, and for the right reasons. As our digital ecosystem continues to advance, so does the world of identity management. "Identity management" and "access and identity management" (or AIM) are terms that are used interchangeably under the title of identity management while identity management itself falls under the umbrella of [[IT security]]<ref>{{Cite web|url=http://www.computerweekly.com/resources/Identity-and-access-management-products|title=Identity management as a component of IT Security}}</ref> and information privacy<ref>{{Cite book|title=The Future of Identity in the Information Society|date=2009|publisher=Springer Berlin Heidelberg|isbn=978-3-540-88480-4|editor-last=Rannenberg|editor-first=Kai|location=Berlin, Heidelberg|language=en|doi=10.1007/978-3-642-01820-6|s2cid=153140099 |editor-last2=Royer|editor-first2=Denis|editor-last3=Deuker|editor-first3=André}}</ref><ref>{{Cite journal|last=Fritsch|first=Lothar|date=March 2013|title=The Clean Privacy Ecosystem of the Future Internet|journal=Future Internet|language=en|volume=5|issue=1|pages=34–45|doi=10.3390/fi5010034|doi-access=free}}</ref> and privacy risk<ref>{{Citation|last1=Paintsil|first1=Ebenezer|title=Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets|date=2013|work=Trust, Privacy, and Security in Digital Business|pages=48–61|publisher=Springer Berlin Heidelberg|isbn=978-3-642-40342-2|last2=Fritsch|first2=Lothar|doi=10.1007/978-3-642-40343-9_5}}</ref> as well as usability and e-inclusion studies.<ref>{{Cite journal|last1=Fritsch|first1=Lothar|last2=Fuglerud|first2=Kristin Skeide|last3=Solheim|first3=Ivar|date=2010-12-01|title=Towards inclusive identity management|journal=Identity in the Information Society|language=en|volume=3|issue=3|pages=515–538|doi=10.1007/s12394-010-0075-6|issn=1876-0678|doi-access=free}}</ref><ref>{{Cite book|last1=Røssvoll|first1=Till Halbach|last2=Fritsch|first2=Lothar|date=2013|editor-last=Kurosu|editor-first=Masaaki|chapter=Trustworthy and Inclusive Identity Management for Applications in Social Media|title=Human-Computer Interaction. Users and Contexts of Use|volume=8006|series=Lecture Notes in Computer Science|language=en|publisher=Springer Berlin Heidelberg|pages=68–77|doi=10.1007/978-3-642-39265-8_8|isbn=978-3-642-39265-8|doi-access=free}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)