What is identity access management?
Identity access management or IAM is the organizational process by which individuals are authorized to have access to IT systems and other software platforms. These individuals can be employees, customers, suppliers, partners or other stakeholders the business interacts with. The right level of access according to their status or role and specific needs is managed through an IAM system. With a systemized approach and automation, IAM can permit or block access to software or databases and prevent the download of sensitive data or files. These days many IAM services are based in the cloud – so the need for the physical infrastructure to support systems is kept to a minimum, thereby reducing IT costs.
Identity access management services
Solutions such as single sign on (SSO) and multi-factor authentication (MFA) can all contribute to the effective implementation of an IAM system. For larger organizations, role based access control (RBAC) also has a key part to play. Role based access control is the method by which access is restricted to IT systems based on a person’s job role and responsibilities within the business. Automating this process ensures that when a user’s role changes, for example due to a change in department or a promotion, their access levels and permissions also change.