Identity and Access Management
Identity and Access Management
Identity and Access Management
Identity and access management (IAM) ensures that the right people and job roles in your
organization (identities) can access the tools they need to do their jobs. Identity management
and access systems enable your organization to manage employee apps without logging into
each app as an administrator. Identity and access management systems enable your
organization to manage a range of identities including people, software, and hardware like
robotics and IoT devices.
Security. Traditional security often has one point of failure - the password. If a user's
password is breached - or worse yet, the email address for their password recoveries -
your organization becomes vulnerable to attack. IAM services narrow the points of
failure and backstops them with tools to catch mistakes when they are made.
Productivity. Once you log on to your main IAM portal, your employee no longer has
to worry about having the right password or right access level to perform their duties.
Not only does every employee get access to the perfect suite of tools for their job, their
access can be managed as a group or role instead of individually, reducing the workload
on your IT professionals.
1. IAM confirms that the user, software, or hardware is who they say they are by
authenticating their credentials against a database. IAM cloud identity tools are more
secure and flexible than traditional username and password solutions.
2. Identity access management systems grant only the appropriate level of access. Instead
of a username and password allowing access to an entire software suite, IAM allows
for narrow slices of access to be portioned out, i.e. editor, viewer, and commenter in a
content management system.
IAM systems can be the sole directory used to create, modify, and delete users, or it may
integrate with one or more other directories and synchronize with them. Identity and access
management can also create new identities for users who need a specialized type of access to
an organization's tools.
Specifying which tools and access levels (editor, viewer, and administrator) to grant a user is
called provisioning. IAM tools allow IT departments to provision users by role, department, or
other grouping in consultation with the managers of that department. Since it is time consuming
to specify each individual’s access to every resource, identity management systems enable
provisioning via policies defined based on role-based access control (RBAC). Users are
assigned one or more roles, usually based on job function, and the RBAC IAM system
automatically grants them access. Provisioning also works in reverse; to avoid security risks
presented by ex-employees retaining access to systems, IAM allows your organization to
quickly remove their access.
Authenticating users
IAM systems authenticate a user by confirming that they are who they say they are. Today,
secure authentication means multi-factor authentication (MFA) and, preferably, adaptive
authentication.
Authorizing users
Access management ensures a user is granted the exact level and type of access to a tool that
they are entitled to. Users can also be portioned into groups or roles so large cohorts of users
can be granted the same privileges.
Reporting
IAM tools generate reports after most actions taken on the platform (like login time, systems
accessed, and type of authentication) to ensure compliance and assess security risks.
Single Sign-On
Identity and access management solutions with single sign-on (SSO) allow users to
authenticate their identity with one portal instead of many different resources. Once
authenticated, the IAM system acts as the source of identity truth for the other resources
available to the user, removing the requirement for the user to remember several passwords.
MFA
Multi-factor authentication means that your IAM provider requires more than one type
of proof that you are who you say you are. A typical example is requiring both a
password and a fingerprint. Other MFA choices include facial recognition, iris scans,
and physical tokens like a Yubikey.
SSO
SSO stands for single sign-on. If your IAM solution provides single sign-on, that means
your users can sign in only once and then treat the identity and access management tool
as a "portal" to the other software suites they have access to, all without signing in to
each one.
IAM Technologies
An IAM system is expected to be able to integrate with many different systems. Because of
this, there are certain standards or technologies that all IAM systems are expected to support: