Identity and Access Management

Identity And Access Management

Identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.

"Identity Management" and "Access and Identity Management" (or AIM) are used interchangeably in the area of Identity access management while identity management itself falls under the umbrella of IT Security.

Identity management systems, products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware and applications.

Technologies, services and terms related to identity management include Active Directory, Service Providers, Identity Providers, Web Services, Access control, Digital Identities, Password Managers, Single Sign-on, Security Tokens, Security Token Services (STS), Workflows, OpenID, WS-Security, WS-Trust, SAML 2.0, OAuth and RBAC.

It covers issues such as how users are given an identity, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).

Read more about Identity And Access Management:  Definitions, Identity Management Functions, System Capabilities, Privacy, Identity Theft, Research, Organization Implications, See Also

Famous quotes containing the words identity, access and/or management:

    I look for the new Teacher that shall follow so far those shining laws that he shall see them come full circle; shall see their rounding complete grace; shall see the world to be the mirror of the soul; shall see the identity of the law of gravitation with purity of the heart; and shall show that the Ought, that Duty, is one thing with Science, with Beauty, and with Joy.
    Ralph Waldo Emerson (1803–1882)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)

    The care of a house, the conduct of a home, the management of children, the instruction and government of servants, are as deserving of scientific treatment and scientific professors and lectureships as are the care of farms, the management of manure and crops, and the raising and care of stock.
    Catherine E. Beecher (1800–1878)