IDENTITY Management
The identity management has been used to describe so many different overhyped offerings that its use often results in confusion about what constitutes identity management and why it is relevant. It is a collection of old and new functions for maintaining and administering identities within organizations, primarily for accessing IT applications and resources. The most common departure from “Pure identity” in practice occurs with properties intended to assure some aspect of identity. The methods used to protect information assets from deliberate unauthorized access and misuse, and at the same time safety enable authorized user to access needed assets efficiently. Both identification and authentication processes are usually used in tandem, with identification takes place before authorization, but they can stand alone, depending on the nuances of the system. Identity and access management identifies the user, determines what the user can access, determines what the user can do, and protects the information by signaling when the security has been compromised. This concludes with a discussion on the Identity management functional areas and access controlling strategies.
Keywords
ID - Identity
IAM - Identity and Access Management
SSO - Single Sign On
PIM - Personal Information
Management
SID - Secure Identity Management
Comments
Post a Comment