What is “Identity and Access Management”?

Ishara Ilangasinghe
2 min readJan 25, 2019

--

Identity and Access Management, simply IAM refers to a structure of policies and technologies that make sure proper people have proper access to technology resources in an enterprise.

IAM systems fall under the category of IT security and plays a significant role in it. These systems will identify, authenticate and authorize users who will be utilizing IT resources. They will manage not only the individuals but also the hardware and applications they access.

IAM in enterprise IT is about defining and managing the roles and access privileges of an individual user and the situation in which users are (not) given those privileges. The key objective of an IAM system is providing each individual a digital identity. Once this digital identity is initiated the IAM will be responsible for maintaining, modifying and monitoring it throughout each users’ “access lifecycle”.

Grant access to the correct enterprise resource to the correct users in the correct context, from a user’s on-boarding to permission authorizations to the off-boarding of that user in a chronological manner is the ultimate purpose of IAM.

IAM system admins have the necessary tools and technologies to change user roles, track user activities, create reports on those activities and enforce policies continuously. IAM systems are designed to administer user access across an entire organization and to secure corporate policies and government regulations.

Why do I need IAM?

IAM is a critical part of any enterprise security plan. It is entangled to the security and productivity of organizations. Compromised user credentials can act as an entry point into an organization’s network and its information resources. IAM systems safeguard information assets of organizations against the rising threats of cyber attacks.

In many institutions, users tend to have more access privileges than necessary. A strong IAM system adds an important layer of protection by applying a consistent group of “user access rules and policies” across an institution.

IAM can increase business productivity. The central management capabilities reduce the intricacy and cost of safeguarding user credentials and access. At the same time, IAM enables users to be more productive by securing their digital identity in a variety of environments, so the users can utilize the technology resources while working from home, the office, or on the road.

--

--

Ishara Ilangasinghe
Ishara Ilangasinghe

Written by Ishara Ilangasinghe

Business Analyst | Speaker at Write the Docs Australia 2022 | Senior Technical Writer at WSO2 | Toastmaster | MBA | BEng

No responses yet