As you develop your company’s IAM strategy, here are some key identity and access management concepts you should know:
IdAM - another term for identity and access management, or IAM
Access Management (AM) - defining, assigning, and managing user access permissions to company resources based on roles, attributes, or other context
Digital Identity - a user profile containing verified attributes and credentials used to define permissions, provision/deprovision access, and authenticate a user’s identity
Authentication - the process of verifying that a user requesting access matches the digital identity they claim to be
Authorization - the process of allowing an authenticated user to access a resource
Role-Based Access Control (RBAC) - a method of provisioning or controlling access to resources based on a user’s role in the organization
Attribute-Based Access Control (ABAC) - a method of provisioning or controlling access to resources based on characteristics or attributes assigned to a user, object, action, or environment (e.g., location, device type, etc.)
User Groups - a group of users assigned the same access permissions for a resource based on similar roles or attributes
Active Directory (AD) - a popular on-premises Microsoft directory service that allows administrators to manage permissions for company resources and verify user identities. AD represents an early form of IAM technology
Identity as a Service (IDaaS) - a cloud-based subscription service that provides IAM technology through a third party. IDaaS is an alternative to on-premises solutions like AD
Multi-Factor Authentication (MFA) - a tool used to authenticate a user’s digital identity using two or more authentication factors, such as: knowledge (e.g., security questions), possession (e.g., a one-time password (OTP) delivered to a personal device), physical attribute (e.g., biometric authentication), and time or location patterns that align with a user’s common login habits (e.g., logging on from a certain location during standard work hours)
Biometric Authentication - when a user verifies their identity using a physical attribute like voice recognition, facial recognition, or eye or fingerprint scanning
Single Sign-On (SSO) - a tool used to allow users to log in to multiple IT systems and applications with one set of login credentials
Credentials - a tool for user identification or authentication, like a username and password
Password reset - requesting new credentials when a user has forgotten their current access credentials
Provisioning/Deprovisioning - giving or taking away access to a resource, often during the onboarding or offboarding process
Onboarding/Offboarding - the processes and procedures in provisioning/deprovisioning employee access based on personnel changes
Identity lifecycle management - processes and procedures designed to manage evolving digital user identities and access needs while employed with the company
Zero Trust - a security approach that requires all users to be authenticated and authorized continuously to enforce access control
Privileged Access Management (PAM) - a subset of IAM that defines and controls who or what can make changes to a network, device, or system
Identity Governance and Administration (IGA) - a subset of IAM that manages governance and compliance needs through automation and improved visibility across IT resources