Identity Management

Access Control

Identity management (IdM) describes the management of individual identities, their authentication, authorization, roles and privileges] within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks. "Identity management" and "access and identity management" (or AIM) are terms that are used interchangeably under the title of identity management while identity management itself falls under the umbrella of IT security. Identity management systems, products, applications, and platforms are commercial Identity management solutions implemented for enterprises An identity management system refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity management.

For security reasons, tools for managing identity management should run as an application on a dedicated network appliance or server, either on-premises or in the cloud. At the core of an identity management system are policies defining which devices and users are allowed on the network and what a user can accomplish, depending on his device type, location and other factors. All of this also depends on appropriate management console functionality, including policy definition, reporting, alerts, alarms and other common management and operations requirements. An alarm might be triggered, for example, when a specific user tries to access a resource for which they do not have permission. Reporting produces an audit log documenting what specific activities were initiated.

Many identity management systems offer directory integration, support for both wired and wireless users and the flexibility to meet almost any security and operational policy requirement. Because BYOD is so strategic today, time-saving features such as automated device onboarding and provisioning, support for a variety of mobile operating systems and automated device status verification are becoming common.