Identity and Access Management (IAM)

Identity and Access Management (IAM) refers to technology and processes for managing identities and access permissions for users, computing devices, and applications. IAM provides full lifecycle management by providing the means and credentials for identification during the onboarding process, through to authenticating and authorizing access to resources, and all the way to revoking access credentials and identities.

IAM solutions can manage identities and access to resources that reside on-premise or in the cloud. Deployment can be on-premise, in the cloud, or hybrid, where some instances of the IAM system are installed on-premise and some in the cloud, with all instances replicating/syncing data from one another.

Frequently Asked Questions
What is an IAM system?

IAM refers to technology and processes for managing identities and access permissions for users, computing devices, and applications. IAM provides full lifecycle management by providing the means and credentials for identification during the onboarding process, through to authenticating and authorizing access to resources, and all the way to revoking access credentials and identities.

What is cloud IAM?

A cloud IAM is an IAM that is deployed in the cloud and used as a service (SaaS). It can manage identities and access to cloud resources and also on-premise resources, provided it is configured to do so.

What problems does IAM solve?

IAM helps organizations keep track of user, device and application identities, and manage who has access to what.

With an IAM solution, can I structure a collection of users in a hierarchical way, such as in LDAP?

At the heart of any IAM system is a directory service, which in many cases also supports the LDAP protocol. It is therefore often possible to manage users (and also devices and applications) in the hierarchical structures supported by LDAP.