A set of processes that manage a user’s identity on the network.
Identity and Access Management (IAM), is the set of processes that manage a user’s identity on the network. It includes the following different segments: access management (AM), authentication,privilege access management (PAM), identity administration and governance (IGA). It is generally misused to refer to IGA.
The functional scope of IAM is very broad. It will include functionalities allowing:
> To authenticate a user on the network (primary authentication).
>To manage its authorizations, the life cycle of its identity and the accounts associated with it.
>To guarantee the traceability of his rights, as well as the actions carried out by/on him.
To illustrate, the IAM makes it possible to simply assign the rights of a collaborator and to make them evolve according to his current situation. The fact that they belong to the company, and the function that determines their access authorization to certain applications, are taken into account in real time and integrated into the information system.