Skip to content

What Is Identity & Access Management (IAM)?

A set of processes that manage a user’s identity on the network.

Identity and Access Management (IAM), is the set of processes that manage a user’s identity on the network. It includes the following different segments: access management (AM), authentication, privilege access management (PAM), identity administration and governance (IGA). It is generally misused to refer to IGA.

The functional scope of IAM is very broad. It will include functionalities allowing:

> To authenticate a user on the network (primary authentication).

> To manage its authorizations, the life cycle of its identity and the accounts associated with it.

> To guarantee the traceability of his rights, as well as the actions carried out by/on him.

To illustrate, the IAM makes it possible to simply assign the rights of a collaborator and to make them evolve according to his current situation. The fact that they belong to the company, and the function that determines their access authorization to certain applications, are taken into account in real time and integrated into the information system.

Continue Reading


Zero Trust Network Access What is ZTNA? The ZTNA is a name describing products that apply a “Zero Trust”, or lesser privilege, policy in the

Read More »


Authentication Primary and Secondary Authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give

Read More »

What Is A VPN?

What is a Virtual Private Network? Virtual Private Network (VPN) is a technology that simulates a local area network between two trusted networks. In practice

Read More »