Sei sulla pagina 1di 13

 Refers to policies and technologies used to

ensure proper people to have proper access


to technologies and resources in an
enterprise.
 IAM become more common and critical in
recent years.
 As regulatory compliance become more
complex and strict.
 Automate and efficiently manage IT
activities.
 Making access decision simple with
automated IT activies.
 Easily done through automated machines or
web-based platforms in which the owner
can simply manage the access requests
without physically in contact with a user or
workers.
 Identity Data Collection : Collecting detailed
data about users,accounts and roles into
centralized identity store.
 Data Analytics : Provides reports ,
dashboards, and analysis of identity-related
status.
 Access Reviews : Supervisors reviews what
access their team member have and validate
that it is correct.
 Policy Management : Define policies to
detect violation of policies and initiate
remediation process.
 Access Request Management : Provides
easy-to-use web-based platform to
request new access , as well as password
changes.
Authentication Enhancements :
Provide users with simplified login/access
experience, as well as enhanced security for
sensitive data and applications.

Authorization Enhancements :
Provide applications owners and admin the
ability to manage user access and
authorization rules for access to any services.
 External Directories :
Securely expose user identity and information
inside and outside of an enterprise.
 Access Management :
Processes and technologies used to control and
monitor network access such as authentication
,authorization, trust and security auditing.

 Biometric Authentication :
A security process for authenticating users that
relies upon the user’s unique characteristics.
Such as fingerprint sensors,iris and retina
scanning as well as facial recognition.
 Credential :
An identifier given to a user to gain access
such as password, public key
infrastructure(PKI) or biometric
information(fingerprint , iris scan).

De-provisioning:
Process of removing an identity from a network
and terminating access privileges.
 Entitlement :
The set of attributes that specify the access
rights and privileges of an authenticated
person.

Identity Synchronization :
Ensuring that multiple identity stores
consistent data for a given digital ID.
 Access Control :
Every user will be required to authenticate
themselves before gaining full access in an
enterprise, be it through card reader or
biometric reader.

 Digital Identity :
Represent external agent. It may be a person,
organization, application or devices. Digital
identity allow our access to computers and
services provided.
Provisioning :
Creating new user identity into centralized
database that holds huge capacity of existing
and active users identities , which give new
user the access rights in an enterprise to
modify or add the resources and data.
 De-provisioning :
Terminating and deleting a user identity from a
system of an enterprise or organisation who
will no longer be able to have the access rights
to do modifications onto the resources and
technologies .

Potrebbero piacerti anche