IAM – Identity and Access Management
An acronym for Identity and Access Management, IAM refers to a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources.
Also called identity management (IdM), IAM systems fall under the overarching umbrella of IT security. Identity and access management systems not only identify, authenticate and authorize individuals who will be utilizing IT resources, but also the hardware and applications employees need to access.
Identity and Access Management solutions have become more prevalent and critical in recent years as regulatory compliance requirements have become increasingly more rigorous and complex.
From Traditional IAM to Hybrid IAM and IDaaS
Enterprises have traditionally utilized on-premises IAM software for their identity and access management policies, but in recent years native cloud-based Identity-as-a-Service (IDaaS) solutions from vendors like Okta and Centrify have gained traction, as have hybrid identity and access management solutions from vendors like Microsoft and Amazon that provide cloud-based directories that link with on-premises IAM systems.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
Like everything in technology, AI touches on so many other trends, like self-driving cars and automation, and Big Data and the Internet of Things... Read More »DevOp's Role in Application Security
As organizations rush to release new applications, security appears to be getting short shrift. DevSecOps is a new approach that holds promise. Read More »Slideshow: Easy Editorial SEO Tips to Boost Traffic
This slideshow reviews five easy on-page editorial SEO tips to help drive organic search engine traffic, including the page title, heading,... Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »