Identity management tools provide IT managers with tools and technologies for controlling user access to critical information within an organization.
What is identity management? Broadly speaking, identity management systems (also known as identity and access management, or IAM, systems) enable the administration of individual identities within a system, such as a company, a network or even a country. More specifically, ID management in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges.
An ID management system’s core objective is one identity per individual. Once that digital ID has been established, it must be maintained, modified and monitored throughout each user’s “access lifecycle.”
Thus, the overarching goal of ID management is to “grant access to the right enterprise assets to the right users in the right context, from a user’s system onboarding to permission authorizations to the offboarding of that user as needed in a timely fashion,” according to Yassir Abousselham, senior vice president and chief security officer for Okta, an enterprise identity management provider.
by James A. Martin and John K. Waters