Identity Management

Identity and access management is a security discipline that ensures only credentialed, authorized, authenticated users can access, manage, and use the technology, software, systems, and data in your business.

Terms related to Identity Management: Identity security, cybersecurity, information security, integrity, single sign-on, privacy, multifactor authentication, security token, user account

Identity management is typically implemented through an Identity and Access Management (IAM) platform. This platform integrates with your existing software, systems, and applications to provide a secure way for people to authenticate themselves and log in to your systems.

Identity management works through getting a good “baseline” from users. This could include their login account name, a sophisticated password, a security token reference, biometric information, and various other data. This is the security information they will be assessed against when trying to access your systems in the future.

IAM tools use different types of authentication techniques, including:

  • Security tokens that display a special security code based on the time of day or other factors.
  • Biometric information that uses things like fingerprints, voice recognition, or iris patterns to verify users.
  • Adaptive authentication that uses smart algorithms to request further identification if needed, based on normal and unusual access patterns.

Good IAM tools and software should work across any environment, whether that’s on-premise, cloud-based, hybrid, Internet of Things, or something else. Although IAM may be a slight inconvenience for end users, it also provides significantly enhanced security for your organization and protects their personal data.

Identity Management Resources from Crossmatch