Identity & Access Management Vendors
"Identity Management" and "Access Management" (or IAM) are used interchangeably in the area of Identity access management.
Identity management describes the management of individual identifiers, their authentication and authorization or privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.
In addition to creation, deletion, modification of user identity data either assisted or self-service, Identity Management is tasked with controlling ancillary data for use by applications, such as contact information or location.
The key tasks of IAM are:
Verification that an entity is who/what it claims to be using a password, or distinctive behavior such as a gesture pattern on a touchscreen.
Managing authorization information that defines what operations an entity can perform in the context of a specific application. For example, one user might be authorized to enter a sales order, while a different user is authorized to approve the credit request for that order.
Roles are groups of operations and/or other roles. Users are granted roles often related to a particular job or job function. For example, a user administrator role might be authorized to reset a user's password, while a system administrator role might have the ability to assign a user to a specific server.
Delegation allows local administrators or supervisors to perform system modifications without a global administrator or for one user to allow another to perform actions on their behalf. For example, a user could delegate the right to manage office-related information.