A framework of policies and technologies for managing digital identities and controlling access to resources. IAM ensures the right individuals access the right resources at the right times for the right reasons.
Related Terms
Privileged Access Management (PAM)
authenticationA set of strategies and technologies for controlling, monitoring, and securing elevated access rights to critical system...
Single Sign-On (SSO)
authenticationAn authentication method that allows users to access multiple applications with a single set of credentials. SSO reduces...
Zero Trust
authenticationA security model based on the principle of never trust, always verify. Zero trust requires strict identity verification...