Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Zugriffskontrolle Glossary

IAM (Identity and Access Management)

Identity and Access Management (IAM) encompasses technologies and processes for managing digital identities and controlling who is permitted to access which resources.

Identity and Access Management (IAM) is a fundamental security component that ensures the right people can access the right resources at the right time—and no one else.

Core IAM Functions

Identity Lifecycle Management: Provisioning, modifying, and deactivating user accounts throughout the employee lifecycle (Joiner-Mover-Leaver process)

Authentication: Verification of identity via passwords, MFA (TOTP, FIDO2, push), biometrics, or certificates

Authorization: Access decisions based on roles (RBAC), attributes (ABAC), or policies

Single Sign-On (SSO): One login for all applications—increases convenience and enables centralized session management

Privileged Access Management (PAM): Special controls for administrative accounts: just-in-time access, session recording, password vaults

Identity Governance: Regular access recertification, segregation of duties (SoD), compliance reporting

IAM Standards and Protocols

ProtocolUse
SAML 2.0Federation, Enterprise SSO
OAuth 2.0Authorization for APIs
OpenID ConnectAuthentication via OAuth 2.0
SCIMAutomated user provisioning
FIDO2/WebAuthnPasswordless authentication

Zero Trust and IAM

IAM is the foundation of every Zero Trust architecture: identity is the primary access control factor. Without strong IAM, Zero Trust cannot be implemented.

In the NIST SP 800-207 framework, Identity & Access Management is the first and most important of the five Zero Trust pillars.