IAM
IAM
FUNCTIONAL ARCHITECTURE
Authentication
Authentication is the process of verifying the identity of a
user or system. Authentication usually connotes a more
robust form of identification
Authorization
Authorization is the process of determining the privileges
the user or system is entitled to once the identity is
established. —in other words, authorization is the process
of enforcing policies
Auditing
auditing entails the process of review and examination of
authentication, authorization records, and activities to
determine the adequacy of IAM system controls, to verify
compliance with established security policies and
IDENTITY AND ACCESS MANAGEMENT (IAM)
FUNCTIONAL ARCHITECTURE
IAM Architecture
Access management
Enforcement of policies for access control in response to a
request from an entity (user, services) wanting to access
an IT resource within the organization
Entitlement management
Entitlements are also referred to as authorization policies.
The processes in this domain address the provisioning and
deprovisioning.
Compliance management
This process implies that access rights and privileges are
monitored and tracked to ensure the security of an
enterprise’s resources.
Centralization of authentication (authN) and
authorization (authZ)
A central authentication and authorization infrastructure
alleviates the need for application developers to build
custom authentication and authorization features into
their applications.