0% found this document useful (0 votes)
2 views

IAM

The document outlines the functional architecture of Identity and Access Management (IAM), detailing key processes such as authentication, authorization, auditing, and various management activities. It emphasizes the importance of a centralized IAM system for effective governance of identity life cycles, access control, and compliance management. Additionally, it highlights the role of directory services and the need for monitoring and reporting to ensure security within an organization.

Uploaded by

rbsraja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

IAM

The document outlines the functional architecture of Identity and Access Management (IAM), detailing key processes such as authentication, authorization, auditing, and various management activities. It emphasizes the importance of a centralized IAM system for effective governance of identity life cycles, access control, and compliance management. Additionally, it highlights the role of directory services and the need for monitoring and reporting to ensure security within an organization.

Uploaded by

rbsraja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

IDENTITY AND ACCESS MANAGEMENT (IAM)

FUNCTIONAL ARCHITECTURE
Authentication
Authentication is the process of verifying the identity of a
user or system. Authentication usually connotes a more
robust form of identification
Authorization
Authorization is the process of determining the privileges
the user or system is entitled to once the identity is
established. —in other words, authorization is the process
of enforcing policies
Auditing
auditing entails the process of review and examination of
authentication, authorization records, and activities to
determine the adequacy of IAM system controls, to verify
compliance with established security policies and
IDENTITY AND ACCESS MANAGEMENT (IAM)
FUNCTIONAL ARCHITECTURE
IAM Architecture

Standard enterprise IAM architecture encompasses several


layers of technology, services, and processes. At the core of
the deployment architecture is a directory service (such as
LDAP or
Active Directory)
User management
Activities for the effective governance and management of
identity life cycles
Authentication management
Activities for the effective governance and management of the
process for determining that an entity is who or what it claims
to be
Authorization management
Activities for the effective governance and management of
the process for determining entitlement rights that decide
IDENTITY AND ACCESS MANAGEMENT (IAM)
FUNCTIONAL ARCHITECTURE

Access management
Enforcement of policies for access control in response to a
request from an entity (user, services) wanting to access
an IT resource within the organization

Data management and provisioning


Propagation of identity and data for authorization to IT
resources via automated or manual processes

Monitoring and auditing


Monitoring, auditing, and reporting compliance by users
regarding access to resources within the organization
based on the defined policies.
AND ACCESS MANAGEMENT FUNCTIONAL
ARCHITECTURE
IDENTITY AND ACCESS MANAGEMENT (IAM)
FUNCTIONAL ARCHITECTURE

Entitlement management
Entitlements are also referred to as authorization policies.
The processes in this domain address the provisioning and
deprovisioning.
Compliance management
This process implies that access rights and privileges are
monitored and tracked to ensure the security of an
enterprise’s resources.
Centralization of authentication (authN) and
authorization (authZ)
A central authentication and authorization infrastructure
alleviates the need for application developers to build
custom authentication and authorization features into
their applications.

You might also like