Tus-it-services

Laden

Tus-it-services
Identity Management
Identity and access management is for making sure that only the right people can access an organization's data and resources. It's a cybersecurity practice that enables IT administrators to restrict access to organizational resources so that only the people who need access have access.
The basics of IAM
IAM consists of several pillars: identification, authentication and authorization. In this paragraph we will discuss the various pillars in more detail.
Identification
Identification is the first part of the IAM access process. With the help of identification you ensure that a system, a service provider or an organization can determine your identity. An entity such as a user, application or device thus makes its digital identity known.

Authentication/Authorisation
Authentication is the second step in the IAM access process. Authentication includes the processes and mechanisms we use to verify the identity of an entity. In this step you check whether the digital identity that an entity provides also corresponds to the data known to you, so that you can validate its authenticity.

Authorization
Authorization is the third step in the IAM access process. Roles and rights are central to this process. This step determines what users get access to. After a user has identified themselves and this identity has been authenticated, the authorization step ensures that entities are given access to the desired systems or data.