Definition

integrated access management (IAM)

Part of the Authentication glossary:

Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data. IAM software is used by enterprises to control the flow of sensitive data in and out of the network.

Next Steps

Effective integrated access management tools incorporate four elements:

  • A method of providing users access to applications, systems and documents throughout an enterprise that are required for individual job function.
  • The ability to authenticate a user at the proper access level, based upon the principle of least privilege (POLP).
  • A single sign-on (SSO) that easily allows users to access resources to which they have been granted access.
  • A means to generate an audit trail to confirm the IAM system is working properly and meet compliance requirements.

Security experts recommend the use of multifactor authentication (MFA) to validate user identity, including biometric data, smart cards and RFID chips.

Learn more about IT: 
Security expert Joel Dubin exposes IAM blunders this tip about worst practices. 

> You can download a free chapter from "Security Assessment: Case Studies for Implementing the NSA IAM."

Joel Dubin explains how anonymous credentials and selective disclosure certificates affect enterprise IAM.

Joel Dubin explains how multifactor authentication works in IAM suites

This was last updated in October 2008
Posted by: Margaret Rouse

Related Terms

Definitions

  • capacitive scanner

    - A capacitive scanner is a fingerscanning device that uses an array of capacitive proximity sensors, along with a microcomputer and associated electronic signal processing circuits, to create and st... (WhatIs.com)

  • smart label

    - A smart label is a slip of paper, plastic or other material on a product that contains an RFID tag in addition to bar code data. (WhatIs.com)

  • PIN lock

    - The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used. (WhatIs.com)

Glossaries

  • Authentication

    - Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.

  • Software applications

    - Terms related to software applications, including definitions about software programs for vertical industries and words and phrases about software development, use and management.

  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

Dig Deeper

People Who Read This Also Read...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.