33
Courtesy of InfraMatix http://www.IDMChecklist.com Access Management vs . Identity Management: What's the Difference?

Access Management vs. Identity Management: What's the Difference? (SlideShare)

Embed Size (px)

Citation preview

Courtesy of InfraMatix

http://www.IDMChecklist.com

Access Management vs.

Identity Management:

What's the Difference?

You will often hear the terms

access management (AM)

and identity management

(IDM) used as if they

were synonyms

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

The problem is that they are not

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

We will examine what identity

and access management are,

and more importantly

what they are not

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Identity Management

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Identity management

is about authentication

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Its purpose is to determine

you are who you claim to be

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Identity manager applications

will authenticate entities

(people or devices)

by a certain criteria

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

such as a username/password

combination, biometrics or

tokens, or some unique

hardware/software identifier

in the case of a device

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

However, an identity

management tool

is not very user friendly,

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

as it just authenticates entities

against an unsorted list

in a database

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Therefore, vendors produce

identity management products

that allow administrators to

place people or devices into

groups and assign them roles

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

The product can then

determine, for example,

that the person is not just

Joe Smith, but that he is

also in the group “Finance”

with the role of “Accountant”

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

In its purest sense,

identity management

as a concept is about

authentication

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

However, identity management

as a product or service is about

authentication & classification

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

In summary,

identity management:

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

• In concept

is about authentication

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

• As a product

provisions & authenticates

user accounts

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

• As a product

provides mechanisms

for categorization

such as groups and roles

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Access Management

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Once identity management

has authenticated a user,

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

then access management

can apply authorization policy

to that entity

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Therefore, to differentiate

the two technologies:

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

• Identity management

creates & provisions

user accounts, and then

authenticates & classifies

entities into groups and roles

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

• Access management then

applies authorization policy

to those user accounts,

groups or roles

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Bottom Line

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Identity and access

management are often

confused

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

And since they are

so tightly integrated,

they cannot work alone

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

• What is the purpose of

authenticating and

classifying Joe Smith the

Accountant if there is

no authorization policy?

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

• What is the purpose of

applying an authorization

policy to a user, group,

or role if there is no way of

authenticating the identity?

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

What do you think defines

identity management and

access management?

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Let us know your thoughts

in the Comments box below

Sponsored by http://www.IDMChecklist.com

Veera Sandiparthi Founder of InfraMatix

Copyright © InfraMatix

Is Your Company Adequately

Protected from Security Risks?

Download the Free

8 Point Identity Management

Checklist Now at

http://www.IDMChecklist.com