
Introduction to Access Control (v3)
Author(s) -
André Koot
Publication year - 2020
Language(s) - English
DOI - 10.55621/idpro.42
Subject(s) - access control , access management , identity (music) , identity management , information access , computer access control , focus (optics) , computer science , physical access , control (management) , discretionary access control , access to information , data access , core (optical fiber) , internet privacy , computer security , telecommunications , world wide web , computer network , database , physics , artificial intelligence , acoustics , optics
As the name implies, Identity and Access Management (IAM) is split into two functions: managing identity information and performing access control. Arguably, if there was no access control requirement there would be no need for identity management. It is therefore the focus for IAM professionals. At its core, access control is ensuring users are authenticated to access protected resources. This is accomplished by managing user entitlements and satisfying the requirements of relying applications so that users can only access the systems and information they are entitled to access. This article looks at the history of access management, the expected current functionality, and the trends to be expected.