Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers identify and access management as well as access control. These concepts include the people, processes and systems that manage and enterprise system, all of which work in conjunction to ensure: • Entity identity verification • Correct access level relative to asset Participants also learn about the phases of identify and access management (IAM), centralized directory services and privileged user management. The purpose of authorization and access management is to control what users can and cannot do; they must be functional, operational and trusted and should be based on sound security principles.