Identity and Access Management
What is Identity and Access Management and Why is it important to Business?
Basic components of IAM
- How individuals are identified in a system
- How roles are identified in a system and how they are assigned to individuals
- Adding, removing and updating individuals and their roles in a system
- Assigning levels of access to individuals or groups of individuals
- Protecting the sensitive data within the system and securing the system itself
What IAM systems should include
Identity access management systems should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.
Technologies for identity access and management should simplify the user provisioning and account setup process. These systems should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.
These systems also need to balance the speed and automation of their processes with the control that administrators need to monitor and modify access rights. Consequently, to manage access requests, the central directory needs an access rights system that automatically matches employee job titles, business unit identifiers and locations to their relevant privilege levels.
Multiple review levels can be included as workflows to enable the proper checking of individual requests. This simplifies setting up appropriate review processes for higher-level access as well as easing reviews of existing rights to prevent privilege creep, the gradual accumulation of access rights beyond what users need to do their jobs.
IAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. The system should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.
IAM in the enterprise
How Vouch dIAM Solves the Primary Security Issue facing all Identity Access Management Systems
Vouch dIAM Integrates with existing Identity Access Management Systems
- Remove the source of breached password databases – by replacing centralized password storage with decentralized blockchain storage of user credentials (see Vouch System Overview).
- Completely eliminate passwords and related password reset costs – Passwords are a security weakness, a terrible user experience and costly for the enterprise to support (see Cost of Password Resets).
- Using Modern MFA Security Factors – simply the user experience, while also providing the added security of MFA with innovative security factors like personas and quorums, modern factors such as biometrics, the user’s device ID and (coming soon) location, time of day and network/IP address factors. (see Multifactor Authentication)
- Protect User Credentials – by not storing any Personally Identifiable Information (PII), and by enabling the assertion of users’ credentials through Biometrics that reduce user friction Vouch is more secure than passwords.