{"id":691,"date":"2022-04-07T12:04:40","date_gmt":"2022-04-07T11:04:40","guid":{"rendered":"https:\/\/forhumanity.center\/definitions\/?post_type=glossary&#038;p=691"},"modified":"2022-04-07T12:04:41","modified_gmt":"2022-04-07T11:04:41","slug":"identity-and-access-management-iam","status":"publish","type":"glossary","link":"https:\/\/forhumanity.center\/definitions\/glossario\/identity-and-access-management-iam\/","title":{"rendered":"Identity and Access Management (IAM)"},"content":{"rendered":"<p>framework of business processes, policies and technologies that facilitates the management of electronic or <a class=\"glossaryLink\"  href=\"https:\/\/forhumanity.center\/definitions\/glossario\/digital\/\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]'  tabindex='0' role='link'>digital<\/a> identities. With an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Systems used for IAM include single sign-on systems, two-factor authentication, multifactor authentication and privileged access management. These technologies also provide the ability to securely store identity and profile data as well as data <a class=\"glossaryLink\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/governance\/\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\" tabindex=\"0\" role=\"link\">governance<\/a> functions to ensure that only data that is necessary and relevant is shared.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>framework of business processes, policies and technologies that facilitates the management of electronic or <a class=\"glossaryLink\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/digital\/\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\" tabindex=\"0\" role=\"link\">digital<\/a> identities. With an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Systems used for IAM include single sign-on systems, two-factor authentication, multifactor authentication and privileged access management. These technologies also &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/identity-and-access-management-iam\/\"> <span class=\"screen-reader-text\">Identity and Access Management (IAM)<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-691","glossary","type-glossary","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identity and Access Management (IAM) - Definitions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity and Access Management (IAM) - Definitions\" \/>\n<meta property=\"og:description\" content=\"framework of business processes, policies and technologies that facilitates the management of electronic or digital identities. With an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Systems used for IAM include single sign-on systems, two-factor authentication, multifactor authentication and privileged access management. These technologies also &hellip; Identity and Access Management (IAM) Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/\" \/>\n<meta property=\"og:site_name\" content=\"Definitions\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-07T11:04:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/\",\"url\":\"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/\",\"name\":\"Identity and Access Management (IAM) - Definitions\",\"isPartOf\":{\"@id\":\"https:\/\/forhumanity.center\/definitions\/#website\"},\"datePublished\":\"2022-04-07T11:04:40+00:00\",\"dateModified\":\"2022-04-07T11:04:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/forhumanity.center\/definitions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity and Access Management (IAM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/#website\",\"url\":\"https:\/\/forhumanity.center\/definitions\/\",\"name\":\"Definitions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/forhumanity.center\/definitions\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/forhumanity.center\/definitions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/#organization\",\"name\":\"Definitions\",\"url\":\"https:\/\/forhumanity.center\/definitions\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/forhumanity.center\/definitions\/wp-content\/uploads\/2024\/11\/Asset-7.svg\",\"contentUrl\":\"https:\/\/forhumanity.center\/definitions\/wp-content\/uploads\/2024\/11\/Asset-7.svg\",\"width\":744,\"height\":102,\"caption\":\"Definitions\"},\"image\":{\"@id\":\"https:\/\/forhumanity.center\/definitions\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity and Access Management (IAM) - Definitions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/","og_locale":"en_GB","og_type":"article","og_title":"Identity and Access Management (IAM) - Definitions","og_description":"framework of business processes, policies and technologies that facilitates the management of electronic or digital identities. With an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Systems used for IAM include single sign-on systems, two-factor authentication, multifactor authentication and privileged access management. These technologies also &hellip; Identity and Access Management (IAM) Read More &raquo;","og_url":"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/","og_site_name":"Definitions","article_modified_time":"2022-04-07T11:04:41+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/","url":"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/","name":"Identity and Access Management (IAM) - Definitions","isPartOf":{"@id":"https:\/\/forhumanity.center\/definitions\/#website"},"datePublished":"2022-04-07T11:04:40+00:00","dateModified":"2022-04-07T11:04:41+00:00","breadcrumb":{"@id":"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/forhumanity.center\/definitions\/glossary\/identity-and-access-management-iam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/forhumanity.center\/definitions\/"},{"@type":"ListItem","position":2,"name":"Identity and Access Management (IAM)"}]},{"@type":"WebSite","@id":"https:\/\/forhumanity.center\/definitions\/#website","url":"https:\/\/forhumanity.center\/definitions\/","name":"Definitions","description":"","publisher":{"@id":"https:\/\/forhumanity.center\/definitions\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/forhumanity.center\/definitions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/forhumanity.center\/definitions\/#organization","name":"Definitions","url":"https:\/\/forhumanity.center\/definitions\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/forhumanity.center\/definitions\/#\/schema\/logo\/image\/","url":"https:\/\/forhumanity.center\/definitions\/wp-content\/uploads\/2024\/11\/Asset-7.svg","contentUrl":"https:\/\/forhumanity.center\/definitions\/wp-content\/uploads\/2024\/11\/Asset-7.svg","width":744,"height":102,"caption":"Definitions"},"image":{"@id":"https:\/\/forhumanity.center\/definitions\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/glossary\/691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":1,"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/glossary\/691\/revisions"}],"predecessor-version":[{"id":710,"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/glossary\/691\/revisions\/710"}],"wp:attachment":[{"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/media?parent=691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}