Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Identity management

Index Identity management

Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons". [1]

73 relations: Academic journal, Access control, Application software, Authentication, Authorization, Claims-based identity, Commerce, Communication protocol, Computer security, Delegation (computer security), Digital card, Digital identity, Digital signature, Directory service, Dongle, Federated identity, Framework Programmes for Research and Technological Development, Hardware security module, Identity (philosophy), Identity assurance, Identity driven networking, Identity management, Identity management system, Identity provider, Identity theft, Identity-based security, Information privacy, Information security, Initiative for Open Authentication, International Organization for Standardization, ISO/IEC JTC 1, List of single sign-on implementations, Loyalty program, Mass surveillance, Mobile identity management, Mobile signature, Multi-factor authentication, Mutual authentication, Namespace, National Institute of Standards and Technology, OAuth, Object identifier, OECD, Online identity management, OpenID, OpenID Connect, Password, Password management, Personal identification number, Personally identifiable information, ..., Privacy, Property (philosophy), Provisioning, Public key certificate, Reconciliation (accounting), Role-based access control, SAML 2.0, SAML-based products and services, Security, Security Assertion Markup Language, Security token, Semantics, Service provider, Single sign-on, Smart card, Social networking service, Social web, Software token, User modeling, Web service, Workflow application, WS-Security, WS-Trust. Expand index (23 more) »

Academic journal

An academic or scholarly journal is a periodical publication in which scholarship relating to a particular academic discipline is published.

New!!: Identity management and Academic journal · See more »

Access control

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.

New!!: Identity management and Access control · See more »

Application software

An application software (app or application for short) is a computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

New!!: Identity management and Application software · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Identity management and Authentication · See more »

Authorization

Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.

New!!: Identity management and Authorization · See more »

Claims-based identity

Claims-based identity is a common way for applications to acquire the identity information they need about users inside their organization, in other organizations, and on the Internet.

New!!: Identity management and Claims-based identity · See more »

Commerce

Commerce relates to "the exchange of goods and services, especially on a large scale.” Commerce includes legal, economic, political, social, cultural and technological systems that operate in any country or internationally.

New!!: Identity management and Commerce · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

New!!: Identity management and Communication protocol · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Identity management and Computer security · See more »

Delegation (computer security)

Delegation is the process of a computer user handing over their authentication credentials to another user.

New!!: Identity management and Delegation (computer security) · See more »

Digital card

A digital card, virtual card or cloud card is an online hosted, digital virtual representation of any plastic card or a generic identification method in IdM (Identity Management).

New!!: Identity management and Digital card · See more »

Digital identity

A digital identity is information on an entity used by computer systems to represent an external agent.

New!!: Identity management and Digital identity · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Identity management and Digital signature · See more »

Directory service

In computing, directory service or name service maps the names of network resources to their respective network addresses.

New!!: Identity management and Directory service · See more »

Dongle

A dongle is a small piece of hardware that connects to another device to provide it with additional functionality.

New!!: Identity management and Dongle · See more »

Federated identity

A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

New!!: Identity management and Federated identity · See more »

Framework Programmes for Research and Technological Development

The Framework Programmes for Research and Technological Development, also called Framework Programmes or abbreviated FP1 to FP7 with "FP8" being named "Horizon 2020", are funding programmes created by the European Union/European Commission to support and foster research in the European Research Area (ERA).

New!!: Identity management and Framework Programmes for Research and Technological Development · See more »

Hardware security module

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.

New!!: Identity management and Hardware security module · See more »

Identity (philosophy)

In philosophy, identity, from ("sameness"), is the relation each thing bears only to itself.

New!!: Identity management and Identity (philosophy) · See more »

Identity assurance

Identity assurance in the context of federated identity management is the ability for a party to determine, with some level of certainty, that an electronic credential representing an entity (human or a machine) with which it interacts to effect a transaction, can be trusted to actually belong to the entity.

New!!: Identity management and Identity assurance · See more »

Identity driven networking

Identity driven networking (IDN) is the process of applying network controls to a network device access based on the identity of an individual or group of individuals responsible to or operating the device.

New!!: Identity management and Identity driven networking · See more »

Identity management

Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".

New!!: Identity management and Identity management · See more »

Identity management system

An identity management system refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity management Additional terms are used synonymously with "identity management system" including;.

New!!: Identity management and Identity management system · See more »

Identity provider

An identity provider (abbreviated IdP) is a system entity that creates, maintains, and manages identity information for principals while providing authentication services to relying party applications within a federation or distributed network.

New!!: Identity management and Identity provider · See more »

Identity theft

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

New!!: Identity management and Identity theft · See more »

Identity-based security

Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual.

New!!: Identity management and Identity-based security · See more »

Information privacy

Information privacy, or data privacy (or data protection), is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

New!!: Identity management and Information privacy · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Identity management and Information security · See more »

Initiative for Open Authentication

Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the adoption of strong authentication.

New!!: Identity management and Initiative for Open Authentication · See more »

International Organization for Standardization

The International Organization for Standardization (ISO) is an international standard-setting body composed of representatives from various national standards organizations.

New!!: Identity management and International Organization for Standardization · See more »

ISO/IEC JTC 1

ISO/IEC JTC 1 is a joint technical committee of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

New!!: Identity management and ISO/IEC JTC 1 · See more »

List of single sign-on implementations

These are some of the Single Sign-On (SSO) implementations available.

New!!: Identity management and List of single sign-on implementations · See more »

Loyalty program

Loyalty programs are structured marketing strategies designed by merchants to encourage customers to continue to shop at or use the services of businesses associated with each program.

New!!: Identity management and Loyalty program · See more »

Mass surveillance

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens.

New!!: Identity management and Mass surveillance · See more »

Mobile identity management

Mobile identity is a development of online authentication and digital signatures, where the SIM card of one’s mobile phone works as an identity tool.

New!!: Identity management and Mobile identity management · See more »

Mobile signature

A mobile signature is a digital signature generated either on a mobile phone or on a SIM card on a mobile phone.

New!!: Identity management and Mobile signature · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).

New!!: Identity management and Multi-factor authentication · See more »

Mutual authentication

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS).

New!!: Identity management and Mutual authentication · See more »

Namespace

In computing, a namespace is a set of symbols that are used to organize objects of various kinds, so that these objects may be referred to by name.

New!!: Identity management and Namespace · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Identity management and National Institute of Standards and Technology · See more »

OAuth

OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.

New!!: Identity management and OAuth · See more »

Object identifier

In computing, object identifiers or OIDs are an identifier mechanism standardized by the International Telecommunications Union (ITU) and ISO/IEC for naming any object, concept, or "thing" with a globally unambiguous persistent name.

New!!: Identity management and Object identifier · See more »

OECD

The Organisation for Economic Co-operation and Development (OECD; Organisation de coopération et de développement économiques, OCDE) is an intergovernmental economic organisation with 35 member countries, founded in 1961 to stimulate economic progress and world trade.

New!!: Identity management and OECD · See more »

Online identity management

Online identity management (OIM), also known as online image management, online personal branding or personal reputation management (PRM), is a set of methods for generating a distinguished Web presence of a person on the Internet.

New!!: Identity management and Online identity management · See more »

OpenID

OpenID is an open standard and decentralized authentication protocol.

New!!: Identity management and OpenID · See more »

OpenID Connect

OpenID Connect (OIDC) is an authentication layer on top of OAuth 2.0, an authorization framework.

New!!: Identity management and OpenID Connect · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Identity management and Password · See more »

Password management

There are several forms of software used to help users or organizations better manage passwords.

New!!: Identity management and Password management · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Identity management and Personal identification number · See more »

Personally identifiable information

Personal information, described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.

New!!: Identity management and Personally identifiable information · See more »

Privacy

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.

New!!: Identity management and Privacy · See more »

Property (philosophy)

In philosophy, mathematics, and logic, a property is a characteristic of an object; a red object is said to have the property of redness.

New!!: Identity management and Property (philosophy) · See more »

Provisioning

In telecommunication, provisioning involves the process of preparing and equipping a network to allow it to provide new services to its users.

New!!: Identity management and Provisioning · See more »

Public key certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.

New!!: Identity management and Public key certificate · See more »

Reconciliation (accounting)

Reconciliation.

New!!: Identity management and Reconciliation (accounting) · See more »

Role-based access control

In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users.

New!!: Identity management and Role-based access control · See more »

SAML 2.0

Security Assertion Markup Language 2.0 (SAML 2.0) is a version of the SAML standard for exchanging authentication and authorization data between security domains.

New!!: Identity management and SAML 2.0 · See more »

SAML-based products and services

SAML is a set of specifications that encompasses the XML-format for security tokens containing assertions to pass information about a user and protocols and profiles to implement authentication and authorization scenarios.

New!!: Identity management and SAML-based products and services · See more »

Security

Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces.

New!!: Identity management and Security · See more »

Security Assertion Markup Language

Security Assertion Markup Language (SAML, pronounced sam-el) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.

New!!: Identity management and Security Assertion Markup Language · See more »

Security token

Security tokens are physical devices used to gain access to an electronically restricted resource.

New!!: Identity management and Security token · See more »

Semantics

Semantics (from σημαντικός sēmantikós, "significant") is the linguistic and philosophical study of meaning, in language, programming languages, formal logics, and semiotics.

New!!: Identity management and Semantics · See more »

Service provider

A service provider (SP) provides organizations with consulting, legal, real estate, communications, storage, processing.

New!!: Identity management and Service provider · See more »

Single sign-on

Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems.

New!!: Identity management and Single sign-on · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Identity management and Smart card · See more »

Social networking service

A social networking service (also social networking site, SNS or social media) is a web application that people use to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections.

New!!: Identity management and Social networking service · See more »

Social web

The social web is a set of social relations that link people through the World Wide Web.

New!!: Identity management and Social web · See more »

Software token

A software token (a.k.a. soft token) is a type of two-factor authentication security device that may be used to authorize the use of computer services.

New!!: Identity management and Software token · See more »

User modeling

User modeling is the subdivision of human–computer interaction which describes the process of building up and modifying a conceptual understanding of the user.

New!!: Identity management and User modeling · See more »

Web service

The term web service is either.

New!!: Identity management and Web service · See more »

Workflow application

A workflow application is a software application which automates, to at least some degree, a process or processes.

New!!: Identity management and Workflow application · See more »

WS-Security

Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services.

New!!: Identity management and WS-Security · See more »

WS-Trust

WS-Trust is a WS-* specification and OASIS standard that provides extensions to WS-Security, specifically dealing with the issuing, renewing, and validating of security tokens, as well as with ways to establish, assess the presence of, and broker trust relationships between participants in a secure message exchange.

New!!: Identity management and WS-Trust · See more »

Redirects here:

Access and Identity Management, I&AM, ID management, IdM, Identity Access Management, Identity Management, Identity Mangement, Identity access management, Identity and Access Management, Identity and access management, Privileged Identity Management, Privileged identity management.

References

[1] https://en.wikipedia.org/wiki/Identity_management

OutgoingIncoming
Hey! We are on Facebook now! »