Identity Management


Enterprise identity management (IdM), or ID management, is the part of identity and access management systems (IAM) responsible for identifying, authenticating and authorizing employees and their use of corporate information technology (IT) resources.

The second part of IAM, access management, works in conjunction with identity management to ensure employees have access to the specific hardware and applications they are authorized to use for their jobs. Access management can also enforce time and location policies for IT resources to help secure mission-
How IdM Works in Corporate Environments

Identity management systems enable IT administrations to define and change an individual’s role as well as track their login details and IT activity. Admins can also enforce ID management policies based on user roles and resource usage. Another key part of modern identity management systems is to support Governance, Risk and Compliance with regard to increasingly stringent regulatory requirements.

While Identity management has traditionally been delivered and managed as part of an on-premises bundle collection of software and hardware, Identity-as-a-Service (IDaaS) solutions that are offered through the cloud or SaaS (software-as-a-service) on a subscription basis have become more prevalent in corporate environments for ID management recently as well.

Read Also:

  • Workspace-as-a-Service (WaaS)

    Workspace-as-a-Service, or WaaS, is a form of desktop virtualization that companies utilize to provide their employees with access to business applications and data from anywhere at any time using the employee’s device of a choice. With workspace-as-a-service solutions, employees can log in to the WaaS provider’s service and be provided with a virtual workspace desktop […]

  • Bring Your Own Apps (BYOA)

    Short for Bring Your Own Applications as well as Build Your Own Apps, BYOA is an evolution of the term BYOD (Bring Your Own Device) in the consumerization of IT that refers to the growing use of personal apps by employees for increased productivity in their work environments. Examples of Bring Your Own Apps span […]

  • the iPad Pro

    The Apple iPad Pro is a larger version of the original Apple iPad that the company announced on September 9th, 2015, with retail availability expected later in November of the same year. While the original iPad’s screen measured 9.7 inches, the iPad Pro is a 12.9-inch tablet with 2,732 x 2,048 pixel resolution that is […]

  • Android Marshmallow

    Marshmallow is the official Android codename for the upcoming 6.0 update of the open source Android mobile operating system. Marshmallow was first announced at Google I/O in May 2015 as the Android M release, and the mobile OS is expected to make its official debut in October or November 2015 as the successor to the […]

  • Personally Identifiable Information (PII)

    Personally Identifiable Information, or PII, refers to information or data that can be used to discover or distinguish an individual’s identity and specific details about the individual. While definitions for PII vary slightly, the National Institute of Standards and Technology (NIST) specifically defines personally identifiable information as: “any information about an individual maintained by an […]


Disclaimer: Identity Management definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.