What's the difference between access control mechanisms and identity management techniques?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Access control is only one subset of identity management. Identity management covers a whole range of functions: access control, user provisioning, directory services, account auditing, role and group management, single sign-on (SSO) and privileged account management.
In addition, since 2005, identity management products have coalesced into full-blown identity and access management suites from large IT vendors like Sun Microsystems Inc., Oracle Corp., Microsoft, IBM and Novell Inc. There are four pillars to these IAM suites: identity administration, identity infrastructure, access management and auditing.
Roughly speaking, these four areas break down as follows: Identity administration sets up user roles and groups that allow access only to authorized systems. Identity infrastructure is the data store that holds user accounts and identity information, such as Active Directory or LDAP. Access management sets up user accounts with user IDs and passwords, or whatever system is used for access, like smart cards or biometrics. Finally, auditing is about reporting on accounts, such as who has access and to what systems.
Each of these pieces used to be individual products (and in some cases still are), but most have been snapped up and bolted in to IAM suites.
Compliance has driven the growth of these suites, as federal regulations like SOX, HIPAA and GLBA, and industry standards like PCI DSS have forced companies to account for user access to their systems. These regulations require enterprises to assign unique IDs to each user, be able to report regularly on who has access to systems and what the users are doing on those systems.
On another level, access control differs from identity management in that access control is strictly concerned with providing authentication credentials, such as user IDs and passwords or smart cards. The point is to provide users access, not prove their identity. This narrow focus, according to identity management experts, leads to cases of mistaken identity. People who shouldn't have access to systems, like malicious users, masquerade as legitimate users to gain unauthorized access. In this way, identity management revolves around verifying users -- ideally with multiple pieces of proof of their identity -- before issuing credentials.
- Learn about good features to look for when searching for access control software.
- Open source vs. commercial network access control products: Find out which one is right for your enterprise.
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
If a hacker gains control of a router and then uploads a new configuration opening ports up for communication, it may be possible to place a rootkit ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.