IAM architecture objective
Provide a coherent design so that the right subjects gain the right access to the right resources at the right time based on policy and risk
Digital identity
Set of attributes that uniquely describes a subject such as a person device or service within a given context
Authoritative source of identity
System of record that provides the most trusted identity data for a population such as human resources for employees
Identity lifecycle
Sequence from onboarding through changes to offboarding where identities and associated access must be created modified and removed
Joiner mover leaver process
Standard workflow that creates access for new users adjusts privileges when roles change and revokes access when users depart
Identity proofing
Process of verifying that a person or entity is genuinely who they claim to be before issuing credentials or privileged access
Authentication
Process of verifying a claimed identity using one or more factors such as something known something possessed or something inherent
Authorization
Decision about what actions an authenticated subject is allowed to perform on which resources based on policies and attributes
Single sign on
Capability that enables a subject to authenticate once and then access multiple applications without repeated credential entry
Federated identity
Trust arrangement in which one domain authenticates a subject and passes assertions to another domain which relies on that information
Identity provider
Service that performs authentication and issues tokens or assertions containing identity information and claims
Relying party
Application or service that consumes assertions or tokens from an identity provider and makes authorization decisions
Claims based access control
Model where decisions are based on claims in tokens such as roles group membership or device posture rather than just identity
Role based access control
Authorization model that assigns permissions to roles and then assigns users to roles to simplify entitlement management
Attribute based access control
Model that evaluates subject object action and environmental attributes against rules to reach fine grained decisions
Context aware access
Access control approach that considers contextual attributes such as location time risk score or device state when granting access
Directory service
Central repository that stores identity objects credentials groups and related attributes and supports lookup and authentication
Group and role design
Architectural activity of structuring groups and roles to reflect job functions segregation of duties and least privilege
Least privilege in IAM
Principle that access rights should be limited to the minimum necessary for subjects to perform their responsibilities
Segregation of duties in IAM
Practice of ensuring no single identity has conflicting capabilities that together could enable significant fraud or error
Privileged account
Identity with elevated capabilities such as system administration configuration changes or wide data access requiring stronger controls
Privileged access management
Set of processes and tools such as vaulting session control and just in time elevation that govern use of powerful accounts
Service account governance
Management of non human accounts including purpose scoping credential protection rotation and ownership
Machine identity
Identity used by devices applications containers or services to authenticate to other components in machine to machine interactions