{"id":12424,"date":"2013-10-10T12:10:40","date_gmt":"2013-10-10T12:10:40","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/access-management\/"},"modified":"2013-10-10T12:10:40","modified_gmt":"2013-10-10T12:10:40","slug":"access-management","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/28004\/access-management-am","title":{"rendered":"Access Management"},"content":{"rendered":"
Access management (AM) is the process of identifying, tracking, controlling and managing authorized or specified users’ access to a system, application or any IT instance. \n<\/p>\n
It is a broad concept that encompasses all policies, processes, methodologies and tools to maintain access privileges within an IT environment.<\/p>\n
Access management is primarily an information security, IT and data governance process used in granting access to valid users and prohibiting invalid users. Typically, AM is used in conjunction with identity access management (IAM). Identity management creates, provisions and controls different users, roles, groups and polices, whereas AM ensures that these roles and policies are followed. An AM-based application\/system stores the different user roles and their profiles, and process user access requests based on the data\/profile\/roles.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does Access Management Mean? Access management (AM) is the process of identifying, tracking, controlling and managing authorized or specified users’ access to a system, application or any IT instance. It is a broad concept that encompasses all policies, processes, methodologies and tools to maintain access privileges within an IT environment. Techopedia Explains Access Management […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[231,218,262,229,236],"class_list":["post-12424","definition","type-definition","status-publish","format-standard","hentry","definitioncat-it-business-alignment","definitioncat-cybersecurity","definitioncat-identity-access-governance","definitioncat-infrastructure-management","definitioncat-network-management"],"acf":[],"yoast_head":"\n