{"id":7014,"date":"2013-09-07T15:48:30","date_gmt":"2013-09-07T15:48:30","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/identity-management\/"},"modified":"2013-09-07T15:48:30","modified_gmt":"2013-09-07T15:48:30","slug":"identity-management","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/13636\/identity-management-id-management","title":{"rendered":"Identity Management"},"content":{"rendered":"
Identity management (ID Management\/IdM) is the process of identifying, authenticating and authorizing an individual or group of individuals on an application, system or comprehensive IT environment.<\/p>\n
It is an information security domain that deals with the administrative tasks and processes of validating the identity and controlling the access of individuals\/users for hardware or software.<\/p>\n
Identity management is primarily used to authenticate a user on a system and ascertain whether that user is allowed or prohibited access to a particular system. Typically, identity management consists of various phases including the user authentication, the level of authorization and the type of roles a user may have. It also deals with the level of access a user has on a particular system. For example, a user might be given access to a system\/software, but not all of its components.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does Identity Management Mean? Identity management (ID Management\/IdM) is the process of identifying, authenticating and authorizing an individual or group of individuals on an application, system or comprehensive IT environment. It is an information security domain that deals with the administrative tasks and processes of validating the identity and controlling the access of individuals\/users […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,262,236,266],"class_list":["post-7014","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-identity-access-governance","definitioncat-network-management","definitioncat-tech-101"],"acf":[],"yoast_head":"\n