• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

Question 1

November 9, 2023 by David Lanter 32 Comments

What is the difference between identity management and access management?

 

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Reader Interactions

Comments

  1. Andrew Young says

    November 9, 2023 at 10:47 am

    Identity management focuses on the identification and creation of accounts assigned to users. This includes account creation, deletion, suspension, and other actions relating to how a system identifies, classifies and “sorts” a user. Access management on the other hand deals with privilege and elevation of user profiles. Once a profile or “identity” for a user has been generated, access management dictates what access and functions the user can perform in the system. Things such as admin rights vs standard user rights fall under this category. Essentially, the identity step is where the user identifies themselves, and the access management step is where they are told what they can and can’t do

    Log in to Reply
    • Ikenna Alajemba says

      November 11, 2023 at 10:27 am

      Yes Andrew, access to system is on need to know basis. One password cannot be used to authenticate and access all systems is another way to illustrate this point.

      Log in to Reply
      • Akiyah says

        November 12, 2023 at 2:38 pm

        Hi Ikenna,

        While I understand the need for a “need to know” basis for system access, it’s worth noting that in the case of interconnected systems with a single sign-on (SSO), a singular set of credentials is used to authenticate and access multiple systems. This prompts reflection on the security of SSO. Safety is ensured through the implementation of multi-factor authentication, which adds an extra layer of security.

        Log in to Reply
  2. Jeffrey Sullivan says

    November 9, 2023 at 11:41 am

    Digital identity is a representation of an entity in a specific context. Identity management includes users, identity provider, service provider Identity and personal authentication device. Identity management refers to: the process of representing, using, maintaining, deprovision and authenticating entities as digital identities in computer networks.” IM is more or less specific to the user and their specific account. Access Management deals with permissions and privileges. According to tenfold-sceuity.com,” the distinction is similar to the difference between the terms and authentication and authorization. First a user logs into the system, then they can access resources their account is cleared for”. An example of access management would be employees of certain departments that can have access to certain controls in a system. This helps with the keeping the data transparent and lessens falsification of accounting, sales etc. in a business environment due to access management.

    Identity Management vs Access Management: The Difference Explained (tenfold-security.com)

    Log in to Reply
    • Chidi Okafor says

      November 12, 2023 at 5:23 pm

      Wel said, Jeff. Your description drives home the distinction between AM and IM but they are also work together to maintain data transparency, reduced falsification and enhanced security environment. Identity Management sets the foundation by establishing and authenticating digital identities, and Access Management builds upon this foundation by regulating and controlling access based on authenticated identities.

      Log in to Reply
    • Erskine Payton says

      November 14, 2023 at 6:05 pm

      Very well articulate definitions and points. Thank you for sharing the website as it helped to get a different view from what read in the text. In my experience people often get the two either mixed up or thing they are the same when they clearly are not.

      Log in to Reply
  3. Marc Greenberg says

    November 10, 2023 at 5:19 am

    Identity management is used to determine whether a user has access to a system. Access control, a sub-component of asset management and comes after Identity management, sets the level of access and permissions that an identified user has to that IT system. The system can authorize their permissions via access management.

    Identity management includes the following areas: User provisioning, creating, maintaining, reviewing, and retiring user identities for access.

    Access control is the process to monitor and control access granted to an identified user.

    Log in to Reply
    • Ashley A. Jones says

      November 14, 2023 at 10:10 am

      Marc, your explanation is very succinct. It only makes sense to think of identity and access management as working together. Thinking of it the way you explained helps to create a funnel, in a sense, for thinking of how these components together. In my explanation, I spoke more on IAM as it relates to resources and since we are auditors, it may be worthwhile to frame this question around asset management. Good call!

      Log in to Reply
  4. Ikenna Alajemba says

    November 10, 2023 at 8:23 pm

    As we delve deeper into the realms of cybersecurity, it becomes pertinent to draw clear distinctions between these two critical concepts: Identity Management and Access Management.

    At its essence, Identity Management, involves a framework of policies and technologies ensuring the right individuals have access to the technology resources they need. It covers the process of identifying individuals in a system and controlling their access to resources by placing restrictions on user IDs and passwords.

    Conversely, Access Management is a subset of identity management and focuses explicitly on the process through which enterprises manage access to specific resources. It defines which users are granted or denied access, ensuring that everyone gets the appropriate level of access. It’s about the finer details, ensuring an individual only has access to necessary data or systems to execute a job.

    In conclusion, while Identity Management sets out the groundwork for the entire system, Access Management zooms into the specifics, granting access on need to know basis.

    Log in to Reply
    • Jeffrey Sullivan says

      November 11, 2023 at 8:54 am

      I like how you pointed out that access management zooms into the specifics as that have me more of a visual on the subject. Identity management identifies the user while access management explains/admins what the user has access to. For example, like in the SAP environment SD users can access MM part of system but will not have access to edit data.

      Log in to Reply
  5. Michael Obiukwu says

    November 11, 2023 at 12:13 pm

    Understanding the conceptual differentiation between identity management and access management provides an uncomplicated comprehension of their functionalities in safeguarding information systems. Identity Management (IM) primarily involves the definition, assignment and management of the roles and access privileges of individual users within an IT system. IM’s principal focus is matching users’ online identities to their real-life identities and providing them with a single set of credentials.

    On the other hand, Access Management (AM) is fundamentally focused on authorizing and authenticating these users, based on their already established identities, to ensure they only have access to the resources they need to perform their roles efficiently; thus, creating a critical boundary for unauthorized access.

    In essence, the main difference lies in their primary functions; Identity Management is concerned with identification – who the user is, while Access Management is concerned with authorization – what the identified user can do. Both form essential components of an effective enterprise security strategy and should not be treated as interchangeable terms.

    Log in to Reply
    • Jeffrey Sullivan says

      November 12, 2023 at 12:42 pm

      Great Post Mike, you made me think of the two terms on how it is used in a business environment. Since coming back to Comcast my profile has been updated incorrectly so I’m recognized in the system, allowed onto network but I cannot access specific items, apps etc. This is an example of the difference between the two that I have been experiencing the past few weeks.

      Log in to Reply
      • Akiyah says

        November 12, 2023 at 2:30 pm

        Hi Jeff,

        I previously transitioned to a new role within the same company. Upon leaving my previous position on a Friday, there was an unofficial and incorrect termination of my identity on the same day. I was unemployed for a weekend! Subsequently, on the following Monday, I was re-entered into the system with a new title and roles for the new position. Despite the termination from the previous role, I still retained some access from that position, which was an oversight in the management of my identity and access.

        Log in to Reply
        • Ashley A. Jones says

          November 14, 2023 at 10:01 am

          Oh wow, Akiyah and Jeff, that is nuts! I have never had this happen to me. That really brings my attention to who’s responsibility it is within the organization to monitor IAM. I have oftentimes seen that these responsibilities may go to someone who is not necessarily well versed (specifically anyone willing to do the job high enough in the company). Never received a 365 view on these situations so this is interesting. It happens!

          Log in to Reply
  6. Akiyah says

    November 12, 2023 at 2:21 pm

    Identity management involves the administration of digital identities, one of potentially many, for one or more users. Within a company’s information system, identity management is utilized to authenticate, authorize, and verify users and user accounts.

    Access management pertains to the regulation of user access within the information system. It specifically controls which applications, data, or systems a user (digital identity) can access. Technologies such as access control and multi-factor authentication are often employed in access management.

    While distinct, identity management and access management are interconnected. Identity management establishes and manages the user identity profile, whereas access management controls and oversees user access to system resources.

    Log in to Reply
    • Chidi Okafor says

      November 12, 2023 at 5:31 pm

      Hi Akiyah, your answer is well rounded and completely explains how IdM is connected to AM. While IdM establishes and manages user identity profiles, AM not only controls user access but also relies on the accurate and secure management of these identities by IdM. In other words, the effectiveness of access control in AM is contingent on the accuracy and security of the digital identities established and maintained by IM.

      Log in to Reply
      • Akiyah says

        November 13, 2023 at 9:38 pm

        Hi Chidi,

        That is my understanding of how Identity and Access Management (IAM) works. IdM and Access Management collaborate throughout the entire process. The integration between these systems is crucial for maintaining security and compliance during employee onboarding and termination. For instance, in the termination process, IdM deactivates the user profile. Once the user profile is deactivated, Access Management can then step in to terminate the associated user profile rights.

        Log in to Reply
  7. Chidi Okafor says

    November 12, 2023 at 5:13 pm

    Identity Management is the process that ensures legitimate individuals have proper access to an organization’s resources. It encompasses identification, authorization, digital identity, security, and user privacy. Identity management helps prevent unauthorized access, protects data with encryption, and raises alerts if an identity doesn’t match database details.

    Access Management (AM) is an organizational process focused on system security to monitor and control access granted to an identified user. It manages, controls, and sets access privileges, rights, and policies within a system. AM utilizes user identity to assign specific privileges and permissions to individuals and groups for accessing an organization’s resources and networks.

    Log in to Reply
    • Alex Ruiz says

      November 14, 2023 at 3:35 pm

      Chidiebere, you’ve provided a clear distinction between identity management and access management. I’m curious about how the two interconnect in ensuring comprehensive security. Can you think of any specific challenges or best practices in integrating identity management with access management to create a robust security framework for organizations?

      Log in to Reply
  8. Akintunde Akinmusire says

    November 12, 2023 at 6:08 pm

    Identity management ensures that specific users have access to the IT systems while access management focuses on users’ privileges within the organization. With access management, users would be provided certain privileges based on their roles. Both identity management and access management help an organization’s security by ensuring only the right users have access to the organization’s resources.

    Log in to Reply
    • Andrew Young says

      November 13, 2023 at 11:32 am

      This is a good summary. The differences you noted here are very important, since providing “carte blanche” access to systems to just a standard user can create a severe risk for access breaches or data corruption. This also ensures that any compromised accounts are properly logged in the event of a breach so that admins can track and know who has access to what info and data

      Log in to Reply
  9. Alyanna Inocentes says

    November 12, 2023 at 7:55 pm

    Identity management refers to managing and authenticating the identities of users or entities within a system. It involves creating, maintaining, and deleting user identities. Identity management also involves verifying the identity of users through various methods such as usernames, passwords, multifactor authentication, etc.

    As for access management, it’s the process of controlling and regulating access to resources or systems. Access management focuses on defining and enforcing policies that determine who or what can access specific resources and under what conditions. In addition, roles are clearly defined as certain access will be provided based on job responsibilities, functions, or levels of authority.

    Log in to Reply
    • Marc Greenberg says

      November 13, 2023 at 5:58 pm

      Good definition , keep in mind identity management is used to determine whether a user has access to a system. Access control, a sub-component of asset management and comes after Identity management, Access control is the process to monitor and control access granted to an identified user. Job responsibilities or roles are part of it, but it can be as simple of one or two, with one person being an admin.

      Log in to Reply
      • Alyanna Inocentes says

        November 13, 2023 at 7:03 pm

        Thanks for expanding, Marc! I’ll definitely keep that in mind. I was reading your post and I saw that you did mention Access Control. It honestly didn’t even cross my mind that access control is a sub component of asset management and that it comes after identity management. It makes me wonder if there are any specific challenges or best practices when implement these measures.

        Log in to Reply
  10. Alex Ruiz says

    November 12, 2023 at 8:26 pm

    Identity management is concerned with the creation and maintaining of identities while access management focuses on controlling and monitoring access rights that are associated with identities. We combine them so they work together to ensure security within an organization.

    Log in to Reply
    • Akintunde Akinmusire says

      November 14, 2023 at 6:30 pm

      Hi Alex, you are right about the concept of identity management and access management. Identity management verifies users’ identities in the systems, and access management is role-based. I also like how you emphasized that the two work hand in hand. In an organization, users need accounts to perform their tasks efficiently but their privileges should be limited based on the roles.

      Log in to Reply
  11. Erskine Payton says

    November 12, 2023 at 8:59 pm

    The difference between identity management and access management is that identity management manages with user accounts (username/password). It proves to the server that you are who you say you are. While access management manages account roles, account permissions and can determine what users can and can’t see on the network, intranet, or shared file server.

    Log in to Reply
  12. Erskine Payton says

    November 12, 2023 at 9:00 pm

    Identity management is made to challenge a user account to verify who they are. And then based on the account’s identity and role. Access management is the gate keeper decides whether they have permissions to access information. This is vital because if audited, we can view the identity of the user and what privileges they have. Depending on that we know where and where not to look.

    Log in to Reply
    • Akintunde Akinmusire says

      November 14, 2023 at 6:21 pm

      Hi Erskine, I agree with you. You clearly explained the two systems and what they are used for. Identity management checks to see if the users are who they claim to be while access management determines the permission users possess in the system.

      Log in to Reply
  13. Ashley A. Jones says

    November 12, 2023 at 11:37 pm

    According to Maliki and Seigneur in Vacca’s chapter 71, the evolution of identity management answers the question of how enterprises handle identity mgmt “that have automated their procedures and have a proliferation of applications with deprovisioning but are still in a domain-centric model” .. and “resources shared between domains.” The focus of identity management systems lies within reducing identity theft, managing a high number of users within an organization, reachability (being able to reach people and be reached accurately), authenticity, anonymity, and organizational personal data management. Identity management is truly a matter of nonrepudiation and the ability to manage the scale of users within an organization. Access management is more in line with authorization once a user has been authenticated. Assigning the authenticated user access to enterprise resources while explicitly denying access for unauthorized users which can be a bit difficult if a specific user finds themselves a victim of a man in the middle attack. Though, access control is fundamentally based on user attributes according to Vacca. With today’s technology and decentralized systems, it is advantageous to have an IAM system that allows the end user to have as much control as possible. The downfall of Microsoft Passport is a testimony to this point. One big issue with having third party systems managing many users is having a single point of failure so it is ideal to use a federated identity management system. However, with a few different model options it may be worthwhile to juxtapose models depending on the org structure.

    Log in to Reply
    • Kelly Conger says

      December 6, 2023 at 12:37 pm

      Ashley, I agree with your summary of the key points regarding identity and access management. You accurately captured the evolution of identity management, its focus areas, and its relationship with access control. Highlighting the importance of non-repudiation, scalability, and user control reinforces the crucial role of IAM in modern organizations. Your point about the potential pitfalls of centralized authentication systems, like Microsoft Passport, and the advantages of federated approaches is insightful. Considering the different IAM models based on an organization’s structure further demonstrates the complexity and adaptability of these systems.

      Log in to Reply
  14. Kelly Conger says

    December 6, 2023 at 12:22 pm

    Identity management focuses on verifying users’ identities to ensure they are who they claim to be. In contrast, access management controls what resources each user can access based on their role and permissions. Essentially, identity management confirms “who” requests access, while access management determines “what” they can access. Both are crucial for maintaining data security and ensuring that only authorized users can access sensitive information.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in