• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Question 1

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

What is the difference between identity management and access management?

 

Filed Under: 5a: Identity Management and Access Control Tagged With:

Reader Interactions

Comments

  1. Changyang Sui says

    June 11, 2025 at 7:43 am

    Identity management refers to “the process of repre senting, using, maintaining, deprovisioning and authenti cating entities as digital identities in computer networks”
    Access Management is to controls what resources a user can access after authentication.
    IdM ensures a user is who they claim to be (authentication).
    AM determines what resources that authenticated user can access (authorization).

    Log in to Reply
  2. Xinran Wu says

    June 16, 2025 at 11:15 am

    Identity management refers to “the process of representing, using, maintaining, deprovisioning and authenticating entities as digital identities in computer networks”, so identity management is used for identification.
    Access management is to ensure that only authorized users or entities can access a particular resource.

    Log in to Reply
  3. Yingyu Wang says

    June 17, 2025 at 7:21 am

    Identity management primarily includes the management of user attributes, implementation of authentication protocols, and ensuring that users have control over their personal data. Access management, on the other hand, focuses on making permission decisions, session management, and audit tracking.
    In terms of technology, identity management typically uses LDAP directory services, FIDO Alliance biometric authentication, and other tools, while access management generally utilizes protocols like SAML, OAuth 2.0, and others.

    Log in to Reply
  4. Jingni Li says

    June 18, 2025 at 2:05 am

    Identity management is about “getting an ID card” and solving the problem of “who are you”.
    Access management is about “entering the door with your ID card”, solving the problem of “where can you go”.
    The combination of the two is like “first confirm that you are an employee, and then decide which office you can enter”.

    Log in to Reply
  5. Ruizhen Zhang says

    June 18, 2025 at 4:20 am

    Identity Management involves the process of creating, maintaining, and deleting user identity information. Access management is about controlling access to resources and services.
    Identity management focuses on creating, identifying, and managing user identities, while access management focuses on deciding whether and how users can access specific resources based on their identity.

    Log in to Reply
  6. Siyu Li says

    June 18, 2025 at 4:43 am

    Identity management focuses on creating, maintaining, and governing digital identities of users/devices, handling tasks like account provisioning and lifecycle management, while access management controls what resources those identities can access and how, enforcing policies and authorization rules. The former establishes “who you are,” and the latter dictates “what you can do” with that identity, with IdM serving as the foundation for AM to make access decisions.

    Log in to Reply
  7. Yufei Zhu says

    June 18, 2025 at 10:00 am

    Identity management mainly focuses on the identities of users within an organization, including identity creation, maintenance, deletion, and permissions, etc. It can be used to ensure the validity and authenticity of user identities.
    Access management restricts access to sensitive data by defining the permission levels of users and determines how users access a resource.

    Log in to Reply
  8. Jialin Fan says

    June 18, 2025 at 10:16 am

    Identity management focuses on creating, maintaining, and managing digital identities of users, including information such as usernames, passwords, and personal details. It is about who the users are. Access management, on the other hand, is concerned with determining what resources users can access and under what conditions. It is about controlling the access rights of users to specific resources. So, the main difference is that identity management deals with the identification of users, while access management deals with the authorization of their access to resources.

    Log in to Reply
  9. Yiying Chen says

    June 18, 2025 at 12:58 pm

    Identity management is a methodology to control every users characterisitics, or decide which kinds of individuals can have the access. It begins with the core security entry points a person or process must go through using authentication, authorization, and account provisioning. Until someone’s digital identity is authenticated and confirmed, your preconfigured authorized security access will allow you access to the resources for which you are preapproved.
    Access management is another prevention of exposure of data and system from users, mainly managing what and how much data can diverse users get in touch with. Only preapproved scope of data can users obtain or edit targeted data. It discusses the topic of authorization, while identity management talks about authentication.

    Log in to Reply
  10. Zuqi Zhang says

    June 19, 2025 at 5:07 am

    identity management is about figuring out who you are. Like verifying your name and other details. Access management is about deciding what you can do or see once we know who you are. So, identity management is “Who are you?” and access management is “What can you do?”

    Log in to Reply
  11. Wenhao Liu says

    June 19, 2025 at 5:26 am

    Identity management focuses on creating, managing, and maintaining digital identities of users or entities, including collecting and storing personal information, verifying identities, and ensuring their accuracy and security. It’s about defining “who” the entity is. Access management, on the other hand, is about determining “what” an identified entity can do. It involves setting and enforcing policies that control which resources an identity can access and what actions they can perform.

    Log in to Reply
  12. Meiyan Liu says

    June 19, 2025 at 7:56 am

    Identity management and access management are closely related concepts in cybersecurity and system management. The former focuses on creating, authenticating, and managing digital identities, answering “who an entity is”. The latter, built upon identity management, controls what resources an authenticated entity can access and what actions it can perform, addressing “what the entity can do”. Interdependent, they ensure only authorized entities can access resources in a controlled manner.

    Log in to Reply
  13. Jianwei Huang says

    June 19, 2025 at 10:05 am

    Identity management is about creating, managing, and verifying who users are (like their profiles and credentials), focusing on establishing and maintaining their digital identities. Access management, though, is about controlling what those identified users can do—deciding which resources (files, systems) they can access and what actions they can take. Think of identity management as confirming “who you are,” and access management as determining “what you can do.” One is about identity definition, the other about permission enforcement.

    Log in to Reply
  14. Shouxi Mou says

    June 20, 2025 at 1:04 am

    Identity Management (IDM)​​

    ​​Who you are​​: Creates/deletes user accounts (e.g., employee onboarding).
    ​​Example​​: Assigning an email address.
    ​​Access Management (AM)​​

    ​​What you can do​​: Controls permissions (e.g., “Can this user edit payroll?”).
    ​​Example​​: Restricting HR files to HR staff only.
    ​​Key Difference​​:
    IDM = “Are you legit?”
    AM = “What can you touch?”

    Log in to Reply
  15. Wenhao GUO says

    June 20, 2025 at 1:13 am

    Identity management and access management differ fundamentally in their scope and purpose within security frameworks. Identity management focuses on creating, maintaining, and governing digital identities of users (or entities) within an organization, encompassing processes like identity creation, authentication (verifying who a user is), and lifecycle management (e.g., adding/removing accounts). It establishes the foundation for trust by ensuring each identity is valid and authentic, often involving tools like directory services and single sign-on (SSO). Access management, conversely, is about controlling what resources an authenticated identity can access and how—addressing authorization. It defines permission levels, enforces access policies, and regulates actions (e.g., read, write, execute) on resources like data, applications, or systems. While identity management answers “who are you,” access management answers “what can you do.” In essence, identity management is the cornerstone of user identity validation, whereas access management is the mechanism for fine-grained resource control based on those identities.

    Log in to Reply
  16. Jiwei Yang says

    June 20, 2025 at 1:16 am

    Identity Management and Access Management are the core components of the IAM system. The differences lie in the following aspects: Identity Management focuses on the entire lifecycle of digital identities (creation, update, deletion), such as enterprises generating domain accounts for employees and binding personal information to solve the “who are you” problem; Access Management, on the other hand, emphasizes permission control, through models like RBAC to determine “what can you access”, such as allocating system operation permissions based on job levels. The former is the foundation, relying on directory services and authentication technologies to maintain the authenticity of identities; The latter is an extension, achieving fine-grained control of resource access through permission policies and single sign-on. The two work together, for example, when an employee is hired, an identity account is created first (Identity Management), and then approval permissions are automatically assigned based on the position (Access Management), jointly ensuring “the correct person accesses the correct resources with the correct permissions”, meeting compliance and security requirements.

    Log in to Reply
  17. Xintong Zhang says

    June 20, 2025 at 1:40 am

    Identity management is the prerequisite for access management, addressing the issue of identity verification. Access management, on the other hand, is based on the results of identity management and aims to achieve fine-grained control over resource access. Identity management mainly focuses on the creation, maintenance, verification, and management of digital identities, including the lifecycle management of user identities, as well as the storage, protection, and cross-system synchronization of identity information. Access management, however, emphasizes controlling a user’s access rights to resources after their identity has been verified. It is implemented through authorization mechanisms, access policies, and permission allocation, ensuring that users can only access the resources they are authorized to.

    Log in to Reply
  18. Yan Liu says

    June 20, 2025 at 2:21 am

    Identity management handles user identity lifecycle (creation, maintenance, deletion), while access management controls resource access via permission definitions.

    Log in to Reply
  19. Yiwen Lou says

    June 20, 2025 at 5:21 am

    Identity management centers on creating, maintaining, and overseeing users’ digital identities, encompassing details like usernames, passwords, and personal information—it’s essentially about defining “who” users are in a digital context. Access management, conversely, focuses on determining “what” resources users can access and “under what conditions”—it involves controlling their permissions to specific systems, data, or tools. The core distinction lies here: identity management is the process of identifying and verifying users, while access management is the practice of authorizing their level of access to resources. This means identity management establishes a user’s digital persona, and access management dictates the boundaries of what they can do with that persona within a network or system.

    Log in to Reply
  20. Jiaxuan Ma says

    June 20, 2025 at 5:44 am

    As mentioned in Vacca chapter 71, Identity management refers to “the process of representing, using, maintaining, deprovisioning and authenticating entities as digital identities in computer networks”
    Access management controls and manages entities’ access to resources, such as files, applications and hardware devices. It is based on identity management because the entities’ identity must be confirmed first before deciding what access rights to grant them.

    In a word, identity management focuses on who the entity is, while access management focuses on what the entity can access.

    Log in to Reply
  21. Huiling Huang says

    June 20, 2025 at 5:53 am

    Identity management focuses on creating, maintaining, and managing user identity information (such as accounts, biometrics, etc.) to ensure the uniqueness and accuracy of identities. It addresses the question of “who you are”, including processes like user registration and the establishment of identity authentication mechanisms.

    Access management, on the other hand, emphasizes controlling the access permissions of authenticated identities to resources. It answers the question of “what you can do”, involving tasks like assigning permissions based on roles, setting access policies, and auditing access records.

    Log in to Reply
  22. Xiaojin Liu says

    June 20, 2025 at 7:00 am

    Identity management covers the entire lifecycle of digital identities, including the creation, maintenance, use, and revocation of identity information. Its core objective is to ensure the consistency and portability of user identities, support single sign-on and cross-domain identity sharing, while emphasizing privacy protection. Access management is a subset of identity management, focusing on controlling users’ access rights to resources based on authentication and authorization. Its core objective is to prevent unauthorized access, dynamically assess risks, and follow the principle of least privilege. In short, identity management addresses “who I am”, while access management addresses “what I can do”.

    Log in to Reply
  23. Liyuan Zhou says

    June 21, 2025 at 3:30 am

    Identity management is like creating an “electronic household register” for everyone. It involves creating accounts for employees, registering identity information such as names and departments, and managing when accounts should be activated or deactivated. It solves the problem of “who you are”.

    Access management, on the other hand, is about “issuing passes”. Based on each person’s identity (such as being in finance or sales), it determines which systems they can access and which files they can view. For example, only finance staff can access the payroll system, and ordinary employees cannot modify core data casually. It solves the problem of “what you can do”.

    Log in to Reply
  24. Rong Su says

    June 21, 2025 at 8:05 am

    Identity management primarily focuses on the full-lifecycle management of users’ digital identities, encompassing identity creation, authentication (verifying users’ identities), profile maintenance, and identity data governance. Access management, however, centers on controlling the resources accessible to authenticated users and the actions they can perform, involving authorization (determining user permissions), access policy enforcement, and privilege management.

    Log in to Reply
  25. Meiqi Yan says

    June 21, 2025 at 8:17 am

    Identity management is responsible for the full lifecycle governance of the digital identities of entities, including identity creation, verification, storage, and maintenance. The core of it is to solve the authentication problem of “who the entity is”.
    Access Management implements dynamic permission control based on identity authentication. Through the policy engine, it determines in real time whether “this identity can perform a certain operation in a specific scenario”. The core is to solve the authorization problem of “what is allowed to be done”.

    Log in to Reply
  26. Xinshang Pei says

    June 21, 2025 at 12:54 pm

    Identity management systems govern the complete lifecycle of digital identities, from initial provisioning and credential issuance through ongoing authentication processes and identity record maintenance. This framework ensures proper verification of user identities while maintaining accurate profile information across systems. Access management operates as the complementary control layer that regulates resource permissions, dynamically enforcing authorization policies to determine what authenticated users can access and which operations they may perform within specific systems or datasets.
    The distinction lies in their operational focus – identity management authenticates who you are, while access management authorizes what you can do. Together they form an integrated security architecture where verified identities receive precisely calibrated privileges based on organizational policies, with identity data serving as the foundation for all subsequent access decisions.

    Log in to Reply
  27. Gao Yujing says

    June 21, 2025 at 1:33 pm

    Key Takeaway​​:

    ​​IdM = Identity Store + Authentication​​ → Creates digital identity.
    ​​AM = Policy Engine + Authorization​​ → Controls what identity can do.

    Log in to Reply
  28. Yangyu Zhang says

    June 21, 2025 at 7:35 pm

    Identity Management (IdM) and Access Management (AM) are closely related components of cybersecurity, often unified under Identity and Access Management (IAM). Here’s how they differ:
    Identity Management (IdM):
    Core Focus: Who are you?
    Purpose: Manages the lifecycle of digital identities (users, devices, applications).
    Key Functions:
    Provisioning/De-provisioning: Creating/removing user accounts (e.g., onboarding employees or revoking access when they leave).
    Authentication: Verifying identity (e.g., via passwords, biometrics, MFA).
    Directory Services: Storing identity data (e.g., Active Directory, LDAP).
    User Self-Service: Password resets, profile updates.
    Goal: Ensure the right identities exist, are authenticated, and maintained accurately.

    Access Management (AM):
    Core Focus: What can you do?
    Purpose: Controls permissions and resource access after identity is verified.
    Key Functions:
    Authorization: Granting/denying access to specific resources (e.g., “Can User X edit this file?”).
    Policy Enforcement: Applying rules (e.g., role-based access control – RBAC).
    Single Sign-On (SSO): Allowing access to multiple systems after one login.
    Access Reviews: Auditing permissions for compliance.
    Goal: Enforce least-privilege access, ensuring users only access what they’re permitted to.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in