Identity & Access

Identity & Access

Identity and Access Management (IAM) encompasses the policies, processes, and technologies used to ensure that the right individuals have appropriate access to organizational resources. This category covers authentication methods, authorization frameworks, privileged access management, and identity governance. Key concepts include single sign-on (SSO), multi-factor authentication (MFA), role-based access control (RBAC), and the principle of least privilege—all essential components for maintaining security while enabling productivity in modern IT environments.

 

Last Updated: November 25, 2025

Authentication vs. Authorization

Authentication is the act of verifying an entity’s identity; authorization is the process of...

Last Updated: November 25, 2025

Conditional Access Policies

Real-time policies that evaluate sign-in conditions such as user risk, device compliance, location, and...

Last Updated: November 25, 2025

Delegated Administration

The practice of granting limited administrative rights over a scoped set of objects, often...

Last Updated: November 25, 2025

Identity Federation (SAML/OAuth 2.0)

The establishment of trust between two security domains so that one can accept authentication...