What You Must Know About Identity and Access Management in 100 (Short) Tweets

Access permissions were originally based on roles. But that dates back from the time that access was reserved for employees only.

Modern access management is designed to provide secure access to people inside and outside of the organization.

Today, maintaining identity information is closely related to the relationships people can have with an organization.

Many criteria — such as groups, roles, and user attributes — can designate what permissions are assigned to user identities.

Download the full report to gain a clear understanding of how IAM provides a structured and coherent approach to managing the digital identities of people, things and organizations, and their access to systems and data.

Get the Gartner Report

Any personal data you provide is collected and processed by Scaled Access, as a controller, in order to service your submission.
Read more in our Privacy Policy.

Main Takeaways:

  • Establish and develop a successful IAM program by aligning IAM practices with the operational and business needs of stakeholders across and outside the organization and its ecosystem.
  • The “dimension” of a people role can be the relationship to the organization, a department, a location and so on.
  • Just as IAM practices must be aligned with standing operating procedures, IAM processes must mesh smoothly with existing business processes.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Scaled Access.

Gartner, What You Must Know About Identity and Access Management in 100 (Short) Tweets, 20 May 2021, James Hoover, Felix Gaehtgens, Ant Allan.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.