Loading
Access Manager
  • Solution
    • Join the orange side of life – Solution
      • Freedom for IT-Administrators
      • Permanent compliance with Data Protection Provisions
      • Greater Efficiency in IT Infrastructure
      • Who, What, How? Auditors Review Your Permission Situation
      • It’s all about the money!
    • Explore the Orange Side of Life
      • Ondal Medical Systems GmbH – Time and Cost Savings
      • ETECTURE GmbH – Higher Transparency in Access Management
      • University of Leipzig Medical Center – no Chance for Hackers
      • University Hospital Tübingen – Password Resets 24/7
      • Federal City of Bonn – efficient user account management
      • City of Cologne – optimised user management
      • Paris Lodron University Salzburg – Information security for thousands of users
      • Reiser Simulation and Training GmbH – efficient access management
      • Oberaigner Group – Access Rights Management and Documentation at the Push of a Button
      • Jörg Vogelsang GmbH & Co. KG – Self Service Access Management
      • Stadtwerke Wolfenbüttel GmbH – no longer an authorisation jungle
  • Modules & Features
    • Modules
      • Fileserver Management
      • SharePoint Management
      • 3rd Party Management
      • Fileserver Accounting
      • REST API
      • Password Reset
      • Identity Management
      • Easy Desktop
      • NTFS Permission Analyzer
    • Features
      • Automated Access Management
      • Autocorrect of Permissions
      • Self Service for End Users
      • Profile Management
      • Reapproval Process
      • GDPR Compliant
      • Transparency by Reporting
      • User Provisioning
      • Audit-proof Documentation
  • Services
    • Services
      • Individual Services
      • Permission Audit
      • Starter Package for Automated Access Management
      • Premium-Support
      • Licensing Model
      • System Requirements
    • Contact Us
      • Get your Trial
      • Request your Product Presentation
  • Company
    • BAYOONET AG
      • About us
      • We think proactively
    • Get Our Partners
      • Get to know our Partners
      • Become a Partner
  • Blog
  • Events
  • TRIAL
  • Customer Center
  • Search
  • Menu

Short and comprehensive: what IAM, IDM and DAG are all about

IAM, IDM and DAG – these abbreviations are certainly familiar to you if you are concerned with IT security, compliance and the allocation of authorisations and accesses within a company. But what do the terms mean exactly? What role do identities play? And what is user provisioning? We will give you a little insight.

Identity and Access Management (IAM) – What does it mean?

Managing the identities of employees and their access rights in the company is the task of identity and access management. IAM is one of the most important prerequisites for ensuring data compliance. Because: Basically, every person within a company is linked to a digital identity in order to make it traceable when, who (via different accounts) has access to which data, folders and systems. Accordingly, it is a system based on roles and rules.

However, managing this and keeping it permanently up to date is often a challenge – and the trend is increasing as the size of the company grows. To support the IT department in this complex process, you can use specialised software tools. These tools automate the allocation of identities and authorisations and also ensure a comprehensive overview of current situations through monitoring and reporting.

Identity Management (IDM) and Access Management (AM) considered individually?

Ein Mensch sitz vor drei Bildschirmen und tippt etwas auf der Tastatur

The abbreviation IDM stands for the first aspect of identity and access management. Specifically, IDM is the permanent control of the assigned digital identities – the who and where. Who has access to which systems with which accounts? And is the access authorisation currently (still) needed? The aim is to standardise and automate the administration of users and authorisations and, for example, the provision of IT services such as file services or mailboxes.

Access management, as the second aspect, is dedicated to execution – the how. How is it possible to grant access rights to authorised persons or groups? And who grants access rights? Access management also includes the possibility of applying for authorisations via self-service.

Which existing permissions can you remove? In practice, this decision is often difficult for those responsible. The result can be that permissions that are no longer needed are not removed because of the time-consuming distinction.

What is User Provisioning?

User provisioning is the provision of access for users. Ultimately, this means that users receive access according to their current digital identity. The difficulty in ensuring this lies with IT administration, because personnel and structural changes within an organisation require regular adjustments.

User Provisioning

Find out how user provisioning can succeed here.

Data Access Governance (DAG) – What is meant by this?

This term is also often used in connection with IAM: Data Access Governance – the management of data access. This includes the control and allocation of access rights to unstructured data, such as file servers or SharePoint. Compared to role-based, rather static rights (such as in identity management), data access governance requires dynamic and often short-term changes.

  • the idea

    The goal is also to create uniform structures and guidelines for handling data in order to ensure data security and the company’s compliance. This goal – or rather this process – can only be achieved if the internal guidelines are continuously maintained and constantly monitored by designated persons.

  • the obstacle

    A weakness in comparison to identity and access management: already existing access authorisations, i.e. the digital identity of users, are not centrally recorded and compared. This can lead to an accumulation of assigned authorisations that become obsolete, e.g. when a department changes, but still exist.

An automated solution for the administration of access rights in combination with a regular check of the existing rights provides a remedy and significantly relieves the IT department.

Get to know us

With BAYOOSOFT Access Manager we support you on your way to efficient identity and access management and user provisioning.

Why not get to know our solution for 30 days? Click here for the TRIAL.

Sounds interesting? Share our post with your network
  • Share on Facebook
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail

News

  • Cybersecurity, Identity and Access ManagementWhat IAM, IDM and DAG are all about11. October 2022 - 14:31
  • Glühbirne vor grauem Hintergrund und mit Access Manager LogoBAYOOSOFT Access Manager Version 2022.1 – now available10. June 2022 - 16:41
  • Our new Whitepaper: Best Practices20. May 2022 - 16:11
Contacts at BAYOOSOFT 

Svenja Winkler
CEO
[email protected]

 

 

Franziska Weiß
Head of Sales
[email protected]

 

Darmstadt
Lise-Meitner-Straße 10
64293 Darmstadt

Munich
Aidenbachstraße 54
81379 München
Berlin 
Mariendorfer Damm 1-3
12099 Berlin

Phone: +49 (0) 6151 – 86 18 – 0
Fax: +49 (0) 6151 – 86 18 – 150

Contact: [email protected]
Support: [email protected]
Jobs: [email protected]
Press: [email protected]

  • Privacy policy
  • Legal
BAYOOSOFT Access Manager Version 2022.1 – now available Glühbirne vor grauem Hintergrund und mit Access Manager Logo
Scroll to top