{"id":15047,"date":"2022-10-11T14:31:29","date_gmt":"2022-10-11T12:31:29","guid":{"rendered":"https:\/\/www.accessmanager.net\/?p=15047"},"modified":"2023-03-14T13:50:19","modified_gmt":"2023-03-14T12:50:19","slug":"iam-idm-dag","status":"publish","type":"post","link":"https:\/\/www.accessmanager.net\/en\/2022\/10\/11\/iam-idm-dag\/","title":{"rendered":"What IAM, IDM and DAG are all about"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kkwbho9e-e59e12c73f79d0b62f07719f5f4031b8\">\n.avia-section.av-kkwbho9e-e59e12c73f79d0b62f07719f5f4031b8{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/10\/Identity-and-Access-Management-scaled.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-kkwbho9e-e59e12c73f79d0b62f07719f5f4031b8 .av-section-color-overlay{\nopacity:0.3;\nbackground-color:#000000;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-kkwbho9e-e59e12c73f79d0b62f07719f5f4031b8 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_px='600'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' style='height:600px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-15047'><div class='entry-content-wrapper clearfix'>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-bjkpou-4d21ae85a694f724a081997bbbff889f main_color avia-section-default avia-no-border-styling  avia-builder-el-1  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-15047'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9r4r66-90380a229f4631b5c0d2990376471ae0\">\n.flex_column.av-9r4r66-90380a229f4631b5c0d2990376471ae0{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-9r4r66-90380a229f4631b5c0d2990376471ae0 av_four_fifth  avia-builder-el-2  el_before_av_two_third  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l94584sz-3d58cd3a0ab3202a2d92fa6d760ca7e8\">\n#top .av-special-heading.av-l94584sz-3d58cd3a0ab3202a2d92fa6d760ca7e8{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l94584sz-3d58cd3a0ab3202a2d92fa6d760ca7e8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l94584sz-3d58cd3a0ab3202a2d92fa6d760ca7e8 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l94584sz-3d58cd3a0ab3202a2d92fa6d760ca7e8 av-special-heading-h1 blockquote modern-quote  avia-builder-el-3  el_before_av_hr  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Short and comprehensive: what IAM, IDM and DAG are all about<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l9454v7f-35442825fe6d8187d85fb1424794908b\">\n#top .hr.hr-invisible.av-l9454v7f-35442825fe6d8187d85fb1424794908b{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-l9454v7f-35442825fe6d8187d85fb1424794908b hr-invisible  avia-builder-el-4  el_after_av_heading  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_two_third  avia-builder-el-5  el_after_av_four_fifth  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>IAM, IDM and DAG &#8211; these abbreviations are certainly familiar to you if you are concerned with IT security, compliance and the allocation of authorisations and accesses within a company. But what do the terms mean exactly? What role do identities play? And what is user provisioning? We will give you a little insight.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ypsa6-57ea71dd9bd577ef47327fd30d24580e\">\n.avia-section.av-6ypsa6-57ea71dd9bd577ef47327fd30d24580e{\nbackground-color:#35383c;\nbackground-image:unset;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-6ypsa6-57ea71dd9bd577ef47327fd30d24580e alternate_color avia-section-default avia-no-border-styling  avia-builder-el-7  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-15047'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-8  el_before_av_three_fourth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l9464v24-7983060326e19be48c9927f1ed8d9a67\">\n#top .av-special-heading.av-l9464v24-7983060326e19be48c9927f1ed8d9a67{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l9464v24-7983060326e19be48c9927f1ed8d9a67 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l9464v24-7983060326e19be48c9927f1ed8d9a67 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l9464v24-7983060326e19be48c9927f1ed8d9a67 av-special-heading-h2 blockquote modern-quote  avia-builder-el-9  avia-builder-el-no-sibling '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Identity and Access Management (IAM) &#8211; What does it mean? <\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-10  el_after_av_three_fourth  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Managing the identities of employees and their access rights in the company is the task of identity and access management. IAM is one of the most important prerequisites for ensuring data compliance. Because: Basically, every person within a company is linked to a digital identity in order to make it traceable when, who (via different accounts) has access to which data, folders and systems. Accordingly, it is a system based on roles and rules.<\/p>\n<p>However, managing this and keeping it permanently up to date is often a challenge &#8211; and the trend is increasing as the size of the company grows. To support the IT department in this complex process, you can use specialised software tools. These tools automate the allocation of identities and authorisations and also ensure a comprehensive overview of current situations through monitoring and reporting.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_4'  class='avia-section av-6ypsa6-b7c576416f766340c626410366962509 main_color avia-section-default avia-no-border-styling  avia-builder-el-12  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-15047'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-13  el_before_av_one_third  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l9465irf-244c35064ac65b54b20870eb143c737f\">\n#top .av-special-heading.av-l9465irf-244c35064ac65b54b20870eb143c737f{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l9465irf-244c35064ac65b54b20870eb143c737f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l9465irf-244c35064ac65b54b20870eb143c737f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l9465irf-244c35064ac65b54b20870eb143c737f av-special-heading-h2 blockquote modern-quote  avia-builder-el-14  avia-builder-el-no-sibling '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Identity Management (IDM) and Access Management (AM) considered individually?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2sxa2q5-c06d84e7ee0b1b1e63e2797e028cd8b5\">\n.flex_column.av-2sxa2q5-c06d84e7ee0b1b1e63e2797e028cd8b5{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2sxa2q5-c06d84e7ee0b1b1e63e2797e028cd8b5 av_one_third  avia-builder-el-15  el_after_av_three_fourth  el_before_av_two_third  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l943dse0-c514709fa08ee72ce2cfdd29fbd9f63c\">\n#top .hr.hr-invisible.av-l943dse0-c514709fa08ee72ce2cfdd29fbd9f63c{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-l943dse0-c514709fa08ee72ce2cfdd29fbd9f63c hr-invisible  avia-builder-el-16  el_before_av_image  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2r7purx-ee0b1ba08d5234269a2ff850c076a6ea\">\n.avia-image-container.av-2r7purx-ee0b1ba08d5234269a2ff850c076a6ea img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-2r7purx-ee0b1ba08d5234269a2ff850c076a6ea .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-2r7purx-ee0b1ba08d5234269a2ff850c076a6ea av-styling- avia-align-center  avia-builder-el-17  el_after_av_hr  avia-builder-el-last '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-13710 avia-img-lazy-loading-not-13710 avia_image ' src=\"https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-scaled.jpg\" alt='Ein Mensch sitz vor drei Bildschirmen und tippt etwas auf der Tastatur' title=''  height=\"1707\" width=\"2560\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-scaled.jpg 2560w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-300x200.jpg 300w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-1030x687.jpg 1030w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-768x512.jpg 768w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-1536x1024.jpg 1536w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-2048x1365.jpg 2048w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-1500x1000.jpg 1500w, https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2022\/02\/shutterstock_1187522614-705x470.jpg 705w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/div><\/div><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-85b3d8d408f80152e13fe296657fc778\">\n.flex_column.av-bcmscg-85b3d8d408f80152e13fe296657fc778{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-85b3d8d408f80152e13fe296657fc778 av_two_third  avia-builder-el-18  el_after_av_one_third  avia-builder-el-last  flex_column_div av-zero-column-padding  column-top-margin'     ><p><section  class='av_textblock_section av-l12fsxof-b706c70d4c0c47bd54f3536b711e107f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The abbreviation IDM stands for the first aspect of identity and access management. Specifically, IDM is the permanent control of the assigned digital identities &#8211; the who and where. Who has access to which systems with which accounts? And is the access authorisation currently (still) needed? The aim is to standardise and automate the administration of users and authorisations and, for example, the provision of IT services such as file services or mailboxes.<\/p>\n<p>Access management, as the second aspect, is dedicated to execution &#8211; the how. How is it possible to grant access rights to authorised persons or groups? And who grants access rights? Access management also includes the possibility of applying for authorisations via self-service.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-l12fsxof-b706c70d4c0c47bd54f3536b711e107f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Which existing permissions can you remove? In practice, this decision is often difficult for those responsible. The result can be that permissions that are no longer needed are not removed because of the time-consuming distinction.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzhx2q-df97bc692f2b6c5000bb2cc9f3799b9c\">\n.avia-section.av-lzhx2q-df97bc692f2b6c5000bb2cc9f3799b9c{\nbackground-color:#35383c;\nbackground-image:unset;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-lzhx2q-df97bc692f2b6c5000bb2cc9f3799b9c alternate_color avia-section-default avia-no-border-styling  avia-builder-el-21  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-15047'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-22  el_before_av_two_third  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l9466uwr-ac676bbac4f4e4f2380b9330a1f501a2\">\n#top .av-special-heading.av-l9466uwr-ac676bbac4f4e4f2380b9330a1f501a2{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l9466uwr-ac676bbac4f4e4f2380b9330a1f501a2 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l9466uwr-ac676bbac4f4e4f2380b9330a1f501a2 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l9466uwr-ac676bbac4f4e4f2380b9330a1f501a2 av-special-heading-h2 blockquote modern-quote  avia-builder-el-23  avia-builder-el-no-sibling '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >What is User Provisioning? <\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_two_third  avia-builder-el-24  el_after_av_three_fourth  el_before_av_one_third  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>User provisioning is the provision of access for users. Ultimately, this means that users receive access according to their current digital identity. The difficulty in ensuring this lies with IT administration, because personnel and structural changes within an organisation require regular adjustments.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-85b3d8d408f80152e13fe296657fc778\">\n.flex_column.av-bcmscg-85b3d8d408f80152e13fe296657fc778{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-85b3d8d408f80152e13fe296657fc778 av_one_third  avia-builder-el-26  el_after_av_two_third  avia-builder-el-last  flex_column_div av-zero-column-padding  column-top-margin'     ><article  class='iconbox iconbox_top av-l941ehc9-05788433c214b5bfd637584763be9184  avia-builder-el-27  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: User Provisioning\"><a href='https:\/\/www.accessmanager.net\/en\/modules-features\/features\/#user' title='User Provisioning'  target=\"_blank\"  rel=\"noopener noreferrer\" class=\"iconbox_icon heading-color\" aria-hidden='true' data-av_icon='\ue864' data-av_iconfont='entypo-fontello'><\/a><h3 class='iconbox_content_title '  itemprop=\"headline\" ><a href='https:\/\/www.accessmanager.net\/en\/modules-features\/features\/#user' title='User Provisioning'  target=\"_blank\"  rel=\"noopener noreferrer\">User Provisioning<\/a><\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>Find out how user provisioning can succeed <a href=\"https:\/\/www.accessmanager.net\/en\/modules-features\/features\/#user\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_6'  class='avia-section av-6ypsa6-b7c576416f766340c626410366962509 main_color avia-section-default avia-no-border-styling  avia-builder-el-28  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-15047'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085\">\n.flex_column.av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085 av_three_fourth  avia-builder-el-29  el_before_av_two_third  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l94690vn-1616da39bdf3ee45e813bbafc8bc6569\">\n#top .av-special-heading.av-l94690vn-1616da39bdf3ee45e813bbafc8bc6569{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-l94690vn-1616da39bdf3ee45e813bbafc8bc6569 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l94690vn-1616da39bdf3ee45e813bbafc8bc6569 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l94690vn-1616da39bdf3ee45e813bbafc8bc6569 av-special-heading-h2 blockquote modern-quote  avia-builder-el-30  avia-builder-el-no-sibling '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Data Access Governance (DAG) \u2013 What is meant by this?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085\">\n.flex_column.av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085 av_two_third  avia-builder-el-31  el_after_av_three_fourth  el_before_av_one_third  first flex_column_div av-zero-column-padding  column-top-margin'     ><p><section  class='av_textblock_section av-l12gjliv-115555e0d7d531cad763a61f1f8c89b6 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>This term is also often used in connection with IAM: Data Access Governance &#8211; the management of data access. This includes the control and allocation of access rights to unstructured data, such as file servers or SharePoint. Compared to role-based, rather static rights (such as in identity management), data access governance requires dynamic and often short-term changes.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-icon-list-container av-l942kguy-423bd51d66885750854926e8bfbed01c  avia-builder-el-33  el_after_av_textblock  avia-builder-el-last '><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-big av-l942kguy-423bd51d66885750854926e8bfbed01c avia-iconlist-animate'>\n<li><div class='iconlist_icon av-3n1tuv-e8191d89a4c65c19a6a194b803c1050a avia-font-entypo-fontello'><span class='iconlist-char' aria-hidden='true' data-av_icon='\ue812' data-av_iconfont='entypo-fontello'><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: the idea\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >the idea<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>The goal is also to create uniform structures and guidelines for handling data in order to ensure data security and the company&#8217;s compliance. This goal &#8211; or rather this process &#8211; can only be achieved if the internal guidelines are continuously maintained and constantly monitored by designated persons.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-kjcemf-373496c762f9903088d000fa74730ab0 avia-font-entypo-fontello'><span class='iconlist-char' aria-hidden='true' data-av_icon='\ue813' data-av_iconfont='entypo-fontello'><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: the obstacle\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >the obstacle<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>A weakness in comparison to identity and access management: already existing access authorisations, i.e. the digital identity of users, are not centrally recorded and compared. This can lead to an accumulation of assigned authorisations that become obsolete, e.g. when a department changes, but still exist.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-koxutj-590d7db10883c11c34053b25ea276e8b\">\n.flex_column.av-koxutj-590d7db10883c11c34053b25ea276e8b{\nborder-width:2px;\nborder-color:#ff9a03;\nborder-style:solid;\nborder-radius:8px 8px 8px 8px;\npadding:15px 15px 15px 15px;\nbackground-color:rgba(255,154,3,0.6);\n}\n<\/style>\n<div  class='flex_column av-koxutj-590d7db10883c11c34053b25ea276e8b av_one_third  avia-builder-el-34  el_after_av_two_third  avia-builder-el-last  flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-l12gjliv-115555e0d7d531cad763a61f1f8c89b6 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>An automated solution for the administration of access rights in combination with a regular check of the existing rights provides a remedy and significantly relieves the IT department.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l1qf5t36-4f092efa3249f87160d78e10abcceff9\">\n.avia-section.av-l1qf5t36-4f092efa3249f87160d78e10abcceff9{\nbackground-color:#35383c;\nbackground-image:unset;\n}\n<\/style>\n<div id='av_section_7'  class='avia-section av-l1qf5t36-4f092efa3249f87160d78e10abcceff9 alternate_color avia-section-default avia-no-border-styling  avia-builder-el-36  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-15047'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-37  el_before_av_hr  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><article  class='iconbox iconbox_top av-l941ehc9-59559a588dbf5bcb680dd522c4ea7b9c  avia-builder-el-38  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Get to know us\"><a href='https:\/\/www.accessmanager.net\/en\/services\/trial-anfrage\/' title='Get to know us'  target=\"_blank\"  rel=\"noopener noreferrer\" class=\"iconbox_icon heading-color\" aria-hidden='true' data-av_icon='\ue80b' data-av_iconfont='entypo-fontello'><\/a><h3 class='iconbox_content_title '  itemprop=\"headline\" ><a href='https:\/\/www.accessmanager.net\/en\/services\/trial-anfrage\/' title='Get to know us'  target=\"_blank\"  rel=\"noopener noreferrer\">Get to know us<\/a><\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>With BAYOOSOFT Access Manager we support you on your way to efficient identity and access management and user provisioning.<\/p>\n<p>Why not get to know our solution for 30 days? Click here for the <a href=\"https:\/\/www.accessmanager.net\/en\/services\/trial-anfrage\/\" target=\"_blank\" rel=\"noopener\">TRIAL<\/a>.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kycs1fuq-dd714f22ca323ee6400de7ee30f1ac6d\">\n#top .hr.hr-invisible.av-kycs1fuq-dd714f22ca323ee6400de7ee30f1ac6d{\nheight:60px;\n}\n<\/style>\n<div  class='hr av-kycs1fuq-dd714f22ca323ee6400de7ee30f1ac6d hr-invisible  avia-builder-el-39  el_after_av_three_fourth  el_before_av_three_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085\">\n.flex_column.av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-ituaiq-5aefef9d2a31b2899b38d268c4b7d085 av_three_fifth  avia-builder-el-40  el_after_av_hr  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><div  class='av-social-sharing-box av-kycs2gae-8cf1079faee9c4ded9da8d6e564ec274 av-social-sharing-box-minimal  avia-builder-el-41  avia-builder-el-no-sibling  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Sounds interesting? Share our post with your network<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.accessmanager.net\/en\/2022\/10\/11\/iam-idm-dag\/&#038;t=What%20IAM%2C%20IDM%20and%20DAG%20are%20all%20about' aria-hidden='false' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-whatsapp' ><a target=\"_blank\" aria-label=\"Share on WhatsApp\" href='https:\/\/api.whatsapp.com\/send?text=https:\/\/www.accessmanager.net\/en\/2022\/10\/11\/iam-idm-dag\/' aria-hidden='false' data-av_icon='\uf232' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on WhatsApp'><span class='avia_hidden_link_text'>Share on WhatsApp<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=What%20IAM%2C%20IDM%20and%20DAG%20are%20all%20about&#038;url=https:\/\/www.accessmanager.net\/en\/2022\/10\/11\/iam-idm-dag\/' aria-hidden='false' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=What%20IAM%2C%20IDM%20and%20DAG%20are%20all%20about&#038;body=https:\/\/www.accessmanager.net\/en\/2022\/10\/11\/iam-idm-dag\/' aria-hidden='false' data-av_icon='\ue805' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":42,"featured_media":15033,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-15047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial-en"],"_links":{"self":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/15047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/comments?post=15047"}],"version-history":[{"count":6,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/15047\/revisions"}],"predecessor-version":[{"id":16224,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/15047\/revisions\/16224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media\/15033"}],"wp:attachment":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media?parent=15047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/categories?post=15047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/tags?post=15047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}