{"id":17127,"date":"2024-02-22T09:59:53","date_gmt":"2024-02-22T08:59:53","guid":{"rendered":"https:\/\/www.accessmanager.net\/?p=17127"},"modified":"2024-02-22T09:59:53","modified_gmt":"2024-02-22T08:59:53","slug":"overview-of-identity-management","status":"publish","type":"post","link":"https:\/\/www.accessmanager.net\/en\/2024\/02\/22\/overview-of-identity-management\/","title":{"rendered":"Overview of identity management: everything you need to know about joiners, leavers and movers"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lpb0g24n-7e5c5defbda258519952c1e46bfeb60a\">\n.avia-section.av-lpb0g24n-7e5c5defbda258519952c1e46bfeb60a{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/07\/shutterstock_731504416-scaled.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-lpb0g24n-7e5c5defbda258519952c1e46bfeb60a .av-section-color-overlay{\nopacity:0.5;\nbackground-color:#5b5b5b;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-lpb0g24n-7e5c5defbda258519952c1e46bfeb60a main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-bg-style-scroll av-section-color-overlay-active av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_px='500'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' style='height:500px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17127'><div class='entry-content-wrapper clearfix'>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-6k1nzzp-663f4a40e50b0406041fec8d5142217d main_color avia-section-default avia-no-border-styling  avia-builder-el-1  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17127'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsbjfxtw-18e049ec0643200f41073070cb7e9857\">\n#top .av-special-heading.av-lsbjfxtw-18e049ec0643200f41073070cb7e9857{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsbjfxtw-18e049ec0643200f41073070cb7e9857 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsbjfxtw-18e049ec0643200f41073070cb7e9857 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsbjfxtw-18e049ec0643200f41073070cb7e9857 av-special-heading-h1  avia-builder-el-2  el_before_av_hr  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Overview of identity management: everything you need to know about joiners, leavers and movers<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ls38ptds-15e8c8c009607cb9aedc20626b70bb9f\">\n#top .hr.hr-invisible.av-ls38ptds-15e8c8c009607cb9aedc20626b70bb9f{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-ls38ptds-15e8c8c009607cb9aedc20626b70bb9f hr-invisible  avia-builder-el-3  el_after_av_heading  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-lp9t0tnx-626021c6d8bc236658e3a227d498a6a0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In most cases, employees joining a company, changing departments or resigning is an everyday occurrence. While these changes are often profound for individuals, they also have a significant impact on company departments such as IT.<\/p>\n<p>The administration of access authorizations in particular can become an inefficient and resource-intensive process, especially for large companies. This is where identity management solutions such as BAYOOSOFT&#8217;s Access Manager come into play.<\/p>\n<p>Identity management is becoming increasingly important for companies. It deals with the administration and control of user identities, access rights and authorizations in IT systems and the cloud. In this article, we will give you a brief insight into the basics of identity management and its role in the security of data and systems. Find out what joiners, movers and leavers are all about and how identity management can help to increase security and efficiency in your company.<\/p>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-n4zxhx-657eddf54a388e0fb46fec4b33afd9ee\">\n.avia-section.av-n4zxhx-657eddf54a388e0fb46fec4b33afd9ee{\nbackground-color:#565656;\nbackground-image:unset;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-n4zxhx-657eddf54a388e0fb46fec4b33afd9ee main_color avia-section-default avia-no-border-styling  avia-builder-el-5  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17127'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsbjgemz-82d7b4dd0c9a570f29dc992a687c7741\">\n#top .av-special-heading.av-lsbjgemz-82d7b4dd0c9a570f29dc992a687c7741{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsbjgemz-82d7b4dd0c9a570f29dc992a687c7741 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsbjgemz-82d7b4dd0c9a570f29dc992a687c7741 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsbjgemz-82d7b4dd0c9a570f29dc992a687c7741 av-special-heading-h3  avia-builder-el-6  el_before_av_textblock  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >What is Identity Management<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lp9t5v2z-0bad872d22d631a1f264eaeee1162fbe\">\n#top .av_textblock_section.av-lp9t5v2z-0bad872d22d631a1f264eaeee1162fbe .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lp9t5v2z-0bad872d22d631a1f264eaeee1162fbe '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p>Identity management plays a crucial role in companies when it comes to managing users&#8217; access rights and authorizations. It refers to the management of digital identities within an organization, both for employees and other user groups. The main objective is to ensure that the right people have access to the right data and systems.<\/p>\n<p>By using Identity and Access Management (IAM) software and systems, companies can increase their security and minimize potential risks. It ensures that sensitive company data is protected and can only be accessed by authorized persons. Effective identity management also enables companies to react quickly to changes in the employee structure, be it through new hires, departures or internal transfers. This is also referred to as joiners, leavers and movers. But more on this later.<\/p>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_4'  class='avia-section av-5n4c3px-6bf0d9780a515cc15e4a7bf57db433b6 main_color avia-section-default avia-no-border-styling  avia-builder-el-8  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17127'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsbjgwum-e60fe6dc368fc50ea0030409e408ca50\">\n#top .av-special-heading.av-lsbjgwum-e60fe6dc368fc50ea0030409e408ca50{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsbjgwum-e60fe6dc368fc50ea0030409e408ca50 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsbjgwum-e60fe6dc368fc50ea0030409e408ca50 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsbjgwum-e60fe6dc368fc50ea0030409e408ca50 av-special-heading-h3  avia-builder-el-9  el_before_av_textblock  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >What is the difference between Identity Management and Access Management?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<section  class='av_textblock_section av-lr6dzvfk-0a600f64f9a095ac6ec8a8740d914323 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Identity management and access management are two concepts that are closely linked but sometimes fulfill different functions. They are essential aspects of an organization&#8217;s IT security and work together to ensure secure access and efficient management of user identities and resources.<\/p>\n<p>Identity management refers to the process of managing and controlling user identities in a company or organization. It includes the collection and management of user data such as names, roles, authorizations, passwords and other access rights. The main goal of identity management is to ensure that the right people have access to the right resources.<\/p>\n<p>Access management, on the other hand, focuses on controlling and managing access to specific resources or services. It is responsible for implementing security policies and ensuring data security. Access management determines who has access to which resources and under what conditions this access is granted. It also enables the monitoring and logging of access activities in order to detect potential threats or security breaches.<\/p>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr7i268t-9b89b50e2b0c9ba13bbfa98d1a36e049\">\n.avia-section.av-lr7i268t-9b89b50e2b0c9ba13bbfa98d1a36e049{\nbackground-color:#565656;\nbackground-image:unset;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-lr7i268t-9b89b50e2b0c9ba13bbfa98d1a36e049 main_color avia-section-default avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17127'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsbjhcmp-bf1684466f049b25986cf2ee0f5eb84f\">\n#top .av-special-heading.av-lsbjhcmp-bf1684466f049b25986cf2ee0f5eb84f{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsbjhcmp-bf1684466f049b25986cf2ee0f5eb84f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsbjhcmp-bf1684466f049b25986cf2ee0f5eb84f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsbjhcmp-bf1684466f049b25986cf2ee0f5eb84f av-special-heading-h3  avia-builder-el-12  el_before_av_three_fourth  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Joiner: Welcoming new talent<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-93xx2c-2bd71e06f965dd19db1594a9388a7f72\">\n.flex_column.av-93xx2c-2bd71e06f965dd19db1594a9388a7f72{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-93xx2c-2bd71e06f965dd19db1594a9388a7f72 av_three_fourth  avia-builder-el-13  el_after_av_heading  el_before_av_one_fourth  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr7hsish-287d6b84a2dc15fd2b87843b88a07754\">\n#top .av_textblock_section.av-lr7hsish-287d6b84a2dc15fd2b87843b88a07754 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lr7hsish-287d6b84a2dc15fd2b87843b88a07754 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p>An important aspect of identity management in companies is welcoming new employees, also known as &#8220;joiners&#8221;. When onboarding new employees, various aspects must be taken into account to ensure smooth integration into the company structures and access to the required resources.<\/p>\n<p>At the beginning of the onboarding process, the identities of the new employees should be created in the company&#8217;s Identity and Access Management (IAM) system. This involves recording all relevant information such as name, role, access rights and contact details. This enables the company to manage the identity of new employees and assign them the necessary user authorizations.<\/p>\n<p>Another important step in welcoming new employees is authentication. This ensures that the employee&#8217;s identity is verified to prevent unauthorized access to company resources. By using secure authentication methods such as passwords, two-factor authentication or biometrics, the company can ensure the security of identities and minimize the risk of data loss or unauthorized access.<\/p>\n<p>As part of identity management, it is also important to provide new employees with access to the company&#8217;s digital systems and services. This can include providing access to email accounts, internal networks, special<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1wfjrz8-767e774fc3df380242eddef32542f736\">\n.flex_column.av-1wfjrz8-767e774fc3df380242eddef32542f736{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1wfjrz8-767e774fc3df380242eddef32542f736 av_one_fourth  avia-builder-el-15  el_after_av_three_fourth  avia-builder-el-last  flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr7hrsgn-2c4156e41725534a36515d157cc2e052\">\n.av_font_icon.av-lr7hrsgn-2c4156e41725534a36515d157cc2e052{\ncolor:#ffffff;\nborder-color:#ffffff;\n}\n.av_font_icon.av-lr7hrsgn-2c4156e41725534a36515d157cc2e052 .av-icon-char{\nfont-size:100px;\nline-height:100px;\n}\n<\/style>\n<span  class='av_font_icon av-lr7hrsgn-2c4156e41725534a36515d157cc2e052 avia_animate_when_visible av-icon-style- avia-icon-pos-center avia-icon-animate'><span class='av-icon-char' aria-hidden='true' data-av_icon='\ue80c' data-av_iconfont='entypo-fontello' ><\/span><\/span><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_6'  class='avia-section av-5n4c3px-6bf0d9780a515cc15e4a7bf57db433b6 main_color avia-section-default avia-no-border-styling  avia-builder-el-17  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17127'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsbjhsnz-e37e79d9e00c82c44a7369162989d755\">\n#top .av-special-heading.av-lsbjhsnz-e37e79d9e00c82c44a7369162989d755{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsbjhsnz-e37e79d9e00c82c44a7369162989d755 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsbjhsnz-e37e79d9e00c82c44a7369162989d755 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsbjhsnz-e37e79d9e00c82c44a7369162989d755 av-special-heading-h3  avia-builder-el-18  el_before_av_one_fourth  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Leaver: Respecting the farewell<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-93xx2c-2bd71e06f965dd19db1594a9388a7f72\">\n.flex_column.av-93xx2c-2bd71e06f965dd19db1594a9388a7f72{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-93xx2c-2bd71e06f965dd19db1594a9388a7f72 av_one_fourth  avia-builder-el-19  el_after_av_heading  el_before_av_three_fourth  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr7hrsgn-091d9d18bdb903e1d8271661c941907f\">\n.av_font_icon.av-lr7hrsgn-091d9d18bdb903e1d8271661c941907f{\ncolor:#373737;\nborder-color:#373737;\n}\n.av_font_icon.av-lr7hrsgn-091d9d18bdb903e1d8271661c941907f .av-icon-char{\nfont-size:100px;\nline-height:100px;\n}\n<\/style>\n<span  class='av_font_icon av-lr7hrsgn-091d9d18bdb903e1d8271661c941907f avia_animate_when_visible av-icon-style- avia-icon-pos-center avia-icon-animate'><span class='av-icon-char' aria-hidden='true' data-av_icon='\ue805' data-av_iconfont='entypo-fontello' ><\/span><\/span><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-93xx2c-36e60d4423a3ee459030e90a2403ab9f\">\n.flex_column.av-93xx2c-36e60d4423a3ee459030e90a2403ab9f{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-93xx2c-36e60d4423a3ee459030e90a2403ab9f av_three_fourth  avia-builder-el-21  el_after_av_one_fourth  avia-builder-el-last  flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-lr6dzvfk-0a600f64f9a095ac6ec8a8740d914323 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The management of departures, i.e. leavers, plays a central role in identity management. When employees leave a company, their identities must be adjusted or deactivated in the system accordingly in order to ensure the security of company data. Identity Access Management (IAM) is responsible for controlling and managing user access and authorizations. In the case of a leaver, it is important that their identity is deactivated in all company systems and services to prevent unauthorized access to sensitive data.<\/p>\n<p>Proper management of leavers not only ensures the security of company data, but also contributes to the overall efficiency and productivity of the company. Targeted control and adjustment of identities avoids unnecessary access rights and makes optimal use of resources. In addition, identity management can support compliance with legal and regulatory requirements.<\/p>\n<\/div><\/section><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr7i268t-9b89b50e2b0c9ba13bbfa98d1a36e049\">\n.avia-section.av-lr7i268t-9b89b50e2b0c9ba13bbfa98d1a36e049{\nbackground-color:#565656;\nbackground-image:unset;\n}\n<\/style>\n<div id='av_section_7'  class='avia-section av-lr7i268t-9b89b50e2b0c9ba13bbfa98d1a36e049 main_color avia-section-default avia-no-border-styling  avia-builder-el-23  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17127'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsbjib99-98fa674d3b2055465c501f054591d4c3\">\n#top .av-special-heading.av-lsbjib99-98fa674d3b2055465c501f054591d4c3{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsbjib99-98fa674d3b2055465c501f054591d4c3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsbjib99-98fa674d3b2055465c501f054591d4c3 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsbjib99-98fa674d3b2055465c501f054591d4c3 av-special-heading-h3  avia-builder-el-24  el_before_av_three_fourth  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Mover: Promoting internal mobility<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-93xx2c-2bd71e06f965dd19db1594a9388a7f72\">\n.flex_column.av-93xx2c-2bd71e06f965dd19db1594a9388a7f72{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-93xx2c-2bd71e06f965dd19db1594a9388a7f72 av_three_fourth  avia-builder-el-25  el_after_av_heading  el_before_av_one_fourth  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr7hsish-287d6b84a2dc15fd2b87843b88a07754\">\n#top .av_textblock_section.av-lr7hsish-287d6b84a2dc15fd2b87843b88a07754 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lr7hsish-287d6b84a2dc15fd2b87843b88a07754 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p class=\"Text\">Moves are an everyday part of working life in companies. An important aspect of dealing with movers is updating identity information. As soon as an employee changes their position, their user data must be adjusted accordingly. This includes not only updating information such as name, e-mail address or department, but also adjusting access rights and authorizations. It is important that the employee&#8217;s former position reflects their current authorizations and that they do not have unrestricted access to sensitive data that they no longer need.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1wfjrz8-767e774fc3df380242eddef32542f736\">\n.flex_column.av-1wfjrz8-767e774fc3df380242eddef32542f736{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1wfjrz8-767e774fc3df380242eddef32542f736 av_one_fourth  avia-builder-el-27  el_after_av_three_fourth  avia-builder-el-last  flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr7hrsgn-d669fc6000b02e43b5c8a8932ecafa9c\">\n.av_font_icon.av-lr7hrsgn-d669fc6000b02e43b5c8a8932ecafa9c{\ncolor:#ffffff;\nborder-color:#ffffff;\n}\n.av_font_icon.av-lr7hrsgn-d669fc6000b02e43b5c8a8932ecafa9c .av-icon-char{\nfont-size:100px;\nline-height:100px;\n}\n<\/style>\n<span  class='av_font_icon av-lr7hrsgn-d669fc6000b02e43b5c8a8932ecafa9c avia_animate_when_visible av-icon-style- avia-icon-pos-center avia-icon-animate'><span class='av-icon-char' aria-hidden='true' data-av_icon='\ue86e' data-av_iconfont='entypo-fontello' ><\/span><\/span><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_8'  class='avia-section av-1xxlxo5-ebb2cf586b5cbd66a50aa6dd6c1eb6fb main_color avia-section-default avia-no-border-styling  avia-builder-el-29  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-17127'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsbjis5b-260449b1304241d0de97d837f9869756\">\n#top .av-special-heading.av-lsbjis5b-260449b1304241d0de97d837f9869756{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsbjis5b-260449b1304241d0de97d837f9869756 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsbjis5b-260449b1304241d0de97d837f9869756 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsbjis5b-260449b1304241d0de97d837f9869756 av-special-heading-h3  avia-builder-el-30  el_before_av_textblock  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Conclusion<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr6dzvfk-d7455830436e74cc627e72b5f2dedb9f\">\n#top .av_textblock_section.av-lr6dzvfk-d7455830436e74cc627e72b5f2dedb9f .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lr6dzvfk-d7455830436e74cc627e72b5f2dedb9f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p class=\"Text\">In identity management, joiners, movers and leavers are key concepts. The efficient management of identities in these phases enables companies to optimize access to resources, ensure security and meet compliance requirements. Identity management is therefore not only an IT challenge, but also a key factor for the success and security of a company. Companies should ensure that their identity management processes are well thought out and effective.<\/p>\n<\/div><\/section>\n<div  class='av_promobox av-ls38r31k-1aec10b6ad4fed098424a3619daab28c avia-button-yes  avia-builder-el-32  el_after_av_textblock  el_before_av_social_share '><div class='avia-promocontent'><h3>Our solution for you: The BAYOOSOFT Access Manager<\/h3>\n<p>The Access Manager allows you to keep track of all joiners, leavers and movers at all times.<\/p>\n<p>Find out more about the other features or arrange an individual consultation with us.<\/p>\n<\/div><div  class='avia-button-wrap av-ls38r31k-e5577cb0954ad0cd1c0a2d839fcd40ed-wrap avia-button-right '><a href='https:\/\/www.accessmanager.net\/en\/services\/product-presentation-inquiry\/'  class='avia-button av-ls38r31k-e5577cb0954ad0cd1c0a2d839fcd40ed av-link-btn avia-icon_select-no avia-size-large avia-position-right avia-color-theme-color'   aria-label=\"Learn more\"><span class='avia_iconbox_title' >Learn more<\/span><\/a><\/div><\/div>\n<div  class='av-social-sharing-box av-lpb0s5y6-ebf367b977d0df569d9a0614478792ad av-social-sharing-box-default  avia-builder-el-33  el_after_av_promobox  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Klingt spannend? Teilen Sie diesen Beitrag doch mit Ihrem Netzwerk.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.accessmanager.net\/en\/2024\/02\/22\/overview-of-identity-management\/&#038;t=Overview%20of%20identity%20management%3A%20everything%20you%20need%20to%20know%20about%20joiners%2C%20leavers%20and%20movers' aria-hidden='false' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-whatsapp' ><a target=\"_blank\" aria-label=\"Share on WhatsApp\" href='https:\/\/api.whatsapp.com\/send?text=https:\/\/www.accessmanager.net\/en\/2024\/02\/22\/overview-of-identity-management\/' aria-hidden='false' data-av_icon='\uf232' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on WhatsApp'><span class='avia_hidden_link_text'>Share on WhatsApp<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Overview%20of%20identity%20management%3A%20everything%20you%20need%20to%20know%20about%20joiners%2C%20leavers%20and%20movers&#038;url=https:\/\/www.accessmanager.net\/en\/2024\/02\/22\/overview-of-identity-management\/' aria-hidden='false' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Overview%20of%20identity%20management%3A%20everything%20you%20need%20to%20know%20about%20joiners%2C%20leavers%20and%20movers&#038;body=https:\/\/www.accessmanager.net\/en\/2024\/02\/22\/overview-of-identity-management\/' aria-hidden='false' data-av_icon='\ue805' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":33,"featured_media":11772,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51],"tags":[],"class_list":["post-17127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/17127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/comments?post=17127"}],"version-history":[{"count":2,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/17127\/revisions"}],"predecessor-version":[{"id":17140,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/17127\/revisions\/17140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media\/11772"}],"wp:attachment":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media?parent=17127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/categories?post=17127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/tags?post=17127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}