What’s there in the core of an IAM solution!

Without a digital identity, there is no existence of us in present era. We live and breath in the sphere of identity management solutions and make assumptions that everyone know the basic fundamentals of this. But it is not always true. There are people who don’t understand what’s there in deepest core of an Identity management solution and why it is necessary in digital world. For such people this post is here. This post is not to delve into the specific details of various components of an IAM platform but to discuss the functionality of it at a bit higher level.


So let’s discuss what identity management is and how it is able to provide greater security, agility and cloud adoption.

An identity management solution is much more than a software or mere configuration. It comes with some organizational policies, processes and technologies that provide services to applications and other organizations. Basically, It comprises of three main components and here they are:-

Identity management :

With Identity management solution there comes provisioning, de-provisioning, synchronisation and aggregation of identities.


Access management :

It provides authentication, authorization, federated identity and single sign on along with role based authentication.


Lifecycle management :

In Lifecycle management, An IAM provider offers self service management, password management and synchronization, audit, monitoring and reporting.

Access management and life cycle management are the components that provide the core functions of an IAM solution that is security and agility plus they enable organizations to engage with cloud services in the form of SaaS, IaaS or PaaS without compromising on the security.


An IAM platform gathers identities from their designated HR applications and maintains the synchronisation of this data automatically. After collecting this identity data, provisioning is carried out which is a process of coordinating the creation of user accounts, email authorizations and some other tasks such as provisioning of physical resources that comes along with the rights of new users. A robust identity management solution is scalable and comes along with several options for customization like what roles you want to give your users, what internal properties they can access and many others. Apart from all these it can also aggregate your customer’s or employee’s identities from multiple infrastructures.

So this is the basic functionality of an identity management solution but that’s not it. We’ll cover its various components in our next posts. Drop your suggestions in the comments below.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s