Almost every system must track valid users, and control what they can and cannot see and do. The Access Management process includes management of data about:

  • User identity
  • User authentication
  • Access Controls over data and functions

Return to IT Security Concepts