Identity and Access Management (IAM) A set of processes that manage a user's identity on the network. Identity and Access Management (IAM)A set of processes that manage a user’s identity on the network. Identity and Access Management (IAM) is the set of processes that manage a user’s identity on the network…. is the set of processes that manage a user’s identity on the network. It includes the following different segments: access management (AM), authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows…, privilege account management (PAMPrivileged Access Management. PAM is a technology for managing access and authentication of authorized users, usually information system administrators, to administrative resources or applications. The main objective is to secure…), identity administration and governance (IGA). It is generally misused to refer to IGA. The functional scope of IAM is very broad. It will include functionalities allowing – to authenticate a user on the network (primary authentication), – manage its authorizations, the life cycle of its identity and the accounts associated with it, – to guarantee the traceability of his rights, as well as the actions carried out by/on him.To illustrate, the IAM makes it possible to simply assign the rights of a collaborator and to make them evolve according to his current situation. The fact that they belong to the company, and the function that determines their access authorization to certain applications, are taken into account in real time and integrated into the information system.