{"id":6854,"date":"2021-11-23T11:00:00","date_gmt":"2021-11-23T16:00:00","guid":{"rendered":"https:\/\/www.jumpcloud.com\/blog\/?p=6854"},"modified":"2024-01-29T17:25:03","modified_gmt":"2024-01-29T22:25:03","slug":"what-is-iam","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/what-is-iam","title":{"rendered":"What is IAM? (Identity and Access Management)"},"content":{"rendered":"\n<p>Identity and access management (IAM) may be the most important function IT performs. It\u2019s how you ensure people have access to the resources they need to get their jobs done, while also keeping those same people (and the corporate digital assets they access) secure.&nbsp;<\/p>\n\n\n\n<p>Done well, IAM means the mailroom clerk doesn\u2019t have access to the company\u2019s financial records, but your CFO does. Done poorly, it can be catastrophic for a company, depending on what kind of access that identity was given.&nbsp;<\/p>\n\n\n\n<p>In an increasingly hybrid workplace, getting identity and access management right is more important to IT departments than ever before. Read on to learn everything you need to know about what IAM is, and how to architect an IAM system.<\/p>\n\n\n\n<figure class=\"image is-16by9\">\n<iframe class=\"has-ratio\" width=\"300\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/uOubY_9GraY?si=9-b8iUkY8E2QnHQ6?rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is Identity and Access Management?&nbsp;<\/h2>\n\n\n\n<p>According to <a href=\"https:\/\/www.gartner.com\/it-glossary\/identity-and-access-management-iam\/\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a>, \u201cIAM is the security discipline that enables the right individuals to access the right resources at the right times and for the right reasons.\u201d In other words, it\u2019s a category of IT solutions that securely manages and connects users to IT resources like devices, applications, files, networks, and more using unique user profiles, called identities. <\/p>\n\n\n\n<p>An identity can be configured for each unique user, giving them controlled access to things like WiFi and company servers, while restricting access for digital assets they don\u2019t need to do their job.&nbsp;<\/p>\n\n\n\n<p>You achieve IAM using core directory services platforms, which store and federate user identities to a wide variety of IT resources. Those resources also look to the core directory services database, called identity providers (IdPs), as the single source of truth for authenticating and authorizing user access. IdPs streamline the <a href=\"https:\/\/jumpcloud.com\/blog\/iam-workflow-onboarding-offboarding\">IAM process<\/a> by giving IT teams a one-stop shop for user and <a href=\"https:\/\/jumpcloud.com\/platform\/cloud-device-management\">device management<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2016\/06\/Categories-of-Idnetity-and-Access-Management-e1465231064956.jpg\" alt=\"Identity and Access Management Pyramid - identity management components\n\" class=\"wp-image-4359\" style=\"width:690px;height:444px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Do You Need Identity Access Management?&nbsp;<\/h2>\n\n\n\n<p>Simply put, with hybrid workplaces and remote employees becoming the norm, not having an IAM strategy is no longer an option. With identity compromises as the number one cause of data breaches, IAM is also, perhaps, the number one security tool. Remote environments have forced companies\u2019 overall IT strategy to move from network-based to people-based.<\/p>\n\n\n\n<p> Today, IT\u2019s main job is determining how best to protect remote workers\u2019 identities while helping them securely access the resources they need to work. IAM drives that idea, because it\u2019s all about individual, personal security.&nbsp;<\/p>\n\n\n\n<p>A holistic cloud IAM platform includes directory services and single sign-on capabilities that connect users to their IT resources through Zero Trust principles, while giving IT significant control over identities. A modern IAM platform provides users with a single identity to remember and use, while giving IT admins the highest level of control and centralization.<\/p>\n\n\n\n<p>While there are obvious initial benefits to IAM, it may not feel necessary for every enterprise, even though it is. Let\u2019s get into some of the benefits and challenges to understand why all organizations can benefit from IAM.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">IAM Benefits&nbsp;<\/h3>\n\n\n\n<p>Identity access management represents the perfect marriage of productivity, security, and access to best-in-class tools.&nbsp;<\/p>\n\n\n\n<p>With IAM, employees use a predetermined \u201cidentity\u201d to gain secure access to the IT resources they need to do their job. The primary benefit for these end users is that processes are streamlined and smooth, allowing them to quickly get access to new resources via a single set of credentials in order to get work done faster. They no longer have to remember (or worse, reuse) passwords for each resource they access, and the overall login experience is improved dramatically.&nbsp;<\/p>\n\n\n\n<p>On the flipside, IAM gives IT one centralized place to control these assets from. Today\u2019s IT admins have to be able to maintain visibility and control on Windows, Mac, and Linux endpoints, connect users to a large number of on-prem and web resources, and integrate with the cloud, all while maintaining data security. <\/p>\n\n\n\n<p>SaaS-based IAM solutions such as next generation <a href=\"https:\/\/jumpcloud.com\/blog\/identity-as-a-service-idaas\">Identity-as-a-Service (IDaaS)<\/a> give admins a unified control platform to manage all these factors in one place. An admin can login remotely to their IAM platform and provision or deprovision users, create or edit user identities, create policies for access and step-up authentication, and manage troubleshooting, all without leaving the application.<\/p>\n\n\n\n<p>Cloud-based identity and access management solutions also increase data security and support <a href=\"https:\/\/jumpcloud.com\/resources\/enabling-compliance-through-cloud-identity-management\">identity compliance<\/a> initiatives such as GDPR, PCI, and HIPAA. It\u2019s reported that <a href=\"https:\/\/www.law.umaryland.edu\/content\/articles\/name-659577-en.html#:~:text=A%20cyber%2Dattack%20on%20average,to%20face%20a%20ransomware%20attack.\" target=\"_blank\" rel=\"noreferrer noopener\">60% of small to medium-sized enterprises (SMEs)<\/a> go under within six months of a cyberattack, making security more critical than ever before. IAM gives IT admins the control to secure digital assets and protect their company from cyberattacks.<\/p>\n\n\n\n<p>Learn more about the <a href=\"https:\/\/jumpcloud.com\/blog\/benefits-idaas\">benefits of IDaaS<\/a>, compare <a href=\"https:\/\/jumpcloud.com\/blog\/iam-vs-idaas\">IAM vs. IDaaS<\/a>, and compare <a href=\"https:\/\/jumpcloud.com\/blog\/iam-vs-idp\">IAM vs IdP<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">IAM Challenges&nbsp;<\/h3>\n\n\n\n<p>The newly diversified workplace with remote employees working on multiple platforms has complicated the IAM landscape.&nbsp;<\/p>\n\n\n\n<p>In the past, IAM systems were easier to manage, because users needed only two or three resources to do their job, and the workplace was dominated by Windows systems which were all located on-prem. Users also came into a physical office where IT could control the network and overall environment.<\/p>\n\n\n\n<p>IAM began to evolve as macOS and Linux gained popularity in the workplace as Windows alternatives. Then came Salesforce, Google Apps (aka Google Workspace), and other web applications that could replace on-prem, Windows-based applications. <\/p>\n\n\n\n<p>On-prem file storage alternatives arrived after that, such as Samba File Servers and NAS appliances, or cloud storage solutions from vendors like Box\u2122 or Dropbox\u2122. Even the network itself evolved from a wired connection to wireless via Wi-Fi.&nbsp;<\/p>\n\n\n\n<p>All of these changes have made IAM incredibly complex. Outdated, legacy solutions like Microsoft Active Directory (AD) are still the core <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-identity-management\">identity management<\/a> solution in most IT organizations, but AD isn\u2019t designed to support non-Windows or cloud-based IT resources.<\/p>\n\n\n\n<p> As a result, IT has to either manage non-Windows resources independently, or use third-party AD add-ons (e.g., web application SSO, directory extensions) that only add more complexity.&nbsp;<\/p>\n\n\n\n<p>Thankfully, there are newer, cloud-based directories and modern IAM solutions that can easily replace an on-prem AD-based IAM program for a simpler, more comprehensive approach.<\/p>\n\n\n\n<div class=\"promotion-banner-small is-flex-direction-column has-items-aligned-flex-start has-items-aligned-center-tablet\">\n    <div class=\"promo-small-image is-hidden-mobile\">\n        <img decoding=\"async\" src=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2026\/04\/Frame-1597887989-aspect-ratio-160-110.png\" alt=\"JumpCloud\">\n    <\/div>\n    <div class=\"promo-small-content\">\n        <p class=\"is-type-body-tiny is-type-weight-bold is-important promo-small-title\">\n                    <\/p>\n        <p class=\"is-type-body-default is-important\">\n            JumpCloud and Google are the unified control plane for the future of work. Manage every identity (human, non-human, and agentic) with the same rigor.        <\/p>\n    <\/div>\n    <div class=\"promo-small-cta\">\n        <a href=\"https:\/\/jumpcloud.com\/google-partnership\" data-promo=\"JumpCloud and Google Workspace\" class=\"button is-primary-green promo-small-banner-link\">Learn More<\/a>\n    <\/div>\n<\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\">How to Implement IAM Systems&nbsp;<\/h2>\n\n\n\n<p>There are six components to the traditional identity and access management landscape, and while each is a separate topic, they build on one another to develop a holistic IAM strategy. Tying these systems together in a sequential order helps to avoid gaps in management, which can hinder security.<\/p>\n\n\n\n<p>However, it\u2019s important to note that more modern IAM providers have combined other aspects of IT administration, like device and network management, with the traditional components of IAM. These modern directory platforms provide a more complete solution that enables IT administrators to grant secure access and manage a single identity for virtually all IT resources.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Start with Directory Services <\/h3>\n\n\n\n<p>Let\u2019s go back to the mailroom clerk and the accountant. Each has their own identity in an IT infrastructure. They both need access to certain resources in order to do their jobs, but for data security purposes, there are also resources they do not need access to.<\/p>\n\n\n\n<p>A directory service takes care of this by storing a user\u2019s credentials. Each time the mailroom clerk accesses an application, the directory service authenticates him\/her to that application. On the IT admin side, the directory provides the means to organize identities into logical groups, which can then have policies including conditional access applied against them that govern access and distribute security configurations.&nbsp;<\/p>\n\n\n\n<p>The directory also logs all of these interactions to ensure that compliance statutes are met. Since the directory of identities and resources underlies your entire infrastructure, we consider it the foundation of identity and access management.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Increase Functionality Using Directory Extensions<\/h3>\n\n\n\n<p>Once you\u2019ve established a directory services strategy, you may find your current applications are archaic, and don\u2019t have all the functionality you need to support a remote workforce. Directory extensions were created to fill in the gaps of conventional directory services.&nbsp;<\/p>\n\n\n\n<p>Extensions add to the functionality of an existing directory, allowing it to connect to platforms, devices, and applications it otherwise couldn\u2019t. Extensions also increase the functionality of directory services by integrating in-device management\/<a href=\"https:\/\/jumpcloud.com\/blog\/mdm-mobile-device-management\">MDM<\/a> services, and controlling user access.&nbsp;<\/p>\n\n\n\n<p>If you\u2019re still working with hard-wired directory services, an extension may be the easiest first step to complete your IAM process. However, modern solutions like cloud directory platforms have revolutionized the directory industry, and offer a streamlined approach to managing access and controlling non-Windows-based IT resources, eliminating the need for extensions altogether.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Give the Right Level of Access with Privileged Access Management <\/h3>\n\n\n\n<p>IT infrastructure consists of many servers, networks, and other assets. While directory services connect users to these assets, <a href=\"https:\/\/jumpcloud.com\/blog\/privileged-access-management\">privileged access management<\/a> (PAM) determines what a user is allowed \u2014 or not allowed \u2014 to access within these higher value, more critical applications and IT systems.&nbsp;<\/p>\n\n\n\n<p>The accountant and the mailroom clerk may both have access to the company\u2019s financial system, for example, but PAM ensures the clerk can only see his own pay stubs, while the accountant may have administrative privileges in the same application.&nbsp;<\/p>\n\n\n\n<p>As more critical infrastructure shifts to cloud-based Infrastructure-as-a-Service (IaaS) platforms, privileged access management is more important than ever. Secure access to the digital applications and underlying systems that run organizations is at the top of IT\u2019s list of job functions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Streamline Access to Web Apps with Single Sign-On (SSO)<\/h3>\n\n\n\n<p>Once you\u2019ve developed your directory services and PAM approaches, you can shift gears to components that add security and convenience for both IT admins and end users. <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-single-sign-on-sso\">Single sign-on<\/a> is one of them.&nbsp;<\/p>\n\n\n\n<p>A single user likely needs access to a multitude of applications to work remotely, like Google Workspace, Microsoft 365, GitHub, Slack, Salesforce, or Dropbox, to name a few. Since you would need a different username and password for each application, this creates productivity and security challenges. This is why SSO solutions grew alongside the increase in web-based applications over the past two decades.&nbsp;<\/p>\n\n\n\n<p>SSO connects one identity, managed by the underlying directory service, to the various web-based applications they need access to, instead of a user having to create multiple identities. From a users\u2019 perspective, they only have to sign in to one application with a single username and password to get access to all their web-based applications.&nbsp;<\/p>\n\n\n\n<p>For IT admins, single sign-on means fewer locked account requests\/password resets from users who can\u2019t remember all their various usernames and passwords. It also increases security by reducing the chances that users use weak passwords or reuse passwords across multiple accounts. <\/p>\n\n\n\n<p>Perhaps the biggest boon on the IT admin\u2019s side with modern SSO solutions is automated provisioning and deprovisioning of users, often referred to as User Lifecycle Management (ULM). In addition, top-tier SSO solutions are adding features such as conditional access and <a href=\"https:\/\/jumpcloud.com\/platform\/multi-factor-authentication-mfa\">multi-factor authentication<\/a> to improve security of the SSO implementation overall.<\/p>\n\n\n\n<p>SSO is a part of IAM that increases convenience for users, lessens IT\u2019s workload through automated provisioning\/deprovisioning, and helps improve security for a remote environment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Increase Convenience without Sacrificing Security Using Password Vaults&nbsp;<\/h3>\n\n\n\n<p>In this traditional approach to IAM, password vaults play an important role to further password security by making it easier for end users to leverage strong, complex passwords for virtually all of their IT resources.&nbsp;<\/p>\n\n\n\n<p>Password vaults allow users to store their password credentials, making it easier to access the large number of applications they might need which aren\u2019t able to leverage the SAML protocol for SSO. While SSO is designed exclusively for web applications that support SAML, <a href=\"https:\/\/jumpcloud.com\/blog\/need-single-sign-on-password-manager\">SSO password managers<\/a> can store and manage credentials for any kind of account, which can create a \u201cfaux\u201d single sign-on experience that extends beyond web applications.<\/p>\n\n\n\n<p>These vaults can also generate long, complex passwords that are much more secure, and users don\u2019t have to remember them because they\u2019re automatically provided at login by the password application. This approach requires them to remember a single password to access the many, which can be protected with multi-factor authentication to further secure access to these assets. Some solutions can even integrate password management and SSO into the directory.<\/p>\n\n\n\n<p>By providing a safe place to store passwords and encouraging these more complicated credentials, vaults are a helpful tool in maintaining <a href=\"https:\/\/jumpcloud.com\/blog\/understanding-iam-security\">IAM security<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Fortify Login Processes with Multi-Factor Authentication (MFA)<\/h3>\n\n\n\n<p>The final element to IAM security&#8211;to make logins as secure as possible&#8211;is multi-factor authentication. MFA increases security by requiring additional information above and beyond a username and complex password in order to authenticate access.<\/p>\n\n\n\n<p>Generally, MFA requires the user to input information they <em>know<\/em> (such as a username and password), and a second factor like something they <em>have<\/em> (like a smartphone or a YubiKey) or something they <em>are<\/em> (like a fingerprint or retina scan) in order to log in. <\/p>\n\n\n\n<p>While a username and password may be easily compromised in a data leak or other cyber security breach, MFA is virtually incorruptible and can be easily implemented, making it one of the most critical components to securing IAM. With modern push technology, MFA has become even easier with just the tap of a button on a smartphone as the \u201csecond\u201d factor.<\/p>\n\n\n\n<p>Ultimately, IAM focuses on managing and protecting each access transaction by first managing and protecting the identity of the person enacting that transaction. The six-step approach above, developed over years as new solutions emerged, showcases the underlying strategy IAM advocates for:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Minimizing the number of \u201cidentities\u201d each user must use (and remember)&nbsp;<\/li>\n\n\n\n<li>Extending this core group of identities to as many IT resources as possible over secure channels<\/li>\n\n\n\n<li>Protecting each identity by forcing each access transaction to validate that the person using that identity is who they say they are, along with the entire transmission (device, network, application) <\/li>\n<\/ol>\n\n\n\n<p>However, the layered approach above does not achieve the ideal IAM strategy: a <em>single<\/em> set of credentials, to access <em>all<\/em> IT resources. It also puts a heavy burden on IT admins to set up, maintain, and secure each \u201clayer\u201d of the strategy, which often involves the support of independent technologies, and must be tightly integrated to function.&nbsp;<\/p>\n\n\n\n<p>The end user must still use multiple identities to do their job, which can frustrate and defeat the purpose of each layer of security and efficiency, while the IT admin is stretched and may not be able to maintain the entire system on their own.<\/p>\n\n\n\n<p>The challenges outlined above have led the development of more modern solutions that consolidate all aspects of the traditional IAM strategy into a single platform. Often cloud-based to support end users no matter where they work, these directory platforms are able to provide the directory services that can create a single, secure identity; management services to extend that identity to applications, devices, networks, servers, and more; and security services that protect each access transaction using the principles of Zero Trust security.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud Directory Platform: An Optimized IAM Solution<\/h2>\n\n\n\n<p>Remote and hybrid workplace models necessitate a new generation of technology that integrates with cloud-forward organizations. In the identity and access management market, this tech is called a Cloud Directory Platform.&nbsp;<\/p>\n\n\n\n<p>A modern Cloud Directory Platform offers a modern, efficient, cloud-based approach to IAM by converging directory services, privileged account management, directory extension, web app SSO, and multi-factor authentication into one optimized SaaS-based solution.<\/p>\n\n\n\n<p>A Cloud Directory Platform offers centralized identities instantly mapped to IT resources like devices, applications, and networks, regardless of platform, provider, location, or protocol. These IAM solutions leverage multiple protocols such as <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-ldap\">LDAP<\/a>, RADIUS, SAML, and SCIM so IT organizations can seamlessly provision and deprovision, while users have secure, frictionless access to their resources.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">JumpCloud Directory Platform: Modern IAM<\/h3>\n\n\n\n<p>If you\u2019re interested in learning more about how to implement an IAM solution, <a href=\"https:\/\/jumpcloud.com\/contact\">drop us a note<\/a>. We\u2019d love to chat about how you can leverage JumpCloud\u2019s Cloud Directory Platform, or try it yourself by <a href=\"https:\/\/console.jumpcloud.com\/signup\" target=\"_blank\" rel=\"noreferrer noopener\">signing up for a trial<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity and access management, or IAM, used to be much simpler. But when the cloud came along, so did a number of acronyms and complexities. What is IAM today?<\/p>\n","protected":false},"author":158,"featured_media":6855,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2781],"tags":[],"collection":[2779],"platform":[],"funnel_stage":[3016],"coauthors":[2514],"class_list":["post-6854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","collection-directory-services","funnel_stage-top-funnel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identity And Access Management : What Is IAM, Why Do You Need It<\/title>\n<meta name=\"description\" content=\"Learn more about identity and access management (IAM), and why you need it to keep your organization secure. Leverage IAM with JumpCloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/what-is-iam\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is IAM? (Identity and Access Management)\" \/>\n<meta property=\"og:description\" content=\"Learn more about identity and access management (IAM), and why you need it to keep your organization secure. Leverage IAM with JumpCloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/what-is-iam\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-23T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-29T22:25:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Molly Murphy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Molly Murphy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam\"},\"author\":{\"name\":\"Molly Murphy\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/848d5076d1ee31d44f3e931246a2e6e4\"},\"headline\":\"What is IAM? (Identity and Access Management)\",\"datePublished\":\"2021-11-23T16:00:00+00:00\",\"dateModified\":\"2024-01-29T22:25:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam\"},\"wordCount\":2670,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png\",\"articleSection\":[\"How-To\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam\",\"url\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam\",\"name\":\"Identity And Access Management : What Is IAM, Why Do You Need It\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png\",\"datePublished\":\"2021-11-23T16:00:00+00:00\",\"dateModified\":\"2024-01-29T22:25:03+00:00\",\"description\":\"Learn more about identity and access management (IAM), and why you need it to keep your organization secure. Leverage IAM with JumpCloud.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/what-is-iam\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png\",\"caption\":\"What is IAM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/what-is-iam#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is IAM? (Identity and Access Management)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/848d5076d1ee31d44f3e931246a2e6e4\",\"name\":\"Molly Murphy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/8f47d137f180346650b37413f72e3cd1\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/03cbe929374b32bf56059073b0aeacd01929a666dacc379b0de0ffc0abaf9349?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/03cbe929374b32bf56059073b0aeacd01929a666dacc379b0de0ffc0abaf9349?s=96&d=mm&r=g\",\"caption\":\"Molly Murphy\"},\"description\":\"Molly Murphy is a Senior Content Writer at JumpCloud. A self-professed nerd, she loves working on the cutting edge of the latest IT tech. When she's not in the [remote] office, Molly loves traveling, rescuing animals, and growing her all together unhealthy obsession with Harry Potter.\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identity And Access Management : What Is IAM, Why Do You Need It","description":"Learn more about identity and access management (IAM), and why you need it to keep your organization secure. Leverage IAM with JumpCloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/what-is-iam","og_locale":"en_US","og_type":"article","og_title":"What is IAM? (Identity and Access Management)","og_description":"Learn more about identity and access management (IAM), and why you need it to keep your organization secure. Leverage IAM with JumpCloud.","og_url":"https:\/\/jumpcloud.com\/blog\/what-is-iam","og_site_name":"JumpCloud","article_published_time":"2021-11-23T16:00:00+00:00","article_modified_time":"2024-01-29T22:25:03+00:00","og_image":[{"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png","width":1,"height":1,"type":"image\/png"}],"author":"Molly Murphy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Molly Murphy","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam"},"author":{"name":"Molly Murphy","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/848d5076d1ee31d44f3e931246a2e6e4"},"headline":"What is IAM? (Identity and Access Management)","datePublished":"2021-11-23T16:00:00+00:00","dateModified":"2024-01-29T22:25:03+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam"},"wordCount":2670,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png","articleSection":["How-To"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam","url":"https:\/\/jumpcloud.com\/blog\/what-is-iam","name":"Identity And Access Management : What Is IAM, Why Do You Need It","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png","datePublished":"2021-11-23T16:00:00+00:00","dateModified":"2024-01-29T22:25:03+00:00","description":"Learn more about identity and access management (IAM), and why you need it to keep your organization secure. Leverage IAM with JumpCloud.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/what-is-iam"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2017\/06\/pablo-36-1.png","caption":"What is IAM"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/what-is-iam#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"What is IAM? (Identity and Access Management)"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/848d5076d1ee31d44f3e931246a2e6e4","name":"Molly Murphy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/8f47d137f180346650b37413f72e3cd1","url":"https:\/\/secure.gravatar.com\/avatar\/03cbe929374b32bf56059073b0aeacd01929a666dacc379b0de0ffc0abaf9349?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/03cbe929374b32bf56059073b0aeacd01929a666dacc379b0de0ffc0abaf9349?s=96&d=mm&r=g","caption":"Molly Murphy"},"description":"Molly Murphy is a Senior Content Writer at JumpCloud. A self-professed nerd, she loves working on the cutting edge of the latest IT tech. When she's not in the [remote] office, Molly loves traveling, rescuing animals, and growing her all together unhealthy obsession with Harry Potter.","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/6854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/158"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=6854"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/6854\/revisions"}],"predecessor-version":[{"id":104387,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/6854\/revisions\/104387"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/6855"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=6854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=6854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=6854"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=6854"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=6854"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=6854"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=6854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}