{"id":6854,"date":"2021-11-23T11:00:00","date_gmt":"2021-11-23T16:00:00","guid":{"rendered":"https:\/\/www.jumpcloud.com\/blog\/?p=6854"},"modified":"2024-01-29T17:25:03","modified_gmt":"2024-01-29T22:25:03","slug":"what-is-iam","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/what-is-iam","title":{"rendered":"What is IAM? (Identity and Access Management)"},"content":{"rendered":"\n
Identity and access management (IAM) may be the most important function IT performs. It\u2019s how you ensure people have access to the resources they need to get their jobs done, while also keeping those same people (and the corporate digital assets they access) secure. <\/p>\n\n\n\n
Done well, IAM means the mailroom clerk doesn\u2019t have access to the company\u2019s financial records, but your CFO does. Done poorly, it can be catastrophic for a company, depending on what kind of access that identity was given. <\/p>\n\n\n\n
In an increasingly hybrid workplace, getting identity and access management right is more important to IT departments than ever before. Read on to learn everything you need to know about what IAM is, and how to architect an IAM system.<\/p>\n\n\n\n