
Central management of users and access rights
Automated and rule based IAM (Identity Access Management) solutions ensure that authorized persons only have access to the data intended for their eyes. An identity access management tool can not only grant users access authorization to different sys-tems, cloud areas and applications, but also revoke this authorization, e.g. when em-ployees resign or a business partnership ends. As a rule, an email address or username and password are sufficient for identification. Particularly in the case of very sensitive information and access with strict security requirements, further identification factors such as biometric data, keycards or additional passwords can be added, which are sent using special security apps or via SMS.