This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Access Management
More than 30 IDM realisations in the Czech Republic and abroad
Access Management
Managing user access to information resources
Why AM?
Access Management (AM) is the process of identifying, monitoring, controlling, and managing user access and permissions to systems and applications.
Access Management is primarily a process used in granting access to users based on the conditions met.
AM is usually used in conjunction with IdM. Identity Management creates, secures, and manages various users, roles, groups and authorization policies, while AM provides for the logging in (and logging out) of users to information assets.
Contribution of AM
Ability to use two or more factors to verify identity
MFA by location, time, non-standard frequency or combination of accesses, etc.
SSO – use of a single login (e.g., to AD/LDAP) for automatic login to other systems/applications
Together with IdM, they form IAM – complete access and permissions management to systems and applications in the organization
Support for GDPR, ZoKB
AM Reference
Are you interested in our references regarding Access Management?
Take a look at the clients we have helped deploy AM solutions.