Likewise, a computer network is like the agency, and every agency room exemplifies a file or some application on that network. The employees working in the agency are the users. The keys are the access cards that the executive circulates to each employee on the network. The keys also define what an users can do while accessing a file or application.
Similar to the agency security system, identity management is the most fundamental kind of data protection that the big agencies and companies utilise.
**Usability of Password
Identity Management doesn’t mean only to give some user the permission to log in;
identity management operates on the user accesibility just like to raise an alarm against some unauthorised person. Put Differently, An administrator puts some certification like an identity number to each of his workers. That identity number gives the worker access to the network and controls what services are to be acquirable. That identity number can also alarm the executive if the user is using forbidden regions. Security personnel are also conscious of activities that could trigger an alert set on actions that point a person is trying access into proscribed domains.
In its standard figure, identity management expects a user to insert a username and password. Furthermore, identity managementcontains the exact science process to identify a user, as well as to approve/deny access to resources within an organization or agency.
Find out more on GRC Framework- Find Out Some Handful Information