Image credit from Google.com.ph |
It controls the following data:
- File permission such as create, read and edit on file servers.
- Program permissions, such as the right to execute a program on application servers.
- Data rights, such as the right to retrieve or update information in a database.
(http://hitachi-id.com/concepts/access_control.html)
Also it include the following:
- Automate and unify visioning, role management, password management, single sign-on and privileged account management.
- Ensure that identity and access management activities are supporting business objectives.
- Provide segregation of duties and access control.
(http://www.quest.com/identity-management/)