• BarqsHasBite@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    23 hours ago

    Identity and access management ensures that the right people, machines, and software components get access to the right resources at the right time. First, the person, machine, or software component proves they’re who or what they claim to be. Then, the person, machine, or software component is allowed or denied access to or use of certain resources.

    So that’s what’s that called. Is that also what tracks who access what and when?