With IAM, we can define and modify user roles, track and report on their activities, and enforce regulatory compliance policies to protect and ensure data security and privacy. It is an essential part of the University's IT architecture.
An IAM system can be deployed on-premises, provided by a third party through a cloud-based subscription model or deployed in a hybrid model. It includes single sign-on systems, multi-factor authentication and privileged access management.
Identity and Access Management (IAM)
Identity and Access Management (IAM) refers to a set of processes, policies and technologies that securely and efficiently create, manage and authenticate users' digital identities and access privileges to resources.
What's next with IAM?
What are the benefits of IAM?
How is it implemented at uOttawa?
At the University, the IAM system handles thousands of interactions every day based on the use of different source systems such as uoCampus, Talisma, Office 365 and access control to various buildings. Whether it is the student body, support staff, faculty or an external partner, the IAM system ensures that all users have access to the various systems and have the proper permissions to perform the desired tasks.
Some of the key functions of an IAM system are:
- Identification of individuals in a system.
- Identifying roles in a system and assigning roles to individuals.
- Adding, removing and updating individuals and their roles in a system.
- Assigning access levels to individuals or groups of individuals.
- Protecting confidential data within the system and securing the system itself.