Skip main navigation

Wrap-up

Understanding the aim of Identification in IdAM is to control access by establishing accountability of the subject.
Let’s wrap up what you have learned.

  • For identification, we are looking to control access and to establish accountability. Granting or denying any access moving forward logically requires three things. We need a subject, and we need to know who that subject is, which is why we’re so concerned with the identification. We need to understand the object that is being accessed, and then we have something that acts as a mediator between the subject and the object. Think back to the example of your home.

  • It can be difficult to enforce accountability for any individual accessing that object. This is why establishing the ‘who’ is so important. Subjects may have different permissions, which links to privileges, and will need to be accountable for their actions. Unique identities should therefore be created. Even if the name representing that ID is duplicated (for example, if the same forename and surname are duplicated) the actual unique reference number underneath that needs to be unique.

This article is from the free online

Cyber Security Foundations: Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now