What is IAM (Identity and Access Management)?
Identity and Access Management (IAM) is the framework of policies, processes, and technologies that ensure the right people have the right access to the right resources at the right time. It covers user provisioning, authentication, authorization, and deprovisioning across every system.
How IAM works
Three-step view of how it operates in practice.
Provision
New users are created with role-based access automatically when they join. No more permissions are granted than the role requires.
Authenticate & authorize
Users prove who they are (authentication) and are granted only the permissions attached to their role (authorization).
Deprovision
When users change roles or leave, access is updated or revoked everywhere — not just in email.
Components of a modern IAM program
A clear breakdown of the common variants.
Identity provider
Central source of truth for accounts. Usually Entra ID, Okta, or Google Workspace.
Authentication
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
Authorization
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
Lifecycle
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why IAM matters for SMBs
Identity and Access Management (IAM) is the framework of policies, processes, and technologies that ensure the right people have the right access to the right…
Common IAM mistakes
- Email is the offboarding triggerDisabling email doesn’t revoke app access. Centralized deprovisioning through the IAM is the only reliable way.
- Manual user creationAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- No privileged access strategyAdmin accounts hidden in email inboxes, shared between people. Privileged access management (PAM) separates this cleanly.
- No periodic reviewAccess sprawl is silent. Quarterly access recertification catches stale permissions before they become breaches.
IAM frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Fragmented identity across your apps?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.