This article has multiple issues. Please update identity management concepts technologies and systems pdf article to reflect recent events or newly available information. Unsourced material may be challenged and removed.
It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements. It also includes the management of descriptive information about the user and how and by whom that information can be accessed and modified. Managed entities typically include users, hardware and network resources and even applications. It can be interpreted as the codification of identity names and attributes of a physical instance in a way that facilitates processing. Such an axiomatic model expresses “pure identity” in the sense that the model is not constrained by a specific application context.