What is User Access Management?
The User Access Management (UAM) module centralizes all information about user accounts, permissions, and access statuses. It ensures that administrators can efficiently manage who has access to the system, what level of access they have, and when their access begins or ends.
UAM helps prevent unauthorized access, maintains compliance with internal policies, and provides a clear audit trail of user activities.
Who are the Users of UAM?
UAM is primarily used by system administrators and managers responsible for onboarding, maintaining, and disabling user accounts. Not all employees will have access to UAM; permissions are restricted to those managing security and compliance.
When is UAM Used?
UAM is used whenever:
- A new employee is onboarded.
- An existing user’s access rights change.
- A user’s account needs to be disabled or reactivated.
- Compliance checks require verification of user access.
Why is UAM Important?
UAM acts as the central and official repository of all user accounts and access permissions. It ensures:
- Security: Prevents unauthorized access.
- Compliance: Maintains proper records for audits.
- Efficiency: Streamlines onboarding and offboarding processes.
- Accountability: Provides a clear trail of user actions and changes.
