{"id":3751,"date":"2022-09-12T15:12:38","date_gmt":"2022-09-12T19:12:38","guid":{"rendered":"http:\/\/www.jumpcloud.com\/blog\/?p=3751"},"modified":"2023-05-11T16:11:53","modified_gmt":"2023-05-11T20:11:53","slug":"identity-management-lifecycle","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle","title":{"rendered":"What is Identity Lifecycle Management?"},"content":{"rendered":"\n

Identity lifecycle management (ILM) is the act of managing users\u2019 digital identities and access levels from day 1 of their employment all the way through their departure date.<\/p>\n\n\n\n\n

\n
\n \"探花大神\"\n <\/div>\n
\n

\n <\/p>\n

\n Check out our webinar on practical tips for managing the user identity lifecycle. <\/p>\n <\/div>\n

\n Watch Webinar<\/a>\n <\/div>\n<\/div>\n\n\n\n\n

Before we get any deeper into identity lifecycle management (also sometimes referred to as user lifecycle management), let\u2019s back up and define a few related terms: digital identity<\/em> and identity lifecycle<\/em>.<\/p>\n\n\n\n

What is a Digital Identity?<\/h2>\n\n\n\n

A digital identity is a cluster of information used across cyberspace that represents an individual person, organization, application, or device. In this article, a digital identity will be specifically referring to that of an individual user<\/em>.<\/p>\n\n\n\n

What is an Identity Lifecycle?<\/h2>\n\n\n\n

An identity lifecycle refers to the entire process that starts when a user\u2019s digital identity is created and assigned access to resources, and continues with authentication of that identity, updates to credentials and attributes, ending when that identity is retired or deleted entirely.<\/p>\n\n\n\n

What is the Identity Lifecycle Management Process?<\/h2>\n\n\n\n

The overarching identity lifecycle management process is simply the management of each of the processes and steps outlined directly above. Essentially, it\u2019s a handful of identity and access related processes that are meant to keep the user behind the identity and organizational resources safe.<\/p>\n\n\n\n

To reiterate, those identity and access related processes are:<\/strong><\/p>\n\n\n\n

    \n
  1. Onboarding: <\/strong>Creating a new digital identity and provisioning access to resources.<\/li>\n\n\n\n
  2. Ongoing access tweaks: <\/strong>Changing access levels during role changes or other events in a timely manner.<\/li>\n\n\n\n
  3. Monitoring and reporting: <\/strong>Keeping track of who has access to what, how, and when, to ensure that compliance standards<\/a> are met and security expectations are adhered to.<\/li>\n\n\n\n
  4. Offboarding: <\/strong>Deprovisioning resource access from a digital identity of a departing employee in a timely manner.<\/li>\n<\/ol>\n\n\n\n
    \"flow<\/figure>\n\n\n\n

    Now that we\u2019ve defined all of the relevant terms that come up when discussing identity lifecycle management, this article will now dig into the following topics:<\/p>\n\n\n\n