IGA Glossary

Identity and Access Management(IAM)

Identity and Access Management (IAM) is the discipline of managing who can access which systems and what they can do within those systems. It covers everything from user authentication and authorization to directory services and access policies.

What is Identity and Access Management?

IAM is the umbrella term for all the tools, policies, and processes an organization uses to manage digital identities and control access to resources. At its most basic, IAM answers two questions: "Who are you?" and "What are you allowed to do?"

Every time an employee logs into their email, opens a shared drive, or accesses a business application, IAM is working behind the scenes. The directory service verifies their identity. The access policies determine what they can see and do. The authentication mechanism confirms they are who they claim to be.

For most companies today, Microsoft Entra ID (formerly Azure Active Directory) is the core IAM platform. It is the identity provider for Microsoft 365 and can be extended to manage access to thousands of third-party SaaS applications.

The core components of IAM

IAM is a broad field, but it breaks down into a few key areas.

Authentication is the process of verifying someone's identity. This includes passwords, multi-factor authentication (MFA), biometrics, and passwordless methods like FIDO2 keys. In Entra ID, Conditional Access policies let you define when and how users need to authenticate based on factors like location, device, and risk level.

Authorization determines what an authenticated user is allowed to do. This is where permissions, roles, and access policies come in. A user might be authenticated (we know who they are) but not authorized to access a particular resource (they do not have permission).

Directory services store and organize identity information. Entra ID is a cloud-based directory that holds user accounts, group memberships, and application registrations. For organizations with on-premises infrastructure, Active Directory (AD) often works alongside Entra ID in a hybrid setup.

Single sign-on (SSO) lets users authenticate once and access multiple applications without logging in again. This reduces password fatigue and makes access management simpler for both users and IT.

Multi-factor authentication (MFA) adds a second verification step beyond the password. It is one of the most effective security measures any organization can implement.

How is IAM different from IGA?

IAM is the broader discipline. IGA (Identity Governance and Administration) is a specific area within IAM that focuses on governance — making sure access is appropriate, reviewed, and compliant with policies.

A simple way to think about the difference:

  • IAM handles the technical plumbing: directories, authentication, SSO, MFA, access policies.
  • IGA handles the management layer: who should have what access, how access is granted and revoked, whether existing access is still appropriate, and maintaining an audit trail.

You need IAM to function day to day. You need IGA to stay secure and compliant over time. Most organizations start with IAM basics (setting up Entra ID, enabling SSO and MFA) and add IGA capabilities later as they grow and face compliance requirements.

Why does IAM matter for mid-sized companies?

It is tempting to think of IAM as something only large enterprises need to worry about. But every company with employees and digital systems has an IAM challenge, whether they realize it or not.

Consider a company with 150 employees. They use Microsoft 365, Salesforce, a project management tool, a finance platform, and a few industry-specific applications. That is a lot of access to manage. Without proper IAM, passwords are weak or reused, former employees may still have active accounts, there is no clear picture of who can access what, IT spends hours on manual account setup and password resets, and there is no way to prove access controls to auditors.

A well-implemented IAM strategy — starting with Entra ID as the central identity provider, enabling SSO for SaaS apps, and enforcing MFA — addresses most of these issues. It is the foundation that everything else builds on.

What does a modern IAM stack look like?

For a typical mid-sized company using Microsoft, the IAM stack usually includes Microsoft Entra ID as the primary identity provider and directory, Conditional Access policies to control how and when users authenticate, SSO integrations with SaaS applications through Entra ID enterprise apps, MFA enforced for all users (ideally using the Microsoft Authenticator app or hardware keys), self-service password reset to reduce IT support burden, and an IGA layer like Adcyma for automating user provisioning, access reviews, and lifecycle management on top of Entra ID.

The IAM layer handles real-time authentication and access decisions. The IGA layer handles the ongoing management and governance of those identities and their access over time.

Common IAM challenges

Even with good tools in place, organizations run into recurring IAM challenges.

Access sprawl. Over time, users accumulate access they no longer need. They change roles but keep their old permissions. This creates security risk and makes compliance harder.

Hybrid environments. Many organizations still run on-premises Active Directory alongside Entra ID. Keeping identities synchronized and access policies consistent across both is a real operational challenge.

SaaS application management. Every new SaaS tool the company adopts adds another system where identities and access need to be managed. Without SSO and centralized provisioning, each app becomes its own identity silo.

Balancing security and usability. Too many authentication prompts frustrate users. Too few create security gaps. Finding the right balance requires thoughtful Conditional Access policies and a solid understanding of your risk profile.

Where does IAM go from here?

The IAM landscape is moving in a few clear directions.

Zero trust is becoming the default security model. Instead of trusting users because they are on the corporate network, every access request is verified based on identity, device, location, and behavior. Entra ID's Conditional Access is a core building block for zero trust.

Passwordless authentication is gaining ground. FIDO2 security keys, Windows Hello, and passkeys are replacing traditional passwords, improving both security and user experience.

IGA used to be reserved for large enterprises. Solutions like Adcyma are now bringing governance capabilities — automated provisioning, access reviews, lifecycle management — to mid-sized companies that previously could not justify the cost or complexity of traditional IGA platforms.

IAM is not a project you finish. It is an ongoing practice that evolves as your organization grows, your tools change, and the threat landscape shifts.

See how Adcyma handles this:

Explore the Platform

Put these concepts into practice

Adcyma makes identity governance simple for companies using Microsoft Entra ID. See how these terms translate into actual features.