The access management (AM) market is defined by customers’ needs to establish, enforce and manage runtime access controls for internal and external types of identities, interacting with cloud, modern standards-based web and legacy web applications. An AM vendor provides, at minimum, the following core capabilities: Identity administration of internal and external types of identities, including directory and identity synchronization services; User self-service, including end-user and administrative interfaces for user registration, password management, profile management and delegated administration; A workforce launchpad of applications or application gallery for single sign-on (SSO); Authorization and adaptive access, and support for modern identity protocols like OAuth 2.0; Session management; User authentication methods, including multifactor authentication (MFA), and SSO.
User authentication provides real-time corroboration of an identity claim by a person accessing an organization’s assets. It is foundational to network, application and data security, because it reduces fraud, mitigates account takeover (ATO) and other identity risks, and addresses regulatory requirements. Tools in this market enable or provide one or more credential-based or signal-based authentication methods that can augment or replace legacy passwords for employees, contingent workers, partners, suppliers, business or retail customers, or citizens in one or more use cases.