{"id":3312,"date":"2021-08-26T11:42:00","date_gmt":"2021-08-26T11:42:00","guid":{"rendered":"https:\/\/permsecure.com\/?p=3312"},"modified":"2024-12-18T13:16:57","modified_gmt":"2024-12-18T13:16:57","slug":"permission-management-vs-identity-access-management-what-is-the-difference","status":"publish","type":"post","link":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/","title":{"rendered":"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference?"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained padding-inline-C2G2 padding-inline-M-C0G1 padding-top-pe-full\"><figure class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"object-fit:cover;\" srcset=\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp 750w, https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg-300x200.webp 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex padding-top-1em\"><div class=\"wp-block-avatar\"><img alt='Bartosz Grodzicki Avatar' src='https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-40x40.png' srcset='https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-80x80.png 2x' class='avatar avatar-40 photo wp-block-avatar__image' height='40' width='40' \/><\/div>\n\n<div class=\"wp-block-post-author padding-left-1em\"><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">Bartosz Grodzicki<\/p><\/div><\/div>\n\n<div class=\"wp-block-post-date padding-left-1em\"><time datetime=\"2021-08-26T11:42:00+00:00\">08\/26\/2021<\/time><\/div><\/div>\n\n\n<h2 class=\"wp-block-post-title padding-bottom-0_25em padding-top-0_25em\">Permission Management vs. Identity &amp; Access Management \u2013 What is the difference?<\/h2>\n\n\n<div class=\"wp-block-group is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-f56a869c wp-block-group-is-layout-flex align-items-S-flex-start flex-flow-S-column\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-arrow-left is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-basics-4-color has-text-color has-link-color has-border-color has-basics-4-border-color wp-element-button\" href=\"\/en\/knowledge\/\" style=\"border-width:2px\">All articles<\/a><\/div>\n<\/div>\n\n\n<div class=\"taxonomy-category wp-block-button wp-block-button__link has-primary-3-background-color has-background wp-element-button wp-block-post-terms margin-left-C0G1 margin-left-S-C0G0 margin-top-S-C0G1\"><a href=\"https:\/\/permsecure.com\/en\/wissen\/#category-iam-en\/\" rel=\"tag\">IAM<\/a><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained padding-block-pe-full padding-inline-C2G2 padding-inline-M-C0G1\">\n<p>Employees in organizations need access to various resources (e.g. groups, applications, systems \u2026) for their tasks. Managing these accesses is a challenge because the requirements are always changing as soon as new applications are added or users require additional access permissions.&nbsp;<\/p>\n\n\n\n<p>Often, in this context, the terms \u201d permission management \u201d and \u201d identity access management \u201d are used in the same breath to describe the management of permissions on a system.&nbsp;Although the German Federal Office for Information Security, or BSI for short, combines the terms under the umbrella term \u201cidentity and access management\u201d, in practice there is a clear separation of the two systems, as there are some differences between the two solutions.&nbsp;<\/p>\n\n\n\n<p>In this article, we want to clarify the meaning of the two terms and show how the two systems differ and whether there is a dependency on the size of the company.<\/p>\n\n\n<div class=\"table-of-contents\"><h3>Content<\/h3><ul><li class=\"h2\"><a href=\"#what-is-permission-management\">What is Permission Management?<\/a><\/li><li class=\"h2\"><a href=\"#what-is-identity-access-management\">What is Identity Access Management?<\/a><\/li><li class=\"h2\"><a href=\"#get-in-touch-with-us\">Get in touch with us<\/a><\/li><li class=\"h2\"><a href=\"#what-is-the-difference\">What is the Difference?<\/a><\/li><\/ul><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is Permission Management?<\/h2>\n\n\n\n<p>With an permission management or permission management application, we can generally manage access to various resources, such as groups, applications or systems for users who need to access these resources.&nbsp;In most companies, the Active Directory is in the foreground, which largely \u201ccaps\u201d the administration of resources.&nbsp;Other possibilities that a \u201cclassic\u201d permission management brings with it include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Intuitive administration of permissions for individual systems, e.g. the Active Directory or various file servers<\/li>\n\n\n\n<li>Automated implementation of permission requests<\/li>\n\n\n\n<li>Automation of audit-proof permission reporting for individual systems, e.g. the Active Directory or various file servers<\/li>\n<\/ul>\n\n\n\n<p>However, should the requirements become more complex over time, the limits are quickly reached.&nbsp;Despite the advantage of having a high degree of standardized processes and procedures for creating group and role structures, a standardized permission management system is not sufficient for more complex workflows and\/or additional systems due to rigid structures.&nbsp;&nbsp;<\/p>\n\n\n\n<p>If you reach this point, you need to think about establishing a suitable additional solution or replacing the permission management system.&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-full-white-color has-secondary-4-background-color has-text-color has-background has-link-color wp-elements-c51a6cf5a938662f0b2b34224235bdcf is-layout-flow wp-block-group-is-layout-flow padding-block-pe-full padding-inline-C1G2 padding-inline-M-C0G1\">\n<div class=\"wp-block-group is-background has-secondary-4-background-color has-background is-layout-flow wp-block-group-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-0dfbf163 wp-block-group-is-layout-flex align-items-flex-start flex-flow-S-column\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow padding-bottom-S-1em width-C5G0 width-S-C10G0\">\n<h2 class=\"wp-block-heading toc-ignore has-h-1-font-size padding-bottom-0_5em\">Get the Whitepaper!<\/h2>\n\n\n\n<p>Deepen your knowledge with our Whitepaper on IAM.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow width-C5G0 width-M-C6G0 width-S-C12G0\"><div class=\"wpforms-container wpforms-block wpforms-block-eca6757a-a186-4ce6-b491-f4e4ca6efff6 wpforms-render-modern\" id=\"wpforms-3179\"><form id=\"wpforms-form-3179\" class=\"wpforms-validate wpforms-form wpforms-ajax-form\" data-formid=\"3179\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/en\/wp-json\/wp\/v2\/posts\/3312\" data-token=\"6d37b801155ee3e7cfb7fa5f2cb79537\" data-token-time=\"1777802774\"><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div id=\"wpforms-error-noscript\" style=\"display: none;\">Please enable JavaScript in your browser to complete this form.<\/div><div class=\"wpforms-field-container\"><div id=\"wpforms-3179-field_4-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"4\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3179-field_4\" aria-hidden=\"false\">First Name <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-3179-field_4\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][4]\" placeholder=\"First Name*\" aria-errormessage=\"wpforms-3179-field_4-error\" required><\/div><div id=\"wpforms-3179-field_5-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"5\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3179-field_5\" aria-hidden=\"false\">Last Name <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-3179-field_5\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][5]\" placeholder=\"Last Name*\" aria-errormessage=\"wpforms-3179-field_5-error\" required><\/div><div id=\"wpforms-3179-field_2-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"2\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3179-field_2\" aria-hidden=\"false\">E-mail* <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"email\" id=\"wpforms-3179-field_2\" class=\"wpforms-field-large wpforms-field-required\" data-rule-restricted-email=\"1\" name=\"wpforms[fields][2]\" placeholder=\"E-mail*\" spellcheck=\"false\" aria-errormessage=\"wpforms-3179-field_2-error\" required><\/div><div id=\"wpforms-3179-field_3-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"3\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3179-field_3\" aria-hidden=\"false\">Company<\/label><input type=\"text\" id=\"wpforms-3179-field_3\" class=\"wpforms-field-large\" name=\"wpforms[fields][3]\" placeholder=\"Company\" aria-errormessage=\"wpforms-3179-field_3-error\" ><\/div>\t\t<div id=\"wpforms-3179-field_1-container\"\n\t\t\tclass=\"wpforms-field wpforms-field-text\"\n\t\t\tdata-field-type=\"text\"\n\t\t\tdata-field-id=\"1\"\n\t\t\t>\n\t\t\t<label class=\"wpforms-field-label\" for=\"wpforms-3179-field_1\" >E-mail* Terms Last<\/label>\n\t\t\t<input type=\"text\" id=\"wpforms-3179-field_1\" class=\"wpforms-field-medium\" name=\"wpforms[fields][1]\" >\n\t\t<\/div>\n\t\t<div id=\"wpforms-3179-field_6-container\" class=\"wpforms-field wpforms-field-checkbox color-secondary-1 has-copy-s-font-size\" data-field-id=\"6\"><fieldset><legend class=\"wpforms-field-label wpforms-label-hide\" aria-hidden=\"false\">Terms and Conditions <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/legend><ul id=\"wpforms-3179-field_6\" class=\"wpforms-field-required\"><li class=\"choice-1 depth-1\"><input type=\"checkbox\" id=\"wpforms-3179-field_6_1\" name=\"wpforms[fields][6][]\" value=\"I accept the privacy policy.\" aria-errormessage=\"wpforms-3179-field_6_1-error\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-3179-field_6_1\">I accept the privacy policy.<\/label><\/li><\/ul><\/fieldset><\/div><script>\n\t\t\t\t( function() {\n\t\t\t\t\tconst style = document.createElement( 'style' );\n\t\t\t\t\tstyle.appendChild( document.createTextNode( '#wpforms-3179-field_1-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-3179-field_1-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-3179-field_1-container label { counter-increment: none; }' ) );\n\t\t\t\t\tdocument.head.appendChild( style );\n\t\t\t\t\tdocument.currentScript?.remove();\n\t\t\t\t} )();\n\t\t\t<\/script><\/div><!-- .wpforms-field-container --><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"3179\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/posts\/3312\"><input type=\"hidden\" name=\"url_referer\" value=\"\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-3179\" class=\"wpforms-submit has-secondary-3-background-color\" data-alt-text=\"Please wait...\" data-submit-text=\"Submit\" aria-live=\"assertive\" value=\"wpforms-submit\">Submit<\/button><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/permsecure.com\/wp-content\/plugins\/wpforms\/assets\/images\/submit-spin.svg\" class=\"wpforms-submit-spinner\" style=\"display: none;\" width=\"26\" height=\"26\" alt=\"Loading\"><\/div><\/form><\/div>  <!-- .wpforms-container --><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained padding-block-pe-full padding-inline-C2G2 padding-inline-M-C0G1\">\n<h2 class=\"wp-block-heading\">What is Identity Access Management?<\/h2>\n\n\n\n<p>Identity and Access Management (IAM) deals with the central administration of identities and access permissions on various systems and applications used in the company. However, the administration goes beyond standardized processes and procedures, both in terms of complexity and functional scope.&nbsp;As soon as more complex requirements become necessary, the establishment of an IAM solution should come to the foreground.<\/p>\n\n\n\n<p>All processes and applications that address user-related permissions in the company \u2013 from the application and approval process to the allocation of resources and permissions \u2013 can be mapped and evaluated more comprehensively using an IAM solution.<\/p>\n\n\n\n<p>However, the introduction of such a solution is often time-consuming and cost-intensive, which is why some companies \u201cshy away\u201d from investing in an IAM.&nbsp;In the short term, however, not only the costs should be considered, but also the positive effects that result from the optimization and automation of processes within user management and user lifecycles in the long term.&nbsp;A cost-benefit analysis can certainly be helpful in the decision-making process.<\/p>\n\n\n\n<p>An identity and access management system offers the following additional possibilities, among others:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Management of all persons and accesses in the company<\/li>\n\n\n\n<li>Mapping of the complete user life cycle (entry, exit, change, downtime \u2026)<\/li>\n\n\n\n<li>Management of all permissions on systems and applications in use<\/li>\n\n\n\n<li>Mapping of complex approval processes and workflows<\/li>\n\n\n\n<li>Automation of application and approval processes<\/li>\n\n\n\n<li>Audit-proof documentation of all applications, approvals and actions performed<\/li>\n<\/ul>\n\n\n\n<p>An IAM can help, especially in large corporate environments, to bundle the multitude of individual, decentralized access processes and bring them into line with the company\u2019s internal guidelines. In this context, IAM is not solely an IT issue, but rather has an impact on the entire company.&nbsp;The central management of permissions and identities, coupled with a clear structure, processes and self-services, minimizes the risk of unauthorized access to important data by both internal and external persons.<\/p>\n<\/div>\n\n\n\n<div id=\"contact-form\" class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-full-white-color has-secondary-4-background-color has-text-color has-background has-link-color wp-elements-af085e2eb3cb784d8b55c42a86d5ba58 is-layout-flow wp-block-group-is-layout-flow padding-block-pe-full padding-inline-C1G2 padding-inline-M-C0G1\">\n<div class=\"wp-block-group is-background has-secondary-4-background-color has-background is-layout-flow wp-block-group-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-0dfbf163 wp-block-group-is-layout-flex align-items-flex-start flex-flow-S-column\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow padding-bottom-S-1em width-C5G0 width-S-C10G0\">\n<h2 class=\"wp-block-heading is-style-h2 has-h-1-font-size padding-bottom-0_5em\">Get in touch with us<\/h2>\n\n\n\n<p>Do you have any questions about our products or services? Do you need support?<\/p>\n\n\n\n<p>We will be happy to help you!<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow width-C5G0 width-M-C6G0 width-S-C12G0\"><div class=\"wpforms-container wpforms-block wpforms-block-eca6757a-a186-4ce6-b491-f4e4ca6efff6 wpforms-render-modern\" id=\"wpforms-3146\"><form id=\"wpforms-form-3146\" class=\"wpforms-validate wpforms-form wpforms-ajax-form\" data-formid=\"3146\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/en\/wp-json\/wp\/v2\/posts\/3312\" data-token=\"eaef4020805c0ecfc1441e68f604702d\" data-token-time=\"1777802774\"><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div id=\"wpforms-error-noscript\" style=\"display: none;\">Please enable JavaScript in your browser to complete this form.<\/div><div class=\"wpforms-field-container\"><div id=\"wpforms-3146-field_4-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"4\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3146-field_4\" aria-hidden=\"false\">First Name <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-3146-field_4\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][4]\" placeholder=\"First Name*\" aria-errormessage=\"wpforms-3146-field_4-error\" required><\/div>\t\t<div id=\"wpforms-3146-field_1-container\"\n\t\t\tclass=\"wpforms-field wpforms-field-text\"\n\t\t\tdata-field-type=\"text\"\n\t\t\tdata-field-id=\"1\"\n\t\t\t>\n\t\t\t<label class=\"wpforms-field-label\" for=\"wpforms-3146-field_1\" >Conditions Terms Company<\/label>\n\t\t\t<input type=\"text\" id=\"wpforms-3146-field_1\" class=\"wpforms-field-medium\" name=\"wpforms[fields][1]\" >\n\t\t<\/div>\n\t\t<div id=\"wpforms-3146-field_5-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"5\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3146-field_5\" aria-hidden=\"false\">Last Name <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-3146-field_5\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][5]\" placeholder=\"Last Name*\" aria-errormessage=\"wpforms-3146-field_5-error\" required><\/div><div id=\"wpforms-3146-field_2-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"2\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3146-field_2\" aria-hidden=\"false\">E-mail* <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"email\" id=\"wpforms-3146-field_2\" class=\"wpforms-field-large wpforms-field-required\" data-rule-restricted-email=\"1\" name=\"wpforms[fields][2]\" placeholder=\"E-mail*\" spellcheck=\"false\" aria-errormessage=\"wpforms-3146-field_2-error\" required><\/div><div id=\"wpforms-3146-field_3-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"3\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3146-field_3\" aria-hidden=\"false\">Company <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"text\" id=\"wpforms-3146-field_3\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][3]\" placeholder=\"Company*\" aria-errormessage=\"wpforms-3146-field_3-error\" required><\/div><div id=\"wpforms-3146-field_7-container\" class=\"wpforms-field wpforms-field-textarea\" data-field-id=\"7\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-3146-field_7\" aria-hidden=\"false\">Nachricht <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><textarea id=\"wpforms-3146-field_7\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][7]\" placeholder=\"Message*\" aria-errormessage=\"wpforms-3146-field_7-error\" required><\/textarea><\/div><div id=\"wpforms-3146-field_6-container\" class=\"wpforms-field wpforms-field-checkbox color-secondary-1 has-copy-s-font-size\" data-field-id=\"6\"><fieldset><legend class=\"wpforms-field-label wpforms-label-hide\" aria-hidden=\"false\">Terms and Conditions <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/legend><ul id=\"wpforms-3146-field_6\" class=\"wpforms-field-required\"><li class=\"choice-1 depth-1\"><input type=\"checkbox\" id=\"wpforms-3146-field_6_1\" name=\"wpforms[fields][6][]\" value=\"I accept the privacy policy.\" aria-errormessage=\"wpforms-3146-field_6_1-error\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-3146-field_6_1\">I accept the privacy policy.<\/label><\/li><\/ul><\/fieldset><\/div><script>\n\t\t\t\t( function() {\n\t\t\t\t\tconst style = document.createElement( 'style' );\n\t\t\t\t\tstyle.appendChild( document.createTextNode( '#wpforms-3179-field_1-container,#wpforms-3146-field_1-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-3179-field_1-container,#wpforms-3146-field_1-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-3179-field_1-container,#wpforms-3146-field_1-container label { counter-increment: none; }' ) );\n\t\t\t\t\tdocument.head.appendChild( style );\n\t\t\t\t\tdocument.currentScript?.remove();\n\t\t\t\t} )();\n\t\t\t<\/script><\/div><!-- .wpforms-field-container --><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"3146\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/posts\/3312\"><input type=\"hidden\" name=\"url_referer\" value=\"\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-3146\" class=\"wpforms-submit has-secondary-3-background-color\" data-alt-text=\"Please wait...\" data-submit-text=\"Submit\" aria-live=\"assertive\" value=\"wpforms-submit\">Submit<\/button><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/permsecure.com\/wp-content\/plugins\/wpforms\/assets\/images\/submit-spin.svg\" class=\"wpforms-submit-spinner\" style=\"display: none;\" width=\"26\" height=\"26\" alt=\"Loading\"><\/div><\/form><\/div>  <!-- .wpforms-container --><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained padding-block-pe-full padding-inline-C2G2 padding-inline-M-C0G1\">\n<h2 class=\"wp-block-heading\">What is the Difference?<\/h2>\n\n\n\n<p>We have now become more familiar with the two terms or topics \u201d Permission Management\u201d and \u201cIdentity and Access Management\u201d and discussed their advantages and possible applications. But what exactly is the difference between these two topics?&nbsp;<\/p>\n\n\n\n<p>While permission management focuses on the access control of the individual systems and rather \u201clooks\u201d at the applications and their permissions, identity and access management goes one step further.&nbsp;IAM additionally considers the user to whom access is granted and his or her state as a whole and combines all permission assignments under one interface.&nbsp;It also offers more flexibility in terms of processes, procedures and complex workflows.&nbsp;<\/p>\n\n\n\n<p>Although both approaches overlap in their capabilities ( permission control, reporting, automation), it can be said that permission management is only one part of identity and access management.&nbsp;The IAM is not only capable of bundling several permission administrations and integrating them into the overall concept of corporate data protection, but also considers the persons to whom the permissions are assigned and can control their status, independent of their accesses.&nbsp;<\/p>\n\n\n\n<p>Thus, an IAM not only increases IT security (e.g., by automating workflows) and improves compliance (by providing complete documentation of all processes), it also improves employee productivity (by providing uniform self-services) and reduces IT costs in the long term (by replacing multiple solutions with a uniform system).&nbsp;<\/p>\n\n\n\n<p>In conclusion, both solution options have their raison d\u2019\u00eatre! Depending on the customer\u2019s needs, the right system must be implemented, whereby the use of an IAM application already covers future requirements.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-basics-1-background-color has-background is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-0dfbf163 wp-block-group-is-layout-flex padding-block-pe-full padding-inline-C1G2\">\n<div class=\"wp-block-group is-background has-basics-1-background-color has-background is-layout-flow wp-block-group-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-5054138e wp-block-group-is-layout-flex width-C2G0\"><div class=\"wp-block-avatar max-width-150px width-C2G0\"><img alt='Bartosz Grodzicki Avatar' src='https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-128x128.png' srcset='https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-256x256.png 2x' class='avatar avatar-128 photo wp-block-avatar__image' height='128' width='128' \/><\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow width-C8G0\">\n<p class=\"has-h-3-font-size\">About the Author<\/p>\n\n\n\n<p>Bartosz Grodzicki is a Senior Consultant at permSECURE. He has been designing and supporting IAM projects and helping customers to optimise their user and resource management since 2013.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained padding-block-pe-full padding-inline-C0G1\">\n<p class=\"has-text-align-center has-h-1-font-size padding-bottom-0_5em\">Related Articles<\/p>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow width-C12G1\"><ul class=\"columns-3 wp-block-post-template is-layout-grid wp-container-core-post-template-is-layout-2fc57c17 wp-block-post-template-is-layout-grid display-flex flex-flow-M-column flex-flow-row\"><li class=\"wp-block-post post-3866 post type-post status-publish format-standard has-post-thumbnail hentry category-iam-en tag-iam\">\n\n<div class=\"wp-block-group has-border-color has-full-white-background-color has-background is-layout-flow wp-block-group-is-layout-flow display-flex flex-flow-column margin-bottom-M-C0G1 margin-right-C0G1 overflow-hidden padding-bottom-C0G1 width-C4G0 width-M-C12G0 display-flex flex-flow-M-column flex-flow-row\" style=\"border-color:var(--theme-color-basics-2);border-width:1px;border-radius:7px;\"><figure class=\"wp-block-post-featured-image padding-left-M-C0G1 padding-left-S-C0G0 padding-top-M-C0G1 padding-top-S-C0G0 width-M-C6G0 width-S-C12G0\"><a href=\"https:\/\/permsecure.com\/en\/roles-profiles-how-to-build-them-efficiently\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"1142\" src=\"https:\/\/permsecure.com\/wp-content\/uploads\/2025\/06\/NIS2_Richtlinien_Header-1.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Roles\/Profiles \u2013 How to build them efficiently?\" style=\"object-fit:cover;\" srcset=\"https:\/\/permsecure.com\/wp-content\/uploads\/2025\/06\/NIS2_Richtlinien_Header-1.jpeg 2048w, https:\/\/permsecure.com\/wp-content\/uploads\/2025\/06\/NIS2_Richtlinien_Header-1-300x167.jpeg 300w, https:\/\/permsecure.com\/wp-content\/uploads\/2025\/06\/NIS2_Richtlinien_Header-1-1024x571.jpeg 1024w, https:\/\/permsecure.com\/wp-content\/uploads\/2025\/06\/NIS2_Richtlinien_Header-1-768x428.jpeg 768w, https:\/\/permsecure.com\/wp-content\/uploads\/2025\/06\/NIS2_Richtlinien_Header-1-1536x857.jpeg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow padding-inline-C0G1 padding-top-1em\"><div class=\"taxonomy-category has-link-color wp-elements-57bb6342f41bb39ba3f65dd8300fffbc wp-block-post-terms has-text-color has-basics-3-color padding-bottom-0_5em pointer-events-none text-decoration-none\"><a href=\"https:\/\/permsecure.com\/en\/wissen\/#category-iam-en\/\" rel=\"tag\">IAM<\/a><\/div>\n\n<h2 class=\"has-link-color wp-elements-211ad1cc0f2e5d4e47476b0f3c1e7f56 wp-block-post-title has-text-color has-basics-6-color has-h-4-font-size\"><a href=\"https:\/\/permsecure.com\/en\/roles-profiles-how-to-build-them-efficiently\/\" target=\"_self\" >Roles\/Profiles \u2013 How to build them efficiently?<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt padding-bottom-1em\"><p class=\"wp-block-post-excerpt__excerpt\">In zentralen Bereichen des Wirtschaftslebens wie Energie, IT, Transport und Wasserversorgung soll die NIS2-Richtlinie in der EU f\u00fcr einheitliche Sicherheitsstandards sorgen und die Resilienz von IT-Systemen sowohl physisch wie auch digital sicherstellen. Aber was bedeutet das konkret f\u00fcr die betroffenen Unternehmen? Welche Auflagen haben<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/permsecure.com\/en\/roles-profiles-how-to-build-them-efficiently\/\">Show full article<\/a><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex padding-inline-C0G1\"><div class=\"wp-block-avatar\"><img alt='Thomas Kloos Avatar' src='https:\/\/secure.gravatar.com\/avatar\/23669473f98a5ab45e48fa91eff8246008daaace4d861d46217ef3941f2e0a66?s=50&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/23669473f98a5ab45e48fa91eff8246008daaace4d861d46217ef3941f2e0a66?s=100&#038;d=mm&#038;r=g 2x' class='avatar avatar-50 photo wp-block-avatar__image' height='50' width='50' \/><\/div>\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow padding-left-0_5em\"><div class=\"wp-block-post-date has-copy-s-font-size\"><time datetime=\"2025-06-04T11:55:03+00:00\">04.06.2025<\/time><\/div>\n\n<div class=\"wp-block-post-author-name has-copy-s-font-size\">Thomas Kloos<\/div><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-3263 post type-post status-publish format-standard has-post-thumbnail hentry category-iam-en tag-benutzerverwaltung-featured-en tag-iam tag-related_berechtigungsverwaltung_vs_identity-en tag-related_rezertifizierung-en\">\n\n<div class=\"wp-block-group has-border-color has-full-white-background-color has-background is-layout-flow wp-block-group-is-layout-flow display-flex flex-flow-column margin-bottom-M-C0G1 margin-right-C0G1 overflow-hidden padding-bottom-C0G1 width-C4G0 width-M-C12G0 display-flex flex-flow-M-column flex-flow-row\" style=\"border-color:var(--theme-color-basics-2);border-width:1px;border-radius:7px;\"><figure class=\"wp-block-post-featured-image padding-left-M-C0G1 padding-left-S-C0G0 padding-top-M-C0G1 padding-top-S-C0G0 width-M-C6G0 width-S-C12G0\"><a href=\"https:\/\/permsecure.com\/en\/rollen-profile-wie-baut-man-sie-effizient-auf\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/Rolle_Profile.jpg.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Roles\/Profiles \u2013 How to build them efficiently?\" style=\"object-fit:cover;\" srcset=\"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/Rolle_Profile.jpg.webp 750w, https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/Rolle_Profile.jpg-300x200.webp 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow padding-inline-C0G1 padding-top-1em\"><div class=\"taxonomy-category has-link-color wp-elements-57bb6342f41bb39ba3f65dd8300fffbc wp-block-post-terms has-text-color has-basics-3-color padding-bottom-0_5em pointer-events-none text-decoration-none\"><a href=\"https:\/\/permsecure.com\/en\/wissen\/#category-iam-en\/\" rel=\"tag\">IAM<\/a><\/div>\n\n<h2 class=\"has-link-color wp-elements-211ad1cc0f2e5d4e47476b0f3c1e7f56 wp-block-post-title has-text-color has-basics-6-color has-h-4-font-size\"><a href=\"https:\/\/permsecure.com\/en\/rollen-profile-wie-baut-man-sie-effizient-auf\/\" target=\"_self\" >Roles\/Profiles \u2013 How to build them efficiently?<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt padding-bottom-1em\"><p class=\"wp-block-post-excerpt__excerpt\">The goal of modern identity and access management systems (IAM systems for short) is not only to manage user management and its processes, but also to distribute and also remove the resources and permissions managed therein efficiently and in line with requirements. This is<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/permsecure.com\/en\/rollen-profile-wie-baut-man-sie-effizient-auf\/\">Show full article<\/a><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex padding-inline-C0G1\"><div class=\"wp-block-avatar\"><img alt='Bartosz Grodzicki Avatar' src='https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-50x50.png' srcset='https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-100x100.png 2x' class='avatar avatar-50 photo wp-block-avatar__image' height='50' width='50' \/><\/div>\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow padding-left-0_5em\"><div class=\"wp-block-post-date has-copy-s-font-size\"><time datetime=\"2022-06-22T08:41:00+00:00\">22.06.2022<\/time><\/div>\n\n<div class=\"wp-block-post-author-name has-copy-s-font-size\">Bartosz Grodzicki<\/div><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-3312 post type-post status-publish format-standard has-post-thumbnail hentry category-iam-en tag-benutzerverwaltung-featured-en tag-iam tag-related_rezertifizierung-en tag-tenfold-featured-en\">\n\n<div class=\"wp-block-group has-border-color has-full-white-background-color has-background is-layout-flow wp-block-group-is-layout-flow display-flex flex-flow-column margin-bottom-M-C0G1 margin-right-C0G1 overflow-hidden padding-bottom-C0G1 width-C4G0 width-M-C12G0 display-flex flex-flow-M-column flex-flow-row\" style=\"border-color:var(--theme-color-basics-2);border-width:1px;border-radius:7px;\"><figure class=\"wp-block-post-featured-image padding-left-M-C0G1 padding-left-S-C0G0 padding-top-M-C0G1 padding-top-S-C0G0 width-M-C6G0 width-S-C12G0\"><a href=\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\" target=\"_self\"  ><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference?\" style=\"object-fit:cover;\" srcset=\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp 750w, https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg-300x200.webp 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/figure>\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow padding-inline-C0G1 padding-top-1em\"><div class=\"taxonomy-category has-link-color wp-elements-57bb6342f41bb39ba3f65dd8300fffbc wp-block-post-terms has-text-color has-basics-3-color padding-bottom-0_5em pointer-events-none text-decoration-none\"><a href=\"https:\/\/permsecure.com\/en\/wissen\/#category-iam-en\/\" rel=\"tag\">IAM<\/a><\/div>\n\n<h2 class=\"has-link-color wp-elements-211ad1cc0f2e5d4e47476b0f3c1e7f56 wp-block-post-title has-text-color has-basics-6-color has-h-4-font-size\"><a href=\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\" target=\"_self\" >Permission Management vs. Identity &amp; Access Management \u2013 What is the difference?<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt padding-bottom-1em\"><p class=\"wp-block-post-excerpt__excerpt\">Employees in organizations need access to various resources (e.g. groups, applications, systems \u2026) for their tasks. Managing these accesses is a challenge because the requirements are always changing as soon as new applications are added or users require additional access permissions. Often, in this<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\">Show full article<\/a><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex padding-inline-C0G1\"><div class=\"wp-block-avatar\"><img alt='Bartosz Grodzicki Avatar' src='https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-50x50.png' srcset='https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-100x100.png 2x' class='avatar avatar-50 photo wp-block-avatar__image' height='50' width='50' \/><\/div>\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow padding-left-0_5em\"><div class=\"wp-block-post-date has-copy-s-font-size\"><time datetime=\"2021-08-26T11:42:00+00:00\">26.08.2021<\/time><\/div>\n\n<div class=\"wp-block-post-author-name has-copy-s-font-size\">Bartosz Grodzicki<\/div><\/div>\n<\/div>\n<\/div>\n\n<\/li><\/ul><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Employees in organizations need access to various resources (e.g. groups, applications, systems \u2026) for their tasks. Managing these accesses is a challenge because the requirements are always changing as soon as new applications are added or users require additional access permissions. Often, in this&hellip;<\/p>\n","protected":false},"author":3,"featured_media":3505,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[42],"tags":[43,56,45,53],"class_list":["post-3312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iam-en","tag-benutzerverwaltung-featured-en","tag-iam","tag-related_rezertifizierung-en","tag-tenfold-featured-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Permission Management vs. Identity &amp; Access Management \u2013 What is the difference? - permSECURE GmbH - development<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference? - permSECURE GmbH - development\" \/>\n<meta property=\"og:description\" content=\"Employees in organizations need access to various resources (e.g. groups, applications, systems \u2026) for their tasks. Managing these accesses is a challenge because the requirements are always changing as soon as new applications are added or users require additional access permissions. Often, in this&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\" \/>\n<meta property=\"og:site_name\" content=\"permSECURE GmbH - development\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-26T11:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-18T13:16:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Bartosz Grodzicki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bartosz Grodzicki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\"},\"author\":{\"name\":\"Bartosz Grodzicki\",\"@id\":\"https:\/\/permsecure.com\/en\/#\/schema\/person\/28a3d9854a23bdb48c516c2de23a446e\"},\"headline\":\"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference?\",\"datePublished\":\"2021-08-26T11:42:00+00:00\",\"dateModified\":\"2024-12-18T13:16:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\"},\"wordCount\":981,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/permsecure.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp\",\"keywords\":[\"Benutzerverwaltung featured\",\"IAM\",\"related_Rezertifizierung\",\"tenfold featured\"],\"articleSection\":[\"IAM\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\",\"url\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\",\"name\":\"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference? - permSECURE GmbH - development\",\"isPartOf\":{\"@id\":\"https:\/\/permsecure.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp\",\"datePublished\":\"2021-08-26T11:42:00+00:00\",\"dateModified\":\"2024-12-18T13:16:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#primaryimage\",\"url\":\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp\",\"contentUrl\":\"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp\",\"width\":750,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/permsecure.com\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/permsecure.com\/en\/#website\",\"url\":\"https:\/\/permsecure.com\/en\/\",\"name\":\"permSECURE GmbH - development\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/permsecure.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/permsecure.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/permsecure.com\/en\/#organization\",\"name\":\"permSECURE GmbH - development\",\"url\":\"https:\/\/permsecure.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/permsecure.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/10\/PermSecure-Logo.png\",\"contentUrl\":\"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/10\/PermSecure-Logo.png\",\"width\":193,\"height\":206,\"caption\":\"permSECURE GmbH - development\"},\"image\":{\"@id\":\"https:\/\/permsecure.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/permsecure.com\/en\/#\/schema\/person\/28a3d9854a23bdb48c516c2de23a446e\",\"name\":\"Bartosz Grodzicki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/permsecure.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-96x96.png\",\"contentUrl\":\"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-96x96.png\",\"caption\":\"Bartosz Grodzicki\"},\"description\":\"Bartosz Grodzicki ist Senior Consultant bei der Firma permSECURE. Bereits seit 2013 konzeptioniert und begleitet er IAM-Projekte und unterst\u00fctzt Kunden dabei, ihre Benutzer- und Ressourcenverwaltung zu optimieren.\",\"url\":\"https:\/\/permsecure.com\/en\/author\/bartosz\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference? - permSECURE GmbH - development","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/","og_locale":"en_US","og_type":"article","og_title":"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference? - permSECURE GmbH - development","og_description":"Employees in organizations need access to various resources (e.g. groups, applications, systems \u2026) for their tasks. Managing these accesses is a challenge because the requirements are always changing as soon as new applications are added or users require additional access permissions. Often, in this&hellip;","og_url":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/","og_site_name":"permSECURE GmbH - development","article_published_time":"2021-08-26T11:42:00+00:00","article_modified_time":"2024-12-18T13:16:57+00:00","og_image":[{"width":750,"height":500,"url":"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp","type":"image\/webp"}],"author":"Bartosz Grodzicki","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bartosz Grodzicki","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#article","isPartOf":{"@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/"},"author":{"name":"Bartosz Grodzicki","@id":"https:\/\/permsecure.com\/en\/#\/schema\/person\/28a3d9854a23bdb48c516c2de23a446e"},"headline":"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference?","datePublished":"2021-08-26T11:42:00+00:00","dateModified":"2024-12-18T13:16:57+00:00","mainEntityOfPage":{"@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/"},"wordCount":981,"commentCount":0,"publisher":{"@id":"https:\/\/permsecure.com\/en\/#organization"},"image":{"@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp","keywords":["Benutzerverwaltung featured","IAM","related_Rezertifizierung","tenfold featured"],"articleSection":["IAM"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/","url":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/","name":"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference? - permSECURE GmbH - development","isPartOf":{"@id":"https:\/\/permsecure.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#primaryimage"},"image":{"@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp","datePublished":"2021-08-26T11:42:00+00:00","dateModified":"2024-12-18T13:16:57+00:00","breadcrumb":{"@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#primaryimage","url":"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp","contentUrl":"https:\/\/permsecure.com\/wp-content\/uploads\/2021\/08\/ARMvsIAM.jpg.webp","width":750,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/permsecure.com\/en\/permission-management-vs-identity-access-management-what-is-the-difference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/permsecure.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Permission Management vs. Identity &amp; Access Management \u2013 What is the difference?"}]},{"@type":"WebSite","@id":"https:\/\/permsecure.com\/en\/#website","url":"https:\/\/permsecure.com\/en\/","name":"permSECURE GmbH - development","description":"","publisher":{"@id":"https:\/\/permsecure.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/permsecure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/permsecure.com\/en\/#organization","name":"permSECURE GmbH - development","url":"https:\/\/permsecure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/permsecure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/10\/PermSecure-Logo.png","contentUrl":"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/10\/PermSecure-Logo.png","width":193,"height":206,"caption":"permSECURE GmbH - development"},"image":{"@id":"https:\/\/permsecure.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/permsecure.com\/en\/#\/schema\/person\/28a3d9854a23bdb48c516c2de23a446e","name":"Bartosz Grodzicki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/permsecure.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-96x96.png","contentUrl":"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/cropped-Bartosz-Grodzicki-circle-portrait-96x96.png","caption":"Bartosz Grodzicki"},"description":"Bartosz Grodzicki ist Senior Consultant bei der Firma permSECURE. Bereits seit 2013 konzeptioniert und begleitet er IAM-Projekte und unterst\u00fctzt Kunden dabei, ihre Benutzer- und Ressourcenverwaltung zu optimieren.","url":"https:\/\/permsecure.com\/en\/author\/bartosz\/"}]}},"_links":{"self":[{"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/posts\/3312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/comments?post=3312"}],"version-history":[{"count":4,"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/posts\/3312\/revisions"}],"predecessor-version":[{"id":3661,"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/posts\/3312\/revisions\/3661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/media\/3505"}],"wp:attachment":[{"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/media?parent=3312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/categories?post=3312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/permsecure.com\/en\/wp-json\/wp\/v2\/tags?post=3312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}