Home » ITIL » Access Management – A Service Operation Process

Access Management – A Service Operation Process

infographic finger push tablet Template jigsaw banner.Access Management is one process in the Service Operation phase of the ITIL® Service Lifecycle. Access Management deals with granting authorization and access to IT applications and services to “authorized users” while preventing unauthorized access at the same time. This process offers users the right to access a service or a group of services as outlined in policies from Security Management and Availability Management. Access Management allows the organization to manage the confidentially, availability, and integrity of the organization’s data and intellectual property.

To help you understand what Access Management is, we must first explain some key terms, as defined by ITIL:

  • Access: The level and extent of a service’s functionality or data that a user is permitted to use.
  • Identity: The information about a user that distinguishes them as an individual and which verifies his or her status in an organization.
  • Rights or Privileges: The actual settings in which a user is provided access to a service or group of services.
  • Request for Access Rights: This means a request is put forward to revoke or change the rights in order to use specific services.
  • User Identity Request: This is a request to generate, change, or delete a user identity.
  • User Role: Being a part of an organization, these are the roles that are defined by an organization for a user.

In order to maintain the security and privacy of the information and data in an organization, it is very important that you understand Access Management. This allows you to maintain the confidentiality of certain data as well as ensure that no vital information is being processed by anyone who is not known to you or your organization.

To learn more about how Access Management can help protect your information and data, enroll in the ITIL Service Operation course at Ashford Global IT!

Tags: , , , ,

About this author:


Frank is a leading trainer in IT Security.

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.