• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Texas A&M System IT

The Texas A&M University System

  • Services
    • AggieBuy
    • Concur
    • Contracts
    • Earning Codes
    • Enterprise Data Warehouse
    • FAMIS
    • Maestro
    • Position Budget
    • Security Operations Center
    • Single Sign-On
    • Time and Effort
    • TrainTraq
    • TRS
    • UIN Manager
    • Workday Services
  • Projects
    • HCM Academic Management Discovery
    • Financial Systems Modernization
  • Cybersecurity
    • News and Alerts
    • Be Cyber Savvy
    • Standards and Procedures
    • Report an Incident
    • Security Operations Center
    • Information Security Council
  • Governance & TACs
    • Accessibility
    • IT Governance Framework
    • Project Management
  • Contact
  • About
    • Members
    • CIO Blog
    • Communications
      • Guidelines
      • Logos, Color Palette and Templates
      • Writing Style
      • Web Requirements
      • Email and Email Signature
      • Statewide Cybersecurity Services Style Guide
  • Search

Primary Sidebar

You are here: Home / Cybersecurity / Information Security Council / Resources / Identity and Access Management (IAM)

Identity and Access Management (IAM)

Fundamentally, Identity & Access Management (IAM) is the process of managing who has access to what information and resources over time and can include other aspects of managing identities within an organization as well.

IAM processes are used to initiate, capture, record and manage the user identities and related access permissions to the organization’s information that is important.

Users that need to have identities and access managed extend beyond those that are directly inside the Texas A&M University System (TAMUS) members.  They can include affiliates, other universities, partners and others that are not directly tied to the organization.

Information that should be protected in this environment with IAM processes include student, faculty, staff and affiliate information, financial and audit records, sensitive technical information, research, intellectual property that has value and any information that partnered institutions entrust on infrastructure that TAMUS controls or is responsible for.

Vision/Strategy

The overall strategy is to provide a means for each of the members to maintain local control and administrative authority over their users and resources, but also to participate and share across members.  This is in keeping with the overall strategy to allow Centers of Excellence so that members can provide services across members.

Another goal is to be in alignment with Incommon’s Federated Identity Management model, which has a number of benefits for members.

Copyright © 2021 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: tamus-webmaster@tamus.edu
State of Texas |  Texas Homeland Security |  Texas Veterans Portal |  Statewide Search |  Risk, Fraud & Misconduct Hotline |  Privacy |  Web Accessibility |  State Link Policy |  Campus Carry

Texas A&M University System