Identity and Access Management originated as a simplistic security solution. Most of your employees used it to do things like log in to payroll. The system checks your employee’s identity and verifies their details to determine payroll access.
A curious case is when an employee wants to access expense reporting. In this case, the program requires login details for access every time the employee tries to access the network. This is time-consuming and frustrating especially if each program has different login details [username and password).