Manage user identities, governance, administration, compliance and control access to critical applications and data to ensure that only authorized users have appropriate access.