The programs, processes, technologies, and personnel used to create trusted
digital identity representations of individuals and NPEs, bind those identities to credentials that may serve as a proxy for the individual or NPE in access transactions, and leverage the credentials to provide authorized access to an agency‘s resources. ICAM cuts across numerous offices, programs, and systems within an agency‘s enterprise, which are typically directed and managed separately. As a result, many of the aspects of ICAM within the Federal Government have traditionally been managed within individual stove-pipes. The following figure provides a high-level overview of the complementary nature of different parts of ICAM and how concepts that were once viewed as stove-pipes can intersect to provide an enterprise capability.
SOURCE: FICAM ROADMAP AND IMPLEMENTATION GUIDANCE