Access management (AM) will enforce the rules set forth by, ideally, the identity management and identity governance systems.
Access managers typically cover only web-enabled solutions. They can provide fine-grained access controls (ABAC, RBAC and more) but typically these will be covered by applications themselves or by an entitlement service. Access management log files and audit trails provide valuable input for audits, compliance reviews, and security investigations.
Access Management is the component in the environment that will actively control user access to protected resources.