A Survey on Identity and Access Management

Zeel Hiren Shah1

1

Publication Date: 2022/10/21

Abstract: Different architectural issues related to Identity and Access Management (IAM) are arising for the successful deployment of applications in the context of digital entitlement. Data management solutions should include effective access control methods and choose the best configuration among the numerous and intricate approaches to offering access control services. The IAM features can be used to implement Web Single Sign-on (SSO), federated identities, password synchronisation, and service granularity, allowing the system to address and resolve the majority of current access management concerns. This paper gives you the general idea of what is IAM (Identity Access Management), How it is related to Cybersecurity, Its Functional Areas and its role in Cybersecurity and in Information Security for a better understanding.

Keywords: No Keywords Available

DOI: https://doi.org/10.5281/zenodo.7233056

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22SEP433.pdf

REFERENCES

No References Available