A Survey on Identity and Access Management

Authors : Zeel Hiren Shah

Volume/Issue : Volume 7 - 2022, Issue 9 - September

Google Scholar : https://bit.ly/3IIfn9N

Scribd : https://bit.ly/3DiF7dr

DOI : https://doi.org/10.5281/zenodo.7233056

Different architectural issues related to Identity and Access Management (IAM) are arising for the successful deployment of applications in the context of digital entitlement. Data management solutions should include effective access control methods and choose the best configuration among the numerous and intricate approaches to offering access control services. The IAM features can be used to implement Web Single Sign-on (SSO), federated identities, password synchronisation, and service granularity, allowing the system to address and resolve the majority of current access management concerns. This paper gives you the general idea of what is IAM (Identity Access Management), How it is related to Cybersecurity, Its Functional Areas and its role in Cybersecurity and in Information Security for a better understanding.


Paper Submission Last Date
29 - February - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.