Authors :
Zeel Hiren Shah
Volume/Issue :
Volume 7 - 2022, Issue 9 - September
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3DiF7dr
DOI :
https://doi.org/10.5281/zenodo.7233056
Abstract :
Different architectural issues related to
Identity and Access Management (IAM) are arising for
the successful deployment of applications in the context of
digital entitlement. Data management solutions should
include effective access control methods and choose the
best configuration among the numerous and intricate
approaches to offering access control services. The IAM
features can be used to implement Web Single Sign-on
(SSO), federated identities, password synchronisation,
and service granularity, allowing the system to address
and resolve the majority of current access management
concerns. This paper gives you the general idea of what is
IAM (Identity Access Management), How it is related to
Cybersecurity, Its Functional Areas and its role in
Cybersecurity and in Information Security for a better
understanding.
Different architectural issues related to
Identity and Access Management (IAM) are arising for
the successful deployment of applications in the context of
digital entitlement. Data management solutions should
include effective access control methods and choose the
best configuration among the numerous and intricate
approaches to offering access control services. The IAM
features can be used to implement Web Single Sign-on
(SSO), federated identities, password synchronisation,
and service granularity, allowing the system to address
and resolve the majority of current access management
concerns. This paper gives you the general idea of what is
IAM (Identity Access Management), How it is related to
Cybersecurity, Its Functional Areas and its role in
Cybersecurity and in Information Security for a better
understanding.