Abstract
Identity and Access Management proposes a web service that assists in controlling the entire work through secured ways. This research study has been started to highlight the importance of IAM by discussing its roles, characteristics, advantages and disadvantages. It is a framework comprising processes, policies, and the latest technologies, allowing the organization to monitor digital identities and control exclusive access to follow information based on user data. The IAM component proposes an approach of centralized user management, account management console, authentication approaches, and so on. In this research work, roles and key components of IAM have been discussed with all types of possible challenges. Furthermore, this research will help readers and future researchers easily identify the importance of IAM in maintaining security systems within organizations.
Cite
CITATION STYLE
Singh, C., Thakkar, R., & Warraich, J. (2023). IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations. European Journal of Engineering and Technology Research, 8(4), 30–38. https://doi.org/10.24018/ejeng.2023.8.4.3074
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.