Salesforce Identity and Access Management Architecture

  • Jyoti D
  • Hutcherson J
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Let's dive deeper into the domain of identity and access management. As you know, cloud technology has enabled enterprise business applications and business transactions to be more ubiquitous and accessible by anyone, anywhere, with just a web browser and an Internet connection. This level of convenience comes with a multitude of security considerations for designing and managing cloud-based solutions. The potential threats vary from hacked user accounts and data breaches to malicious attacks that can bring down the entire system. If a breach occurs in a cloud-based system, the recoverability of the system is not the only concern. The risk of damaged reputation and loss of customer trust can be far more devastating than just recovery for business. An identity and access management breach often requires a complete overhaul of the system because most identity and access management breaches are deep-rooted. Identity and access management also becomes complicated over time because of the ever-growing size of the user base and the diverse user needs. Identity and access management is the most critical security aspect of every system and designed for the full life of the system, which can last as long as a decade.

Cite

CITATION STYLE

APA

Jyoti, D., & Hutcherson, J. A. (2021). Salesforce Identity and Access Management Architecture. In Salesforce Architect’s Handbook (pp. 223–256). Apress. https://doi.org/10.1007/978-1-4842-6631-1_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free