{"title":"IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations","authors":"Chetanpal Singh, Rahul Thakkar, Jatinder Warraich","doi":"10.24018/ejeng.2023.8.4.3074","DOIUrl":null,"url":null,"abstract":"Identity and Access Management proposes a web service that assists in controlling the entire work through secured ways. This research study has been started to highlight the importance of IAM by discussing its roles, characteristics, advantages and disadvantages. It is a framework comprising processes, policies, and the latest technologies, allowing the organization to monitor digital identities and control exclusive access to follow information based on user data. The IAM component proposes an approach of centralized user management, account management console, authentication approaches, and so on. In this research work, roles and key components of IAM have been discussed with all types of possible challenges. Furthermore, this research will help readers and future researchers easily identify the importance of IAM in maintaining security systems within organizations.","PeriodicalId":12001,"journal":{"name":"European Journal of Engineering and Technology Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of Engineering and Technology Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24018/ejeng.2023.8.4.3074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Identity and Access Management proposes a web service that assists in controlling the entire work through secured ways. This research study has been started to highlight the importance of IAM by discussing its roles, characteristics, advantages and disadvantages. It is a framework comprising processes, policies, and the latest technologies, allowing the organization to monitor digital identities and control exclusive access to follow information based on user data. The IAM component proposes an approach of centralized user management, account management console, authentication approaches, and so on. In this research work, roles and key components of IAM have been discussed with all types of possible challenges. Furthermore, this research will help readers and future researchers easily identify the importance of IAM in maintaining security systems within organizations.