{"title":"IAM身份访问管理在维护组织内部安全系统中的重要性","authors":"Chetanpal Singh, Rahul Thakkar, Jatinder Warraich","doi":"10.24018/ejeng.2023.8.4.3074","DOIUrl":null,"url":null,"abstract":"Identity and Access Management proposes a web service that assists in controlling the entire work through secured ways. This research study has been started to highlight the importance of IAM by discussing its roles, characteristics, advantages and disadvantages. It is a framework comprising processes, policies, and the latest technologies, allowing the organization to monitor digital identities and control exclusive access to follow information based on user data. The IAM component proposes an approach of centralized user management, account management console, authentication approaches, and so on. In this research work, roles and key components of IAM have been discussed with all types of possible challenges. Furthermore, this research will help readers and future researchers easily identify the importance of IAM in maintaining security systems within organizations.","PeriodicalId":12001,"journal":{"name":"European Journal of Engineering and Technology Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations\",\"authors\":\"Chetanpal Singh, Rahul Thakkar, Jatinder Warraich\",\"doi\":\"10.24018/ejeng.2023.8.4.3074\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Identity and Access Management proposes a web service that assists in controlling the entire work through secured ways. This research study has been started to highlight the importance of IAM by discussing its roles, characteristics, advantages and disadvantages. It is a framework comprising processes, policies, and the latest technologies, allowing the organization to monitor digital identities and control exclusive access to follow information based on user data. The IAM component proposes an approach of centralized user management, account management console, authentication approaches, and so on. In this research work, roles and key components of IAM have been discussed with all types of possible challenges. Furthermore, this research will help readers and future researchers easily identify the importance of IAM in maintaining security systems within organizations.\",\"PeriodicalId\":12001,\"journal\":{\"name\":\"European Journal of Engineering and Technology Research\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"European Journal of Engineering and Technology Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24018/ejeng.2023.8.4.3074\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of Engineering and Technology Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24018/ejeng.2023.8.4.3074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations
Identity and Access Management proposes a web service that assists in controlling the entire work through secured ways. This research study has been started to highlight the importance of IAM by discussing its roles, characteristics, advantages and disadvantages. It is a framework comprising processes, policies, and the latest technologies, allowing the organization to monitor digital identities and control exclusive access to follow information based on user data. The IAM component proposes an approach of centralized user management, account management console, authentication approaches, and so on. In this research work, roles and key components of IAM have been discussed with all types of possible challenges. Furthermore, this research will help readers and future researchers easily identify the importance of IAM in maintaining security systems within organizations.