Difference between revisions of "Identity Access Management"
Jump to navigation
Jump to search
Line 4: | Line 4: | ||
# [http://keycloak.org Keycloak.ORG] | # [http://keycloak.org Keycloak.ORG] | ||
# [http://gluu.org Gluu.ORG] | # [http://gluu.org Gluu.ORG] | ||
# [https://www.okta.com/ Okta. | # [https://www.okta.com/ Okta.COM] |
Revision as of 04:10, 12 February 2022
Identity Access Management(Q16564625): identity solutions and controls within information technology systems and platforms used to mitigate security risks. It is also known as IAM, or IdM as it stands for Identity Management or Identity and Access Management.
There are two well-known open source implementations: