Difference between revisions of "Identity Access Management"

From PKC
Jump to navigation Jump to search
Line 1: Line 1:
{{WikiEntry|key=Identity Access Management|qCode=16564625}}: identity solutions and controls within information technology systems and platforms used to mitigate security risks. It is also known as [[IAM]], or [[IdM]] as it stands for [[Identity Management]] or [[Identity and Access Management]].
{{WikiEntry|key=Identity Access Management|qCode=16564625}}: identity solutions and controls within information technology systems and platforms used to mitigate security risks. It is also known as [[IAM]], or [[IdM]] as it stands for [[Identity Management]] or [[Identity and Access Management]]. One of many possible strategies for managing identities, is the notion of [[Federated Identity Management]], often associated with the notion of [[Single Sign On]] ([[SSO]]) service.


There are two well-known open source implementations:
There are two well-known open source implementations:

Revision as of 04:44, 13 February 2022

Identity Access Management(Q16564625): identity solutions and controls within information technology systems and platforms used to mitigate security risks. It is also known as IAM, or IdM as it stands for Identity Management or Identity and Access Management. One of many possible strategies for managing identities, is the notion of Federated Identity Management, often associated with the notion of Single Sign On (SSO) service.

There are two well-known open source implementations:

  1. Keycloak.ORG
  2. Gluu.ORG
  3. Okta.COM

Relevant Tutorials

Content Link