Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”

  • Authors

    • Saloni Kumari Ms.
    2023-09-06
    https://doi.org/10.14419/ijet.v12i1.32333
  • Abstract

    The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.

  • References

    1. Kling J, Thompson B, Green W. IAM System Implementing Iam Data Model. US Patent 9. 2016: 529-989.
    2. Hardt D. (2021) RFC6749—The OAuth 2.0 Authorization Framework. https://tools.ietf.org/html/rfc6749. Accessed February 18, 2021.
    3. Hu VC, Ferraiolo D, Kuhn R, et al. Guide to attribute-based access control (abac) definition and considerations. NIST Special Publ. 2013; 800(162): 4-16. https://doi.org/10.6028/NIST.SP.800-162.
    4. Vimercati DC, Foresti DC, Samarati SP. Authorization and access control. In: Security, Privacy, and Trust in Modern Data Management. Berlin: Springer Berlin Heidelberg; 2007: 39-53 https://doi.org/10.1007/978-3-540-69861-6_4.
    5. Nuss M, Puchta A, Kunz M. Towards Blockchain-based identity and access management for Internet of Things in enterprises. Intern Conf Trust and Priv Digital Bus. 2018: 167-181. Accessed February 18, 2021. https://doi.org/10.1007/978-3-319-98385-1_12.
    6. Osmanoglu E. Identity and Access Management: Business Performance Through Connected Intelligence. Newnes; 2013.
    7. Ghaffari F, Bertin E, Hatin J, Crespi N. Authentication and access control based on distributed ledger technology: a survey. 2nd Con Blockchain Res App Inno Net Ser (BRAINS). Paris, France; 2020: 79-86. September 27, 2020. https://doi.org/10.1109/BRAINS49436.2020.9223297.
    8. Gilani K, Bertin E, Hatin J, Crespi N. A survey on Blockchain-based identity management and decentralized privacy for personal data. 2nd Con Blockchain Res App Inno Net Ser (BRAINS). Paris, France; 2020: 97-101. September 27, 2020. https://doi.org/10.1109/BRAINS49436.2020.9223312.
    9. Chadwick DW. Federated identity management. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Berlin: Heidelberg: Springer Berlin Heidelberg; 2009: 96-120. https://doi.org/10.1007/978-3-642-03829-7_3.
    10. Clauβ S, Kesdogan D, Kölsch T. Privacy enhancing identity management: protection against re-identification and profiling. Proceedings of the 2005 workshop on Digital identity management. Seoul, Korea; 2005: 84-93. November 15, 2005. https://doi.org/10.1145/1102486.1102501.
  • Downloads

  • How to Cite

    Saloni Kumari. (2023). Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”. International Journal of Engineering & Technology, 12(1), 11-14. https://doi.org/10.14419/ijet.v12i1.32333