UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 8 Issue 5
May-2021
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2105677


Registration ID:
309758

Page Number

f108-f110

Share This Article


Jetir RMS

Title

A COMPREHENSIVE APPROACH OF IMPLEMENTATING IAM IN AN ORGANIZATION

Abstract

nowadays, the Internet is the most widely used medium to maintain communication with family, friends, work colleagues, and people worldwide. Internet is the means through which every individual exchange information with just a click of few buttons in a fraction of seconds. With this ease of communication comes one of the greatest challenges of managing digital identities and access control for users and applications. As the use of the internet grows rapidly so do the users or people who use the internet and access and exchange the data using the internet in the organization and outside the organization increases. User Data security is a monotonous and significant piece of the IT framework and its user or employee lifecycle control framework. As a result of this, the user's information security is consistently considered while planning security frameworks for an organization. Subsequently, the majority of organizations use Identity and Access Management Systems to keep track of employees and records of the employee's access to accounts and applications on day to day basis. Identity and Access Management System protects access everywhere with a security technique that authenticates every user and device and smartly limits access to applications as per each user's roles and responsibility within an organization. This paper gives an overview of the Identity Management Systems Access Management System and how they are implemented in an organization to manage user security throughout the employee lifecycle.

Key Words

Identity and Access Management, IDaaS, SSO, Federated Identity Management System, MFA.

Cite This Article

"A COMPREHENSIVE APPROACH OF IMPLEMENTATING IAM IN AN ORGANIZATION", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8, Issue 5, page no.f108-f110, May-2021, Available :http://www.jetir.org/papers/JETIR2105677.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A COMPREHENSIVE APPROACH OF IMPLEMENTATING IAM IN AN ORGANIZATION", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.8, Issue 5, page no. ppf108-f110, May-2021, Available at : http://www.jetir.org/papers/JETIR2105677.pdf

Publication Details

Published Paper ID: JETIR2105677
Registration ID: 309758
Published In: Volume 8 | Issue 5 | Year May-2021
DOI (Digital Object Identifier):
Page No: f108-f110
Country: DARJEELING, WEST BENGAL, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000520

Print This Page

Current Call For Paper

Jetir RMS