Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views9 pages

Identity Management

The document discusses identity management (IDM) as a crucial process for organizations to authenticate and authorize individuals accessing their networks and applications, ensuring security and compliance. It highlights the importance of digital identity management in the context of increasing cyber threats and the need for effective solutions like biometric authentication, blockchain technology, and zero trust architecture. The paper also explores various identity management systems and their applications, emphasizing the role of IAM in safeguarding organizational resources and enhancing operational efficiency.

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views9 pages

Identity Management

The document discusses identity management (IDM) as a crucial process for organizations to authenticate and authorize individuals accessing their networks and applications, ensuring security and compliance. It highlights the importance of digital identity management in the context of increasing cyber threats and the need for effective solutions like biometric authentication, blockchain technology, and zero trust architecture. The paper also explores various identity management systems and their applications, emphasizing the role of IAM in safeguarding organizational resources and enhancing operational efficiency.

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 9 Issue 2, Mar-Apr 2025 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Identity Management
Matthew N. O. Sadiku1, Paul A. Adekunte2, Janet O. Sadiku3
1
Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX, USA
2
International Institute of Professional Security, Lagos, Nigeria
3
Juliana King University, Houston, TX, USA

ABSTRACT How to cite this paper: Matthew N. O.


Identity management refers to how an organization identifies and Sadiku | Paul A. Adekunte | Janet O.
authenticates individuals for access to its networks or applications. Sadiku "Identity Management"
The process ensures that individuals and groups have the right access, Published in
International Journal
rights, and restrictions with established identities for the
of Trend in
organizational resources while keeping their assets and data secure. Scientific Research
Controlling who has access to these resources can be challenging and Development
without effective identity management. Identity management is (ijtsrd), ISSN: 2456-
important because it aids in preventing security events like data leaks 6470, Volume-9 | IJTSRD78579
and illegal access. From logging into email and collaboration Issue-2, April 2025,
platforms to accessing corporate resources, identity management pp.788-796, URL:
plays a pivotal role in daily interactions online. In this paper, we will www.ijtsrd.com/papers/ijtsrd78579.pdf
explore the role of identity management solutions in securing users
and devices. Copyright © 2025 by author (s) and
International Journal of Trend in
KEYWORDS: identity, identity management, digital identity Scientific Research and Development
management, law, legal industry Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)

INTRODUCTION
With digital transformation gaining even more individuals have the appropriate access to technology
momentum, their protection is an absolute must. In resources. It ensures the right individuals to access
the era of digital transformation, digital identity the appropriate resources at the right times for the
management emerges as a key enabler for right reasons. Identity management solutions can help
organizations seeking to enhance cybersecurity, you protect your organization by authenticating users
strengthen customer trust, and comply with regulatory and devices seamlessly without compromising
requirements. security.
Today, data is the most valuable commodity in the Organizations of all sizes rely on a variety of tools
world. This is reflected by the ever-increasing number and technologies to function and compete in today’s
of cyberattacks. Evolving cyber threats have digital world. Identity management encompasses the
increased the risk of online identities becoming processes involved in securing and overseeing unique
compromised. As a result, traditional user digital representations of people and devices. For
authentication methods (using username and them to protect their systems, data, and resources,
password, biometrics, etc.) have proven to be lacking. identity management best practices are essential. By
Many businesses face challenges in ensuring identity adhering to these best practices, organizations can
protection and data security, particularly with remote make sure that their identity management systems are
and hybrid work environments becoming more efficient at safeguarding their resources, data, and
common. Identity management emerged as a solution systems while also preserving the confidence of their
to the limitations of traditional identity verification clients and other stakeholders.
methods. It refers to the processes and technologies WHAT IS A DIGITAL IDENTITY?
used to manage and secure information about the An identity is the collection of unique characteristics
identity of individuals or entities within a digital that define a person, organization, resource or a
system. It is the organizational process for ensuring
service in conjunction with any optional additional

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 788
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
information. A digital identity is the information and and maintain digital identities. This is done by first
data that identifies an individual in the digital world. ensuring that the right person or persons are
It consists of a set of attributes and credentials, such identified, and then verifying that those persons are
as name, date of birth, e-mail address, and biometrics, authorized to access the item or resource in question.
as well as certificates, passwords, or other Identity management aids in ensuring compliance
cryptographic keys. Digital identities are typically with laws and industry standards pertaining to data
stored in a central database or directory, which acts as protection and privacy. Figure 2 shows a
a source of truth. We all have some sort of digital representation of identity management [1].
presence, social media, e-mail, etc. which can all be
There are a number of identity management systems
described as our individual digital identities. Within
available today that perform a few key functions.
the corporate world, it is the organizational identity
They are displayed in Figure 3 [2] and briefly
which matters and therefore forms the core of the
explained as follows [2]:
identities of users within the infrastructure.
 Validation – Is the identity data real and
Digital identities have become a core element of a
authentic?
company’s DNA. An employee ID allows the
workforce of a company to access the internal  Verification – This verifies the identity of users
network and enables organizations to manage through credentials or other means. Is the
permissions. A consumer ID provides online shoppers validated identity data associated with a specific
with increased security while allowing providers to person?
gather insights into user preferences and  Authentication – This involves verifying the
demographics. An e-banking ID (a special form of identity of users or entities attempting to access a
consumer ID) can be used to access online banking system. Does the person or persons have
services, view account information, and make permission to access what they are attempting to
transactions. A citizen ID offers secure 24/7 access to access?
government services online, encouraging digital use
and reducing the need for office [1]. Figure 1 shows A driver’s license is an example of identity data.
these forms of ID [1]. Other examples may include biometric data
(fingerprints, facial recognition, selfies, etc.),
WHAT IS IDENTITY MANAGEMENT? documents (passports or government-issued ID),
Identity management (IDM) is an identity security challenge questions, or even behavioral signals.
framework that works to authenticate and authorize Organizations may use a variety of these methods
user access to resources such as applications, data, within their identity management process. Figure 4
systems, and cloud platforms. It is a framework for shows various means of identifying a person [3].
policies and technologies that ensure the secure
management of digital identities, focusing on IDENTITY AND ACCESS MANAGEMENT
identifying, authenticating, and authorizing users and In addition to managing employees, use of identity
applications to access internal resources. It is a management along with access management enables
method of verifying the identities of network entities businesses to manage customer, partner, supplier, and
and the level of access for enterprise network device access to their systems while ensuring
resources. Its main goal is to ensure only security. The terms “identity management” and
authenticated users are granted access to the specific “access management” are often used interchangeably
applications, systems or IT environments for which or in combination. But a distinction does exist
they are authorized. At the core of an identity between the two concepts. Identity management
management system are policies defining which focuses on managing the attributes related to the user,
devices and users are allowed on the network and group of users, devices, or other network entities that
what a user can accomplish, depending on device require access to resources. In contrast, access
type, location, and other factors. management focuses on evaluating user or device
attributes based on an organization’s existing policies
Identity management systems must enable companies and governance. Identity access management (IAM)
to automatically manage multiple users in different is an umbrella term that encompasses all of the
situations and computing environments in real time. processes involved in identifying people inside a
They include software, hardware, and procedures system and restricts access to such information to
used to identify and authorize a person or persons that only authorized users [4]. IAM systems fall under the
need access to applications, systems, networks, or overarching umbrellas of IT security and data
physical locations. They encompass the tools, management. Identity and access management (IAM)
protocols, and practices used to establish, validate, ensures that the right people (identity) can access the

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 789
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
right resources at the right times, for the right reasons APPLICATIONS OF IDENTITY
(access management). The purpose of IAM is to stop MANAGEMENT
hackers while allowing authorized users to easily do Identity management (IDM) in essence refers to the
everything they need to do. Organizations of all sizes management or administration of individual identities
need IAM solutions to make sure that only authorized within a system, such as a company or network. It
people have access to the systems. Figure 5 represents encompasses a variety of components and practices,
identity and access management [3], while Figure 6 including authentication, authorization, and identity
presents some IAM tools [5]. A typical IAM system governance. Innovations in the user identity
has a database or a directory of users. management space have been a trend in the past
Thanks to IAM, users can use their digital identity to couple of years. Specific applications of identity
gain access to different systems. Any corporation that management include the following [7]:
wants to safeguard its resources, data, and systems  Biometric Authentication: Biometric
must have a strong IAM strategy. Unauthorized authentication ensures a seamless and convenient
access, data breaches, and other security problems user experience while minimizing the risk of
can all be avoided with the help of an efficient IAM unauthorized access. New techniques in biometric
approach. Implementing appropriate security authentication include advanced methods such as
measures to guard against data breaches and other vein pattern recognition, gait analysis, and
security threats is another critical component of an behavioral biometrics (such as typing patterns or
IAM strategy. mouse movements) to enhance security and
There are two types of IAM, centralized and usability. Digital identity management will also
decentralized identity management models [6]: witness advancements in biometric
authentication, leveraging unique biological traits
 Centralized identity and access management for secure verification. Technologies like facial
(IAM) is a framework for storing and managing recognition, iris scanning, and fingerprint
users’ identity data in a single location. It authentication are already prevalent.
consolidates the storage and exchange of users’
login credentials and privileges. It provides a  Blockchain Technology: Blockchain provides a
secure process for identifying, authenticating, and decentralized and tamper-proof ledger, ensuring
authorizing users who have permission to access a that each user’s identity information is stored in a
company’s digital assets. With centralized IAM, block that’s cryptographically linked to the
users can access all the resources and applications previous one. This decentralised approach makes
they need to do their jobs by entering only one set data breaches much more difficult.
of login credentials. Critics of a centralized  Two-Factor Authentication: Two-factor
approach often cite the single identity store as the authentication (2FA) adds an extra layer of
most troubling issue. Relying on a single set of security by requiring users to provide two
credentials creates a single point of failure. different forms of identification, like a PIN code
 Distributed identity management (also known as or QR code sent to the user’s registered phone.
decentralized authentication), allows users access Multi-factor authentication (MFA) requires users
applications individually using a different set of to provide two or more authentication factors to
credentials for each. This model distributes users’ prove their identities. Combined with multifactor
identities across the network, as each application authentication and enforceable security policies,
must store and handle its own user data. enterprises can lower the risk of security
Decentralized identity management gives users breaches.
more control but offers companies less visibility.  Zero Trust Architecture: This assumes that no
It eliminates single point of failure by distributing user or device can be trusted by default,
data and increasing trust. Decentralized IAM regardless of their location. It enforces strict
relies on nascent Web3 technologies— access controls, continuous monitoring, and least
specifically blockchain and user-owned, privilege principles. Identity is not only the most
decentralized identifiers (DID). DIDs allow users important element in Zero Trust; identity is the
to control their data and offer a convenient way to new perimeter.
authenticate with a wide range of applications.
 Encryption: Digital identity systems employ
Since there is no need for consensus across a large robust encryption with a public and private key
network, decentralized solutions are typically less cryptographic authentication system, preventing
expensive. unauthorized access to networks and data as only

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 790
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
the intended user has the private key used to compliance with an ever-changing ecosystem of
decrypt the message. regulations that ensure users only have access to
 IDM in the Workplace: Identity governance and authorized data, and that data lives in the right
administration (IGA) solutions ensure that all place.
identities in an organization get the right access to  Competitive Advantage: In a fast-paced business
the right resources. Organizations with simpler environment, being able to quickly adapt and
needs choose light IGA solutions with a subset of integrate advanced identity management solutions
IGA features to reduce cost and deployment time. can provide a competitive edge, improving
Light IGA solutions often focus on identity security, operational efficiency, and customer
administration features. trust.
 Single sign-on (SSO): SSO allows users to access  Identity Governance: This is the process of
multiple apps and services with one set of login tracking what users do with access rights. Identity
credentials. The SSO portal authenticates the user governance provides oversight and monitoring,
and generates a certificate or token that acts as a helping organizations track and manage who has
security key for other resources. SSO systems use access to specific resources and why. IAM
open protocols like Security Assertion Markup systems monitor users to ensure that they do not
Language (SAML) to share keys freely between abuse their privileges and to catch hackers who
different service providers. Features like SSO and may have snuck into the network. Identity
adaptive access allow users to authenticate with governance is important for regulatory
minimal friction while protecting vital assets. compliance.
 Cloud Identity Management: This is the  Less Reliance on Physical Documents:
subsequent step of identity and access Traditional identity systems rely on physical
management (IAM) solutions. However, it is a lot documents (e.g., driver’s licenses, passports) for
more than merely a straightforward web app verification. Digital identity management
single sign-on (SSO) solution. Identity eliminates the need for physical documents,
management in cloud computing incorporates all reducing the risk of theft or loss.
categories of user-base who can operate in diverse
 Cybersecurity: A reason that IAM is important is
scenarios and with specific devices. Identity
that cybercriminals are evolving their methods
management in cloud computing is highly critical
daily. Identity management plays a vital role in
to an organization. This next generation of IAM
protecting organizations against breaches. By
solution is a holistic move of the identity provider
implementing stringent access controls and
right to the cloud. Cloud IAM solutions provide a
continuously monitoring identity activities,
clean and single access control interface. Figure 7
organizations can mitigate the risk of cyberattacks
shows the representation of cloud IDM [8].
and data leaks. This not only protects the
BENEFITS organization's assets but also upholds its
A major benefit of identity management is the ability reputation and trustworthiness. While perfect
to efficiently carry out transactions and complete protection unfortunately is not possible, IAM
tasks like document signing. Users can effortlessly solutions are an excellent way to prevent and
access various online services without the need to minimize the impact of attacks. While no security
remember different passwords or usernames. Identity system is infallible, using IAM technology
management is indispensable for maintaining significantly reduces your risk of data breaches.
security, ensuring user trust, and meeting regulatory
 Cost Efficiency: While initial setup may be
standards in today's digital landscape. Embracing it
expensive, managing digital identities in-house
can significantly improve the security of your
can lead to long-term cost savings by reducing
organization and optimize workflow while keeping
reliance on third-party services.
your mission-critical data secure. Other benefits
include the following [1]:  Productivity: Identity management can improve
 Automation: Many key IAM workflows are hard employee productivity. This is especially
or outright impossible to do manually. Instead, important when onboarding new employees or
organizations rely on technology tools to changing authorizations for accessing different
automate IAM processes. Modern IDM and IAM systems when an employee's function changes. As
systems frequently have automated features that tempting as it might be to implement a
help ensure controls are in place to manage these complicated security system to prevent breaches,
risks. These systems also help to manage having multiple barriers to productivity like

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 791
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
multiple logins and passwords is a frustrating user applications, and platforms, each with its own
experience. requirements and protocols. To meet the complex
 Delegation: Delegation enables local use cases of modern enterprises, IAM platforms
administrators or supervisors to perform system must integrate with a wide variety of systems.
modifications without a global administrator or  Security: Protecting against a wide range of
for one user to allow another to perform actions security threats, such as phishing, brute force
on their behalf. For example, a user could attacks, and insider threats, requires advanced
delegate the right to manage office-related security measures and continuous vigilance. With
information. new technologies and vulnerabilities, new attack
 Improved Collaboration: Seamless collaboration vectors emerge. Quickly implementing updated
between employees, vendors, contractors, and security measures helps organizations stay ahead
suppliers is essential to keeping up with the pace of these threats. In-house management ensures
of modern work. IAM enables this collaboration that all identity processes align with the latest
by making sure that not only is collaboration global data privacy and security regulations.
secure, it is also fast and easy.  Scalability: Ensuring that the identity
CHALLENGES management system can scale to accommodate
Identity management comes with numerous growth, additional users, and increased data
challenges affecting all levels of an organization. without compromising performance or security
Merging modern IAM technology with existing adds another layer of complexity. As a company
legacy infrastructures is not always easy. People are grows, it might struggle to scale their systems
tired of creating and managing all of their user ID and efficiently, leading to performance issues and
password combinations. Other challenges include the operational bottlenecks. Standard solutions are
following [1]: built to scale according to the needs of the
 Password Management: One of the top business, allowing for easy adjustments as the
challenges in implementing identity management company grows or changes.
is password management. IT professionals should  Interoperability: Achieving interoperability
invest in techniques that reduce the impact of between different identity management solutions
password issues in their companies. They must and standards involves careful planning and
enforce strong password policies and manage implementation.
password resets. Employees often cannot
 Regulatory Compliance: Keeping up with
remember and maintain multiple secure
evolving regulations and industry standards can
passwords to access the resources they need to get
be difficult, increasing the risk of non-compliance
their jobs done. By streamlining communication
and potential legal penalties. Regulations and
processes and access control, identity
compliance standards are frequently updated to
management not only improves IT security, it
address new security concerns and protect user
improves the user experience as well.
data. Companies must adapt quickly to meet these
 Resource Shortages: When it comes to identity evolving requirements and avoid legal penalties.
management, two types of resources can lead to Ensuring that identity management practices
problems if there is a shortage of them. Firstly, comply with ever increasing regulations involves
human resources are an issue, as securely ongoing monitoring, auditing, and reporting.
managing digital identities requires a broad range
 Access Control: Users expect easy and quick
of qualified professionals which are hard to find.
access. This can conflict with the need for robust
Secondly, financial resources play a key role.
security measures, which is also increasingly a
Smaller companies or those with limited IT
hard requirement for most users. Defining and
budgets may struggle to allocate sufficient funds
enforcing granular access control policies
for hiring, training, and retaining IAM
necessitates detailed planning and constant
professionals or investing in necessary
updates.
technologies.
 Flexibility: With emerging methodologies,
 Complexity: The complexity of identity
business requirements are changing rapidly,
management consists of several interrelated
adapting to market trends, responding to customer
factors further emphasizing the need for highly
needs, and necessitating an update of the IT
skilled employees. Identity management needs to
strategy. Therefore, identity management systems
be integrated across a variety of systems,

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 792
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
need to be flexible to accommodate new projects, [3] T. Watson, “What is identity management – Its
technologies, or organizational changes. characteristics & benefits,” August 2020,
 Data Privacy: One major concern with identity https://skywell.software/blog/identity-
management is data privacy. Keeping data secure management-characteristics-benefits/
and private is not easy. Customers demand that [4] “What is identity management (ID
the companies they do business with not only management)?”
make their personal experiences enjoyable, but https://www.techtarget.com/searchsecurity/defi
that those companies keep their data safe from nition/identity-management-ID-management
breaches and protect their privacy. Fragmented
[5] E. Wisniowska, “Top 10 best IAM tools –
global data and privacy regulation is creating
Identity access management (pros cons),”
compliance challenges. As a result of the growing
November 2022, https://infrasos.com/top-10-
list of breaches, violations of customer privacy,
best-iam-tools-identity-access-management/
and increasing consumer dissatisfaction, there has
been an explosion of regulations related to data [6] S. Brown, “Centralized and decentralized
security and privacy. identity management explained,”
https://www.strongdm.com/blog/centralized-
 Cost: Managing digital identities requires
decentralized-identity-management
significant investment in technology and
infrastructure, which can strain the limited [7] R. Villano, “Digital identity management: How
resources of smaller companies. it's revolutionising user and device
authentication,” May 2024,
 Lack of Expertise: There may be a lack of the
https://www.globalsign.com/en/blog/sg/digital-
specialized knowledge required to effectively
identity-management-how-its-revolutionizing-
manage digital identities, leading to potential
user-and-device-authentication
misconfigurations, security gaps, and operational
inefficiencies. [8] R. Soni, “Identity management in cloud
computing,” January 2021,
CONCLUSION
https://www.loginradius.com/blog/identity/iden
Identity management (IDM) essentially refers to the
tity-management-in-cloud-computing/
management or administration of individual identities
within a system, such as a company or network. [9] J. Barton, “Identity management – What you
Today, the importance of an effective IDM strategy need to know,” June 2015,
cannot be overstated. In the digital age, where digital https://www.univention.com/blog-
interactions are everywhere, users must be able to en/2015/06/identity-management-what-you-
trust that their identities and personal information are need-to-know/
protected. Effective digital identity management [10] M. Bryght, Identity and Access Management:
provides this assurance by verifying that users are from Zero to Hero: Learn all you need about
who they claim to be through strong authentication Identity and Access Management (IAM)
methods. For those who want to master or speed up (Identity in Cybersecurity). Independently
digital transformation, the key is to thoroughly Published, 2024.
manage and protect digital identities on all levels.
IDM can and should be a key component of a [11] M. Chapple, Access Control and Identity
business’s security and productivity strategies [9]. By Management (Information Systems Security &
falling short on IAM best practices, organizations Assurance). Jones & Bartlett Learning, 3rd
unknowingly risk their own security, along with that edition, 2020.
of their customers and shareholders. More [12] A. Zulejhic, Identity and Access Management:
information on identity management is available from Fundamentals. Independently Published, 2022.
the books in [10-20].
[13] E. Sergeev, Identity Management Crisis:
REFERENCES Solving IAM’s Biggest Challenges.
[1] “What is digital identity management and how Independently Published, 2025.
do you master it?”
https://www.adnovum.com/blog/digital- [14] M. J. Haber and D. Rolls, Identity Attack
identity-management Vectors: Implementing an Effective Identity and
Access Management Solution. Apress, 2019.
[2] “Identity management,” Unknown Source.
[15] Y. Wilson and A. Hingnikar, Solving Identity
Management in Modern Applications:

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 793
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
Demystifying OAuth 2, OpenID Connect, and [18] E. Bertino and K. Takahashi, Identity
SAML 2. Apress, 2nd edition, 2022. Management: Concepts, Technologies, and
Systems. Artech House, 2010.
[16] J. Nickel, Mastering Identity and Access
Management with Microsoft Azure. Packt [19] K. Spaulding et al., Identity Management: A
Publishing, 2nd edition, 2019. Primer. MC Press Online, LLC. 2009.
[17] M. Laurent and S. Bouzefrane, Digital Identity [20] D. G. W. Birch (ed.), Digital Identity
Management. ISTE Press - Elsevier, 2015. · Management: Perspectives on the
Technological, Business and Social
Implications. Gower, 2007.

Figure 1 Some forms of ID [1].

Figure 2 A representation of identity management [1].

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 794
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470

Figure 3 Key functions of identity management systems [2].

Figure 4 Various means of identifying a person [3].

Figure 5 Representation of identity and access management [3].

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 795
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470

Figure 6 Some IAM tools [5].

Figure 7 Representation of cloud IDM [8].

@ IJTSRD | Unique Paper ID – IJTSRD78579 | Volume – 9 | Issue – 2 | Mar-Apr 2025 Page 796

You might also like