z-logo
open-access-imgOpen Access
Introduction to Identity - Part 2: Access Management
Author(s) -
Pamela Dingle
Publication year - 2020
Language(s) - English
DOI - 10.55621/idpro.45
Subject(s) - identity management , access management , identity (music) , perspective (graphical) , context (archaeology) , domain (mathematical analysis) , internet privacy , computer science , access control , business , knowledge management , public relations , computer security , political science , history , computer network , mathematical analysis , physics , mathematics , archaeology , artificial intelligence , acoustics
Who are you, and what are you allowed to do? In digital systems, these questions are the domain of “Identity and Access Management (IAM).” Access management systems provide the mechanisms for deciding who is who, and evaluate and enforce decisions about who should get access to what. Part 2 of the introduction explores the big picture of access management through a historical perspective. You can expect a little advice, a lot of context, and an experience-based overview of what we do in access management and why our contributions matter.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here