A Survey On Identity and Access Management
A Survey On Identity and Access Management
ISSN No:-2456-2165
Abstract:- Different architectural issues related to Identity and access management (IAM) refers to the
Identity and Access Management (IAM) are arising for products, processes, and policies that are employed to manage
the successful deployment of applications in the context of user identities and regulate user access within an
digital entitlement. Data management solutions should organisation. It makes reference to the IT security discipline,
include effective access control methods and choose the foundation, and digital identity management solutions.
best configuration among the numerous and intricate Identity management includes identification provisioning and
approaches to offering access control services. The IAM de-provisioning, identification security and authentication,
features can be used to implement Web Single Sign-on and authorization to access resources and/or perform specific
(SSO), federated identities, password synchronisation, actions. IAM's overriding goal is to ensure that any given
and service granularity, allowing the system to address identity has access to the appropriate resources (applications,
and resolve the majority of current access management datasets, networks, etc.) and context.
concerns. This paper gives you the general idea of what is
IAM (Identity Access Management), How it is related to Identity management systems are used to secure user
Cybersecurity, Its Functional Areas and its role in access, manage users, perform credential verifications, and
Cybersecurity and in Information Security for a better determine whether the right people are accessing the services'
understanding. resources. Users are authenticated in a variety of ways,
including passwords, biometrics, tokens, and certificates. In
I. INTRODUCTION most organisations, the risk, cost, and effort required to
manage identity grows in tandem with the organization's size.
Traditionally, Software applications are typically This assists the organisation in lowering the risk associated
deployed and deployed inside the boundaries of an with identity management, as well as the cost and time
organization's information system. As a result, the company required to meet the identity and access needs of the
has a "confidential area" that is determined by static employees.
procedures and is overseen and managed by the IT
department's expertise. The "confidential area" typically II. RELATED WORKS
refers to the central organisational network, as well as internal
systems and applications, which are arranged in the shape of This chapter explores existing studies works on Identity
a data centre. The data centre can either be maintained by and Access Management in an organisation, outlining work's
professionals from within the company or it can be contracted strengths and flaws of each work. To address the various
out to an outside service provider (in which case the company types of authentication and authorization issues, several
typically retains the right to control and last say over how researchers have proposed various approaches and models.
security rules are developed and enforced). In a A new architecture for managing identity and controlling
"conventional" paradigm, a number of specialised access to resources in a multi-tier cloud infrastructure was
technologies that are implemented at the network level secure proposed in the article [1]. The architecture is made up of
access to the organization's operational resources. two major components: middleware and centralised IAM
for managing user and infrastructure data. While the
Nowadays, maintaining identities and credentials for repository handles database operations, middleware sits in
their technological resources is a challenging issue that many front of a resource provider and manages time-consuming
enterprises must deal with. What began as a straightforward decision making such as authorization and authentication.
problem contained within the boundaries of the data centre The architecture was tested on the Canadian SAVI
has evolved into a huge and enormously complicated issue testbed. The system is built on a multi-tier infrastructure
that affects businesses of all kinds. In particular in remote IT IAM solution, such as the SAVI testbed. However, the
systems, many major firms are unable to efficiently control proposed work necessitates a significant amount of effort
the identities and access permissions assigned to users. to define and assign roles.
System administration (SA) teams have been developed by IT
departments during the past few years to handle the An integrated identity and attribute-based access
organization's numerous servers, databases, and management system for cloud web services was proposed
workstations. Nevertheless, managing access to the in the paper [2]. The hybrid architecture for authentication
organization's resources continues to be difficult even with and attribute based control (ABAC) for authentication
the introduction of SA groups. Even with this increase, were used in the proposed integrated approach. Identity
manual procedures and human resources occasionally fall Management and Access Management models are
short of the demanding workloads and high administrative included. To access cloud web services, the user must first
costs required to manage user IDs inside the business. authenticate via an identity system from the initiated
User Management: This category includes user repositories, both a meta-directory and a virtual directory
administration, strong passwords, role/group can be employed. By collecting data from numerous
management, and user/group provisioning. It defines a identity sources, a meta-directory often gives an aggregate
collection of administrative duties such as identity collection of identity data. To maintain the data in sync
generation, propagation, and the management of user with other identity sources, it often incorporates a two-
identities and privileges. One of its components is user life way data synchronisation service.
cycle management, which allows a company to control the
lifecycle of a user account from provisioning through de- A. Role of IAM in Cybersecurity
provisioning. Some user management functions should be Effective IAM infrastructure and solutions assist
centralised, while others must be outsourced to end users. enterprises in establishing secure, productive, and efficient
Delegated management allows an organisation to allocate access to technology resources across these disparate
duty directly to user departments. Delegation may also systems, while also providing several important key benefits:
increase system data accuracy by entrusting updating Enhanced Data Security: Business and IT personnel
responsibilities to those who are most acquainted with the receive a streamlined and uniform manner of controlling
situation and data.. user access across an organization's identity lifecycle by
unifying both authentication and authorization capabilities
Central User Repository: The Central User Repository on a single centralised platform. When employees leave a
maintains and distributes identification information to firm, for example, a centralised IAM solution enables IT
other systems, as well as verifies customer credentials. managers to revoke their access with assurance that the
The Central User Repository aggregates or logically revocation will take effect quickly throughout all
organises an enterprise's identities. To handle different business-critical systems and assets that are linked with
identity data from several systems and application user the centralised IAM solutions.