IAM Identity Access Management-Importance in Maint
IAM Identity Access Management-Importance in Maint
RESEARCH ARTICLE
ABSTRACT
Identity and Access Management proposes a web service that assists in Submitted: June 14, 2023
controlling the entire work through secured ways. This research study Published: August 31, 2023
has been started to highlight the importance of IAM by discussing its
roles, characteristics, advantages and disadvantages. It is a framework 10.24018/ejeng.2023.8.4.3074
comprising processes, policies, and the latest technologies, allowing the
organization to monitor digital identities and control exclusive access to 1 Faculty
follow information based on user data. The IAM component proposes of Business, Design and IT,
Holmesglen Institute Chadstone Campus,
an approach of centralized user management, account management Australia.
console, authentication approaches, and so on. In this research work, 2 Faculty of ICT, Victorian Institute of
roles and key components of IAM have been discussed with all types of Technology (VIT), Australia.
possible challenges. Furthermore, this research will help readers and future
researchers easily identify the importance of IAM in maintaining security *Corresponding Author:
systems within organizations. e-mail: Chetanpal.singh@holmesglen.edu.au
Copyright: © 2023 Singh et al. This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in
any medium, provided the original work is properly cited.
2.4. Mitigation Strategies of IAM challenges and objectives. Further, the consideration of the secondary
Based on the previous author’s opinion about the IAM’s research method supported to conduct of the research
implementation challenges, it has been noted that there works fast and in a cost-effective way by using the data
are different basic issues that should be mitigated prop- of past researchers who have used vital data for reflecting
erly. Among various issues, the most common risk is IAM implementation.
authentication issues [24] defines that, for ensuring authen-
tication, it is important to implement authenticate method. 3.3. Research Philosophy
Authentication factors can be categorized into three dif- The considered research work has made effective uti-
ferent groups, such as ‘‘personal identification numbers’’, lization of the “Interpretivism research philosophy”, which
biometrics, or authentication key. Additionally, the multi- supported the researcher to put more stress on factual
layer security system is also an essential process that data. This philosophy helped the researcher to form the
can support ensuring authentication. Through multiple belief by which the required data will be accumulated,
authentication mechanisms within the IAM process, it can evaluated and utilized [25]. In the process, this research
be easy to mitigate challenges as well as increase efficiency
philosophy enabled the researcher to conduct the research
levels also.
work in a subjective way while stating that data evaluates
2.5. Research Gap the rationalization of the research in an effective way and
This research is conducted by focusing on the impor- the main meaning is acquired at the end of the research
tance of Identity Access Management. Besides this, its key method. When conducting the secondary research method
components, roles etc., have been discussed here, but no for evaluating challenges of IAM that can interfere with its
detailed information about its risk mitigation strategies has credibility in terms of implementation in large firms, the
been mentioned here. As this identity and access manage- interpretivism research philosophy enabled to conduct of
ment system help to provide organizational security, it is the research in depth while providing higher range validity
necessary to follow uniqueness at the time of implementing as it involved authentic data.
IAM. There are robust solutions that help to mitigate
all the possible threats, but in this research study, those 3.4. Research Approach
are not discussed in-depth, and it creates gaps in this The research formed on evaluating the role of “IAM
research work. identity and access management” make effective use of the
“Deductive research approach”. This particular deductive
research approach enabled us to put stress on utilizing the
3. Research Methodology existing theories. This supported critically emphasizing the
3.1. Research Overview key contents of the present information white acquired
The researcher put stress on evaluating the “role of the reliable evaluation from it to justify the cumulated
“Identity Access Management” (IAM)”, and in the pro- content [22]. Apart from this, the researcher put stress
cess, the concern has been laid on assessing the set research on reflecting the key facts as well as ideas reflected in
question and aim. Even the researcher put concerned the literary contents to give an effective evaluation and
with evaluating the considered scholarly articles through stating the relevancy of the objectives set. Further, the
the lens of positivist research philosophy. The considered researcher reflects on the efficiency of the objectives set by
research work will be formed by considering the secondary considering the qualitative research method and making a
research method as it will support considering the qualita- considerable contribution to future research development.
tive research method generated from the literary analysis This deductive research approach supported more logical
while emphasizing the content. The consideration of the inferences involved in the literary data that highlight the
deductive research approach supports the existing theories. relevance of the research.
Further, the researcher has managed the ethical issues for
managing the research result [20]. 3.5. Research Design
3.2. Research Methods The considered research work has made effective utiliza-
tion of the “Descriptive research design” to systematically
Identity and access management security are regarded
accumulate the data for evaluating the IAM identity and
as the prime element of the entire IIT security system that
access management role in the organization in a critical
manages digital identities along with user access in the
firm. In order to evaluate the role of IAM, the concern has way. This research design does not enable the researcher
been laid on making effective utilization of the “secondary to manipulate the data but evaluates it in its actual ver-
research method”. Further, the qualitative data reflected sion to extract the desired outcome [21]. This enabled the
the research’s significance in terms of justifying the objec- researcher to evaluate the key components of the IAM
tors of the research [23]. The researcher to recognized key in an effective way and the way it reduces the threat of
components and processes of IAM and acquired the key identity-related access in the firm. The consideration of
facts through a secondary data collection method. The the descriptive research design enabled to form of the
consideration of the secondary data supported the acquisi- strategy by which varied components of the paper have
tion of literary sources and supported the accumulation of been integrated and assuring that the research problem can
sufficient data that can help in meeting the set research aim be addressed effectively.
3.6. Research Data Collection intelligence (AI) all have the potential to enhance iden-
The “Secondary data collection method” has been used tity and access management (IAM). Every single study
in this research paper, and this supported to make effec- acknowledges that concerns regarding safety and confi-
tive utilization of the existing data acquired from the dentiality are the main barriers to the implementation of
scholarly articles. Even in the process of collecting the these technologies in IAM [24]. However, there are a few
data, the concern has been laid on making utilization of significant differences that may be found between the six
the “government and non-government records”, “maga- publications as show in Table I.
zines”, “newspapers, libraries”, and “internet” [23]. Even
the record of different organizations using “systematic 4.1. Result of the Papers
review of identity Access Management (IAM)” can be The six papers offer a range of viewpoints on the
considered to evaluate the critical use of the IAM and possibility of enhancing IAM through the use of AI,
the issues that it laid in the process of implementation in sophisticated authentication techniques, blockchain tech-
the large organization. The accumulated literary sources nology, distributed ledger technology, and workflow
reflected the new aspect of the considered research topic. integration. These are some of the subjects that the papers
In the process of data collection, the stress has been laid on cover.
making utilization of the literary sources.
• A variety of chances for IAM improvement are
3.7. Research Data Analysis presented by the application of AI, some of which
are highlighted below:
In the research work, the concern has been laid on mak-
ing utilization of the “qualitative data analysis” method. This method can be used to automate a
This supported to make use of only descriptive data, number of processes, such as password man-
and no statistical data have been utilized in the process agement and user provisioning.
of undertaking the overall research work. This enabled Supplying information on user behavior that
systematizing the descriptive data collection via schol- can be used to spot potential dangers in the
arly articles and then evaluating it. It helped to stress immediate area.
accumulating effective data and then facilitating the key Spotting unusual user activity patterns and
elements for implementing the IAM [24]. In the process, using that information to help prevent
the acquired data has been interpreted in an effective way assaults.
to ensure that the data analysis process can be executed
• One way to improve IAM’s current security is
in an authentic way. This supported undertaking a criti-
to use more complex authentication processes.
cal analysis of the accumulated paper from the scholarly
These steps increase the difficulty of unauthorized
articles to reflect the overall scenario associated with the
considered research topic. users accessing systems and data, which ultimately
enhances the security of IAM.
3.8. Data Validity and Reliability • By providing a tamper-proof and decentral-
The researcher has evaluated the necessity of IAM and ized method of storing identifying information,
the way it involved the policies, methods and techniques blockchain technology can help identity and access
that support reducing identity-associated access in the management (IAM) increase its security and
firm. In order to achieve this, the research has put con- privacy. Identity and access management (IAM)
cern on considering the reliability to form consistency and can become more secure as a result of this.
the aspect of the research result that supported reflect • Identity and access management (IAM) could
the relevancy of the research effectively [26]. Further, the become more effective with the use of distributed
researcher has reflected on managing consistent outcomes ledger technologies. This is achieved by offering
though out the research and the work or evening the a shared, unchangeable ledger of access control-
rationale of counting secondary research methods. related data.
The validity of the research work has been considered • The process of providing and rescinding access
to reflect the accuracy development in the result of the to systems and data can be automated with the
research and recognize the genuineness of the research use of workflow integration, which can increase
output gathered via literary sources. Even in the process, IAM’s effectiveness. As a result, IAM could be
the concern has been laid on making use of literary sources more efficient.
published in the last three years to ensure that only current
data can be used to meet the set aim and objectives. 4.2. Comparison of Results
The six papers give a thorough explanation of how
blockchain technology, distributed ledger technology,
4. Result & Comparison workflow integration, more robust authentication meth-
The six distinct papers are related to one another ods, and artificial intelligence may improve IAM. But
in a variety of ways. All of the papers arrive at each of the six papers focuses on a different subject.
the same conclusion, which is that workflow integra- Paper 1 examines the perspectives of IT professionals,
tion, blockchain technology, distributed ledger technology whereas Paper 2 examines the technical challenges of
(DLT), enhanced authentication methods, and artificial enhanced authentication systems. In contrast, Paper 3
proposes a decentralized and dynamic SSO IAM frame- regular workflow. As the day advanced, it really has
work for cloud multi-application outsourcing. Despite become so challenging to find out all the internal threats
this, Paper 4 provides a comprehensive review of BIMs and and cyber-attack incidents in the organization. It has been
their relationship to the Internet of Medical Things. The noticed that all the latest applications and required ser-
findings from both of the aforementioned investigations vices propose cloud services over the traditional systems
are included in this volume’s presentation. In Paper 5, and servers, which easily manage security areas through
IAM is presented by utilizing DLT, and after that, the using different tools, which creates difficulties in managing
difficulties associated with merging IAM with serverless the entire identity management processes. Identity-based
computing are investigated. The six papers present an activities are basically used to accumulate all the relevant
in-depth analysis of how IAM could be improved with data, such as public keys. Data-centric characters always
the implementation of blockchain technology, distributed propose outcomes by following the latest security needs for
ledger technology, workflow integration, more depend- secured communication. The data source authentication
able authentication approaches, and artificial intelligence. always makes sure about the data packets that have been
However, it is essential to keep in mind that these tech- followed during the identity access management processes.
nologies are still in their infancy and that a large number So after completing the entire research work, it can
of obstacles need to be conquered before a sizeable per- be concluded that data-centric authentication always pro-
centage of the population will be able to make use of poses a common security service that is needed by
them. However, it is essential to keep in mind that research proposing different types of security solutions [29]. The
on these technologies is still in its infant stage. This is key importance behind the IAM system is to automate
something that must not be forgotten. recording, capturing, and controlling access permissions
Rather than focusing on improving IAM with just one and user identities to improve data security. Not only that,
of these technologies, the best strategy would be to improve but it also helps to provide solutions that can easily identify
it simultaneously with all of them. Businesses may make possible issues and find ways to mitigate them. Future
use of a wide range of different technologies to build
research on this proposed topic will open a new door to
identity and access management (IAM) systems that are
be updated with the attitude of the latest technologies
safer, more efficient, and easier to use. In the end, the type
as well as keep away from any data breaches or cyber-
of paper that is appropriate for you will be determined by
attacks. With the assistance of IAM, people can easily
the specific criteria that you have. Paper 1 is an excellent
avoid sharing any long-term credentials as well as propose
option to go with if you are interested in the beliefs held by
protection against any kind of illegal access. Maintaining
those who operate in the field of information technology
user authentication is an important component of best
because it offers a variety of points of view. Paper 2 should
practices of access management which helps to keep away
be studied in its entirety if you wish to acquire a deeper
comprehension of the more complicated aspects of modern any kind of unauthorized access and secure the data from
authentication systems. data breaches [30]. Future research on this topic will help
to be more conscious about the responsibilities of identity
and access management.
5. Conclusion
IAM plays an important role in the case of accessing Acknowledgment
important data. As the cybersecurity industry becomes
aware of maintaining login credentials, it becomes impor- I would like to thank God for all the blessings and
tant to accomplish IAM solutions depending on access opportunities bestowed on me. I would like to thank my
privileges and user credentials. After conducting this family for their love, prayers, encouragement and uncon-
research work, it can be concluded that IAM systems ditional support throughout my research process. Special
utilize different protocols and standards for securing per- thank you to my sisters and other family members, without
sonally identifiable information. With the assistance of this whom I wouldn’t have made it so far and enjoyed life half
system, it becomes easy to follow the track of users’ activi- as much! I would also like to express my gratitude to my
ties as well as prior authorizations, which can easily change supervisor for guidance, support, clarity and constructive
the employees’ performances. It has the ability to integrate feedback throughout the dissertation project. Lastly, thank
the authentication of organizational infrastructure in the you to the survey participants, without whom this project
company of identity governance that follows different data would not be possible.
security policies by following or informing any top-level
decisions [27]. At the time of collecting relevant informa-
tion from various research papers, it has come to know References
that the right and rule of compliance management software [1] Divyabharathi DN, Cholli NG. A review on identity and access
helps to automate as well as follow the track of different management server (keycloak). Int J Secur Priv Pervasive Comput
(IJSPPC). 2020;12(3):46–53.
components of the IAM activities [28].
[2] Ding Y, Zhang Y, Qin B, Wang Q, Yang Z, Shi W. A scalable cross-
All the updated services and applications always prefer chain access control and identity authentication scheme. Sens.
both storage and cloud services together with any kind of 2023;23(4):2000. doi: 10.3390/s23042000.
traditional systems and on-premise servers. Most organi- [3] Sankaran A, Datta P, Bates A. Workflow integration alleviates
identity and access management in serverless computing. ACSAC
zations always target to sort out cyber-attacks and external ’20: Annual Computer Security Applications Conference, pp. 496–
threats so that all the employees can easily maintain the 509, December 2020. doi: 10.1145/3427228.3427665.
[4] Mohammed IA. The interaction between artificial intelligence and [29] Bera B, Saha S, Das AK, Vasilakos AV. Designing blockchain-
identity and access management: an empirical study. Int J creat Res based access control protocol in IoT-enabled smart-grid system.
Thoughts (IJCRT), ISSN. 2021;2320(2882):668–71. IEEE Internet Things J. 2020;8(7):5744–61.
[5] Cameron A, Williamson G. Introduction to IAM Architecture (v2). [30] Tan L, Shi N, Yang C, Yu K. A blockchain-based access control
IDPro Body of Knowledge. 2020;1(6). doi: 10.55621/idpro.38. framework for cyber-physical-social system big data. IEEE Access.
[6] Carnley PR, Kettani H. Identity and access management for the 2020;8:77215–26.
internet of things. Int J Future Comput Commun. 2019;8(4):129–33.
[7] Saranya N, Sakthivadivel M, Karthikeyan G, Rajkumar R. Secur-
ing the cloud: an empirical study on best practices for ensuring data
privacy and protection. Int J Eng Manag Res. 2023;13(2):46–9.
[8] Liu H, Han D, Li D. Fabric-IoT: a blockchain-based access control
system in IoT. IEEE Access. 2020;8:18207–18218.
[9] Alsirhani A, Ezz MM, Mostafa AM. Advanced authentication
mechanisms for identity and access management in cloud comput-
ing. Comput Syst Sci Eng. 2022;43(3):967–84.
[10] Kaiser T, Siddiqua R, Hasan MMU. A multi-layer security system
for data access control, authentication and authorization. Doctoral
dissertation. Brac University; 2022.
[11] Gangavarapu T, Jaidhar CD, Chanduka B. Applicability of
machine learning in spam and phishing email filtering: review and
approaches. Artif Intell Rev. 2020;53:5019–81.
[12] Du J, Jiang C, Wang J, Ren Y, Debbah M. Machine learning for 6G
wireless networks: carrying forward enhanced bandwidth, massive
access, and ultrareliable/low-latency service. Ieee Veh Technol Mag.
2020;15(4):122–34.
[13] Chaudhry SA, Alhakami H, Baz A, Al-Turjman F. Securing
demand response management: a certificate-based access con-
trol in smart grid edge computing infrastructure. IEEE Access.
2020;8:101235–43.
[14] Mandal S, Bera B, Sutrala AK, Das AK, Choo KKR, Park
Y. Certificateless-signcryption-based three-factor user access
control scheme for IoT environment. IEEE Internet Things.
2020;7(4):3184–97.
[15] Song F, Ai Z, Zhang H, You I, Li S. Smart collaborative balancing
for dependable network components in cyber-physical systems.
IEEE T Ind Inform. 2020;17(10):6916–24.
[16] Saini A, Zhu Q, Singh N, Xiang Y, Gao L, Zhang Y. A
smart-contract-based access control framework for cloud smart
healthcare system. IEEE Internet Things J. 2020;8(7):5914–25.
[17] Putra GD, Dedeoglu V, Kanhere SS, Jurdak R. Trust management
in decentralized iot access control system. 2020 IEEE International
Conference on Blockchain and Cryptocurrency (ICBC), pp. 1–9,
IEEE, May 2020. doi: 10.48550/arXiv.1912.10247.
[18] Kayes ASM, Kalaria R, Sarker IH, Islam MS, Watters PANg A,
Hammoudeh M, et al. A survey of context-aware access control
mechanisms for cloud and fog networks: taxonomy and open
research issues. Ah S Sens. 2020;20(9):2464.
[19] Sevilla G. Zoom vs. Microsoft Teams vs. Google Meet: Which top
videoconferencing app is best. PC Mag; dated 16 April 2020. https://
au.pcmag.com/how-to-work-from-home/66389/zoom-vs-microsoft
-teams-vs-google-meet-a-videoconferencing-face-off.
[20] Egala BS, Pradhan AK, Badarla V, Mohanty SP. Fortified-chain:
a blockchain-based framework for security and privacy-assured
internet of medical things with effective access control. IEEE Inter-
net Things J. 2021;8(14):11717–31.
[21] SophosLabs Research Team. Emotet exposed: looking inside highly
destructive malware. Network Security. 2019;2019(6):6–11.
[22] Alsirhani A, Ezz MM, Mostafa AM. Advanced Authentication
Mechanisms for Identity and Access Management in Cloud Com-
puting. Comput Syst Sci Eng. 2022;43(3):967–84.
[23] Fugkeaw S. Achieving decentralized and dynamic SSO-identity
access management system for multi-application outsourced in
cloud. IEEE Access. 2023;11:25480–91.
[24] Alamri B, Crowley K, Richardson I. Blockchain-based identity
management systems in health IoT: a systematic review. IEEE
Access. 2022. doi: 10.1109/ACCESS.2022.3180367.
[25] Ghaffari F, Gilani K, Bertin E, Crespi N. Identity and access
management using distributed ledger technology: a survey. Int J
Netw Manag. 2022;32(2):e2180.
[26] Tang Y, Yang J. Lambdata: Optimizing serverless computing by
making data intents explicit. 2020 IEEE 13th International Confer-
ence on Cloud Computing (CLOUD), pp. 294–303, IEEE, October
2011.
[27] Egala BS, Pradhan AK, Badarla V, Mohanty SP. Fortified-chain:
a blockchain-based framework for security and privacy-assured
internet of medical things with effective access control. IEEE Inter-
net Things J. 2021;8(14):11717–31.
[28] Belchior R, Putz B, Pernul G, Correia M, Vasconcelos A, Guerreiro
S. SSIBAC: self-sovereign identity based access control. 2020 IEEE
19th International Conference on Trust, Security and Privacy in
Computing and Communications (TrustCom), pp. 1935–43. IEEE,
December 2020. doi: 10.1109/TrustCom50675.2020.00264.