Identity and Access Management (IAM) tools are essential for securing digital resources by ensuring the right individuals have access to the right systems at the right times.
SSO Protocols:
- SAML: Common in enterprise web apps.
- OIDC/OAuth 2.0: Popular for cloud and mobile apps.
- Kerberos: A Secure ticket-based system, often used in internal networks.
- RADIUS: Used for remote network access (VPNs, Wi-Fi).
- LDAP: Centralised directory service, often used for authentication in intranet environments.
Authentication
: Verifying identity (e.g., usernames, passwords, MFA) — the “who.”
Authorisation
: Granting access rights and permissions the “what.”
IAM
: The combined framework managing identity lifecycle, authentication, authorisation, and often auditing.
Different IAM categories.
✅ SSO & Federation
✅ Identity Governance & Administration (IGA)
✅ Privileged Access Management (PAM)
✅ Directory Services
✅ Secrets Management
✅ Cloud IAM
✅ Multi-Factor Authentication
More Mechanism
Top comments (0)