Replay: Using Identity Data to get the Best out of IAM

Image for post

With the increased use of the Web and proliferation of heterogeneous applications, businesses are facing now more challenges than ever in terms of authentication, authorization and identity management. The complication arises when modern architectures not only have to provide access to one, isolated system, but a whole network of services. (Gaedke, Meinecke & Nussbaumer, 2005). […]