[PDF][PDF] Intelligent authentication for identity and access management: a review paper

IA Mohammed - International Journal of Managment, IT and …, 2013 - researchgate.net
International Journal of Managment, IT and Engineering (IJMIE), 2013researchgate.net
The main purpose of this paper is to explore how identity and access management systems
provide important benefits in various enterprises. Identity and access management (IAM)
systems usually consist of predefined tasks as an information security system. The
authentication process is the most important function, as it is responsible for validating the
identity of users for service providers that collaborate with another IAM [1]. This provides an
analysis of how intelligent authentication work for IAM systems. The findings are assessed in …
Abstract
The main purpose of this paper is to explore how identity and access management systems provide important benefits in various enterprises. Identity and access management (IAM) systems usually consist of predefined tasks as an information security system. The authentication process is the most important function, as it is responsible for validating the identity of users for service providers that collaborate with another IAM [1]. This provides an analysis of how intelligent authentication work for IAM systems. The findings are assessed in light of the concept of intelligent authentication key factors, which is discussed below. Based on this assessment, it was not possible to study and execute an authentication that satisfied all of these main factors. To manage modern diverse and complex IT systems effectively, users must be assigned distinct identities and associated responsibilities to get access to each needed application, operating system, and databases platform. Users must remember numerous passwords, and IT must repeat an effort to provide and manage users on every platform [1]. This affects productivity and raises the danger of improper access to important data and other corporate resources for a user. There is a solution in the form of a unified and intelligent technique to identity and access management (IAM). Companies may condense every user's many identities into a few or, preferably, just one identity and establish a unified set of roles, and rules. This method greatly simplifies IAM administration, increases user and IT efficiency, and optimizes security and compliance. This paper will therefore discuss in detail how the intelligent IAM authentication method streamlines a variety of important activities, such as authentication via multifactor or password management.
researchgate.net