UAM/IAM is a broad category in the IT Security Landscape and one of the most important category. The key elements in it involves Identity, Authentication, Authorization and User Management Services. The Identity and Access Management/ User Access Management as a whole, ensures that the right users have the adequate access to the right resources (Hardware, Software, Services etc.) at the right time.
In Cloud Based Architecture, in most cases there is a requirement of an hybrid setting which involves on-premise synchronization with Cloud Services or integration with cross enterprise applications .In modernized enterprise scenario, setting up the entire landscape of access management is very complicated. Thus, the understanding of the entire landscape is important to derive the necessary product and tools for any business.
Below are the high level components of User Access Management
There are many available IAM Vendor products for On-Premise, Cloud and Hybrid settings. Also, Cloud Service Providers provide the necessary IAM Tools for Cloud based migration.
Below listed are the some of products and Tools: