The Basics
Identity and Access Management
IAM Concepts
Identity and Access Management
Access Control
Protective measures for C-I-A
Physical Access
Tangible security measures
Logical Access
Electronic methods to restrict access
Defense in Depth
Identity and Access Management
Privilege Access Management
Implementing Principle of Least Privilege
Identity Federation
SSO, OAuth, SAML, and OIDC