Professional Documents
Culture Documents
5 IAM Infrastructure
5 IAM Infrastructure
5 IAM Infrastructure
Introduction
• Security administrators have traditionally been concerned
with managing the identities of and controlling access for the
people that are part of or interact with their technology
infrastructure.
• Data and even devices can share not only within the
organization but with other organizations.