Διοίκηση ταυτοτήτων και πρόσβασης σε περιβάλλοντα νέφους
Identity and access management in cloud environments

View/ Open
Keywords
Cloud ; Identity and access managementAbstract
The cloud computing environment is typically divided into three main cloud service models: Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). Cloud computing is based on a service-oriented architecture, which has the capability to provide Database-as-a-Service (DbaaS). Additionally, the cloud computing environment offers a better way to manage available resources both in the industry and academia.
Identity and Access Management (IAM) plays a central role in securing cloud environments. IAM involves controlling user access to resources and data while ensuring authentication, authorization, and proper user management.
The goal of IAM is to help organizations control access to cloud applications, services, and data through comprehensive authentication and authorization protocols. Businesses can leverage IAM in a cloud environment to enhance security, improve user access pathways, and manage identities across cloud environments.