This article is part of the Identity and Access Management Security School lesson on building an IAM architecture. Visit the Building an identity and access management architecture lesson page for more learning resources.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
If you got two or more wrong, revisit these materials in the Building an identity and access management architecture lesson:
Video: Demystifying identity management
Tip: From the gateway to the application: Effective access control strategies
Podcast: Five key challenges in managing identities