Identity Access Management Systems: A comparative review
Keywords:
Digital infrastructures, User identities, Access control, Security, Compliance, IT environments, Authentication, Authorization, Auditing, Zero Trust Architecture, AI-driven identity management, Cloud computing, Emerging trends, Challenges, Best practices, Scalable solutions, Cyber threats, Regulatory requirementsAbstract
Identity Access Management (IAM) systems are critical components in modern digital infrastructures, providing essential capabilities for managing user identities and controlling access to resources within organizations. [1] This review paper explores the evolution, architecture, and key functionalities of IAM systems, highlighting their role in enhancing security and compliance in increasingly complex IT environments. The paper provides a comprehensive overview of various IAM components, including authentication, authorization, and auditing, and examines the challenges and best practices associated with implementing these systems. Additionally, emerging trends such as Zero Trust Architecture, AI driven identity management, and the impact of cloud computing on IAM are discussed to offer insights into the future trajectory of these technologies. This review examines existing literature to highlight essential factors organizations must address when implementing IAM systems, stressing the importance of developing solutions that are robust, scalable, and adaptable to meet changing cyber threats and regulatory demands.