Identity and Access Management includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on the protected resource, this assured identity, and other context information.
This presentation will focus only the identity management services in three levels. The first is a high-level overview of Identity Management as it is applied to Cloud Computing development and implementation. The second is the considerations and concerns that should be part of the decision making. And the last is a technical discussion of the architecture and implementation will be made.