Identity Management

This collection covers various aspects of identity and access management (IAM), particularly in cloud environments. Key themes include user-centric privacy controls, transition to passwordless authentication, and the evolution of IAM systems. Documents discuss the importance of compliance, security enhancements, and innovative practices like decentralized identities and advanced multi-factor authentication. Topics also address operational efficiency, privileged access management, and integration with contemporary technologies to streamline user management and improve security across organizational systems.

International Journal of Security, Privacy and Trust Management ( IJSPTM )
 
apidays Paris 2025 | API Layer7 Security: Real-World Use Cases (BBVA & Nexi)
 
Problems with RADIUS Accounting - Blair Bullock & Ryan Blossom - RADIUS Conference
RADIUS in Action - Karri Huhtanen - RADIUS Conference
Building Zero Trust Networks with RADIUS - Howie Koh - RADIUS Conference
The Story of Eduroam - Klaas Wierenga - RADIUS Conference
WBA and RADIUS - Bruno Tomas - RADIUS Conference
Eduroam, RADIUS, and RENU - Brenda Namuli
Protecting RADIUS Login with IP Shielding - Ulf Schuberth
RADIUS - Past, Present, And Future - RADIUS Conference
INFORMATION SECURITY (SECURITY IN EVOLVING TECHNOLOGY)02
DigitalIdentityPresentationKiranThakkar.pptx
The 8 Best Single Sign-On Tools Every Business Needs in 2025
InfoSec Professionals Roles & Responsibilities
OpenID AuthZEN Overview - Gartner IAM 25
Access Control 2025: From Security Silo to Software-Defined Ecosystem
 
6th International Conference on Cloud Computing, Security and Blockchain (CLSB 2025)
Customer Identity and Access Management (CIAM).pdf
IoT Identity and Access Management: A Growing Market Opportunity
apidays Helsinki & North 2025 - APIs at Scale: Designing for Alignment, Trust, and Intelligence, Michael Jackson (Loihde)