SlideShare a Scribd company logo
Building an Effective Architecture for
Identity and Access Management
JorgeAlvarez
alvarez.jeap@gmail.com
GitHub: @jealvarez
Twitter: @edlask8
Disclaimer
The point of views, thoughts and opinions
expressed in this presentation belongs only to
the presenter and not necessarily to the
presenter’s employer, organization, committee
or other group or individual.
About Me
Agenda
• Challenges
• Keycloak Overview
• Why shouldI use Keycloak?
• CoreConcepts
• TechnologyStack
• Server Architecture
• Single Sign-on/ Single Logout
• Tokens
• Calling Backing Services
• Supported Platforms
• Demo
• Summary
• Bibliography
Challenges
Building an Effective Architecture for Identity and Access Management.pdf
The old way
• Securing monolithic web application
relatively easy
• Username and Password
• Credentials verified against table in
database
• HTTP Session stores in security
context
User Interface
Logic
Data
The new way
• Multiple applications
• Multiple variants of each application
• Multiple services
• Multiple logins
• Multiple databases
• Multiple devices
[AuthZ] [AuthN]
Building an Effective Architecture for Identity and Access Management.pdf
Building an Effective Architecture for Identity and Access Management.pdf
Building an Effective Architecture for Identity and Access Management.pdf
Are you lookingfor a single
sign-on solutionthatenables
you to secure newor legacy
applicationsandeasilyuse
federatedidentityproviders
such as socialnetworks?
You should look at
Keycloak
Keycloak
Overview
Building an Effective Architecture for Identity and Access Management.pdf
Project
• Java based AuthN and AuthZ server
• Started in 2013
• Current Version 11.0.3
• ~ Every 5 weeks
• Commercial Offering Available
• Red Hat SSO
• Have you logged into
developers.redhat.com or
www.openshift.com?
• Community
• 400+ Contributors
• Very robust, good documentation, many
examples
Why should I use
Keycloak?
Features (1/3)
• Support multiple database engines
Adaptability
• Social networking logins
• Federation
• LDAP
• Active Directory
• Adapters for different frameworks
• Spring
• NodeJS
• NetCore
• …
Integration
Features (2/3)
• Clustering
Scalability
• Keycloak Service Provider Interface
• Enables to implement your own authenticatoror federator
Extensibility
• Session management
• Force logouts
• Determine how many sessions your system currently has
Centralization
Features
Features (3/3)
Core Concepts
Core Concepts
Realm
Identity
Provider
User
Federation
Themes
Roles
Clients
User
Groups
Facebook
Google
…
OpenID
Connect
SAML
LDAP
Kerberos
Authentication
Client
Scopes
Sessions
Events
Active
Directory
Technology Stack
Technology Stack
Admin Console
❖ AngularJS
❖ React
❖ PatternFly
❖ Bootstrap
Keycloak Server
❖ WildFly
❖ JPA
❖ RestEasy
❖ Freemarker
❖ Arquillian
❖ Infinispan
Server
Architecture
Overview
Keycloak
2
Keycloak1
SSO Protocols
Protocol Mapper
Infinispan
Events
Social
Login
User Storage
JPA
User
Federation
Realm
Clients, Users, AuthN,
AuthZ, Policies, …
Account
Login
Identity
Brokering
Sessions
Realms
Settings
…
Replication
Infinispan
HTTP
Endpoint
Single Sign-on
How it works?
Single Sign-on
• Login only once to access all
applications
SSO
• OpenID Connect
• Build on top of OAuth2
Standardized Protocols
• Logouts can be propagated to
applications
Support for Single Logout
Tokens are associatedwith a session
Unauthenticated User
Unauthenticated user accesses to Application
1
Application redirectsto Keycloak
2
User submits credentials
2.1
Credentials
2.2
Keycloak creates SSO Session and
Emits Cookies
Generates Code and redirects the user back to
the Application
3
Application exchangesCode to Tokens
4
Application verifies receivedTokens
5
User is signed-in to the application
6
1
2.2
2.1
5
3
2
4
6
Generates Code
Keycloak detects SSO Session
9
Authenticated User
…
Authenticateduse accesses other application
7
Other application redirects user to Keycloak to
sign-in
8
Other application exchangescode for tokens
10
Other application verifies receivedtokens
11
7
11
9
8
10
12
Redirectsto other application
Tokens are associatedwith a session
User is signed-in to the other application
12
Keycloak creates logout request to another
application
3
Single Logout
User initiates logout
1
Application creates logoutrequest to Keycloak
2
Keycloak terminates session
4
2
4
1
Application returns response logout to
Keycloak
3.1
Applicationsdo logout
5
2.1
3.1
3
5
5
Keycloak returns response logout to the
application
2.1
Tokens
Overview
Essential Token Types
• Access Token
• Short lived [Minutes+]
• Used for accessingresources
• RefreshToken
• Long lived [Hours+]
• Used for requestingnew tokens
• ID Token
• Containsuser information(OIDC)
• Offline Token
• Long lived [Days+]
• Refreshtoken that never expires
Keycloak Tokens
• OAuth2 / OpenID Connect
• Signed self-contained JWT
• Claims
• Key-Value Pairs + User Information +
Metadata
• Issued by Keycloak
• Signed with Realm Private Key
• Verified with Realm
• Realm Public Key
• Limited lifespan
• Can be revoked
JSON Web Tokens
<header-base64>. <payload-base64>. <signature-base64>
Note
Base64 means Encoding
Encoding != Encryption
Calling Backend
Services
The backend looks up the Realm Public Key in
cache with the kid from the JWT
3
Calling Backend Services
Authenticateduse accesses to the application
1
Application uses the access token in the http
header to access to the backend
2
The backend verifies signature of the access
token with the Realm Public Key
4
2
4
1
The backend grants access and returns data
5
If not found, then fetch Public Key with
kid from Keycloak
3.1
Keycloak returnsRealm Public Key
3.2
The applicationcan displaythe data
6
Authorization:Bearer
eyJhbGciOiJSUzI1NiIsInR5cCIg…
5
3
3.1
3.2
6
kid
public key
access
token
data
User can access to the data
7
7
Supported
Platforms
Building an Effective Architecture for Identity and Access Management.pdf
Building an Effective Architecture for Identity and Access Management.pdf
Building an Effective Architecture for Identity and Access Management.pdf
RESTAPI
Bearer
Frontend
Confidential
Frontend
Public
Frontend
Confidential
Authorization:Bearer
eyJhbGciOiJSUzI1NiIsInR5cCIg…
Single Sign-on
System’s Architecture
Authorization:Bearer
eyJhbGcizI1NiIsInOiJSUR5cCIg…
Summary
Summary (1/2)
• Unzip and Run
• Docker Images
So easy to get started with
• Single Sign-on
• Single Logout
• Federation
• User Management
• Social Logins
• …
Provides many features out of the box
Summary (2/2)
Build on proven a robust standards
• OAuth 2.0
• OpenID Connect 1.0
• SAML2.0
Extensible
• Custom
• Authenticationmechanisms
• Event Listeners
• Themes
• …
Easy to integrate
• Adapters available for different frameworks
…
Bibliography
Useful links
Keycloak
Website
Keycloak
Community
Extensions
Keycloak
Docker Images
Keycloak
Quickstart
Projects
OpenID
Connect
SAML
JSON Web
Tokens
Email: alvarez.jeap@gmail.com
Github: @jealvarez
Twitter: @edlask8
Ad

More Related Content

Similar to Building an Effective Architecture for Identity and Access Management.pdf (20)

Keycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler WebinarKeycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
marcuschristie
 
Self-Service x Hashicorp Vault
Self-Service x Hashicorp VaultSelf-Service x Hashicorp Vault
Self-Service x Hashicorp Vault
Martin Conraux
 
SSL Everywhere!
SSL Everywhere!SSL Everywhere!
SSL Everywhere!
Simon Haslam
 
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptxTALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
dosoro7306
 
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptxTALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
dosoro7306
 
Introduction to sitecore identity
Introduction to sitecore identityIntroduction to sitecore identity
Introduction to sitecore identity
Gopikrishna Gujjula
 
Adding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your AppAdding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your App
FIWARE
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
Taswar Bhatti
 
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Lucas Jellema
 
Web API 2 Token Based Authentication
Web API 2 Token Based AuthenticationWeb API 2 Token Based Authentication
Web API 2 Token Based Authentication
jeremysbrown
 
SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
Liam Cleary [MVP]
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
Steve Martinelli
 
Intro to Apache Shiro
Intro to Apache ShiroIntro to Apache Shiro
Intro to Apache Shiro
Claire Hunsaker
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
Álvaro Alonso González
 
WebLogic authentication debugging
WebLogic authentication debuggingWebLogic authentication debugging
WebLogic authentication debugging
Maarten Smeets
 
Shifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environmentsShifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environments
LibbySchulze
 
Securing Microservices using Play and Akka HTTP
Securing Microservices using Play and Akka HTTPSecuring Microservices using Play and Akka HTTP
Securing Microservices using Play and Akka HTTP
Rafal Gancarz
 
Securing .NET Core, ASP.NET Core applications
Securing .NET Core, ASP.NET Core applicationsSecuring .NET Core, ASP.NET Core applications
Securing .NET Core, ASP.NET Core applications
NETUserGroupBern
 
FIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
FIWARE
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
ForgeRock
 
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler WebinarKeycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
marcuschristie
 
Self-Service x Hashicorp Vault
Self-Service x Hashicorp VaultSelf-Service x Hashicorp Vault
Self-Service x Hashicorp Vault
Martin Conraux
 
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptxTALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
dosoro7306
 
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptxTALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
dosoro7306
 
Introduction to sitecore identity
Introduction to sitecore identityIntroduction to sitecore identity
Introduction to sitecore identity
Gopikrishna Gujjula
 
Adding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your AppAdding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your App
FIWARE
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
Taswar Bhatti
 
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Lucas Jellema
 
Web API 2 Token Based Authentication
Web API 2 Token Based AuthenticationWeb API 2 Token Based Authentication
Web API 2 Token Based Authentication
jeremysbrown
 
SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
Liam Cleary [MVP]
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
Steve Martinelli
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
Álvaro Alonso González
 
WebLogic authentication debugging
WebLogic authentication debuggingWebLogic authentication debugging
WebLogic authentication debugging
Maarten Smeets
 
Shifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environmentsShifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environments
LibbySchulze
 
Securing Microservices using Play and Akka HTTP
Securing Microservices using Play and Akka HTTPSecuring Microservices using Play and Akka HTTP
Securing Microservices using Play and Akka HTTP
Rafal Gancarz
 
Securing .NET Core, ASP.NET Core applications
Securing .NET Core, ASP.NET Core applicationsSecuring .NET Core, ASP.NET Core applications
Securing .NET Core, ASP.NET Core applications
NETUserGroupBern
 
FIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
FIWARE
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
ForgeRock
 

Recently uploaded (20)

fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Ad

Building an Effective Architecture for Identity and Access Management.pdf