Effective Strategies for Implementing IAM Solutions
From Chapter 2, Securing Compute Services – Virtual Machines to Chapter 8, Securing Generative AI Services, we covered the fundamental building blocks of cloud services (from compute, storage, and networking to generative AI services). However, we cannot talk about cloud services without also discussing identity management.
In this chapter, we will cover various concepts of identity management – from traditional directory services for hybrid environments (based on the Kerberos protocol in the Microsoft environment) to modern cloud-based directory services (based on the SAML or OAuth protocols).
In this chapter, we will cover the following topics:
- Introduction to IAM
- Securing cloud-based IAM services
- Securing directory services