{"id":17057,"date":"2021-09-16T12:04:30","date_gmt":"2021-09-16T06:34:30","guid":{"rendered":"https:\/\/www.varutra.com\/?p=17057"},"modified":"2022-12-02T12:13:27","modified_gmt":"2022-12-02T06:43:27","slug":"guide-to-identity-access-management-iam","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/","title":{"rendered":"Guide to Identity &#038; Access Management (IAM)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Guide to Identity amp Access Management IAM 1 - Varutra Consulting\"><\/p>\n<h3><strong>Introduction to Identity and Access Management<\/strong><\/h3>\n<p>Identity and Access Management (IAM) defines user identities and permissions. It encompasses the provisioning and de-provisioning of identities, securing and individual authentication, and the authorization to access resources and perform specific actions. Its core objective is to develop one digital identity per individual or item.<\/p>\n<h3><\/h3>\n<h3><strong>How does the system work?<\/strong><\/h3>\n<p>These systems are designed to perform three essential tasks:<\/p>\n<ul>\n<li>Identify<\/li>\n<li>Authenticate<\/li>\n<li>Authorize<\/li>\n<\/ul>\n<p>It means that only the right person has access to the organization\u2019s assets and environment.<\/p>\n<p><strong>Core Components to develop a robust system:<\/strong><\/p>\n<ul>\n<li>A database user identifies and access rights<\/li>\n<li>Helps to create, monitor, modify and delete access privileges<\/li>\n<li>A method for auditing logins and access histories.<\/li>\n<\/ul>\n<p><strong>The two essential tasks:<\/strong><\/p>\n<ul>\n<li>Confirms the identity of the users by authenticating their credentials against the database.<\/li>\n<li>It grants an appropriate level of access rather than providing access to the entire system, which traditionally happens with a username and password.<\/li>\n<\/ul>\n<h3><\/h3>\n<h3><strong>Technologies supported by Identity and Access Management systems<\/strong><\/h3>\n<ul>\n<li><strong>Role-based access:<\/strong> Most of the IAM systems apply \u2018role-based access control\u2019. This approach uses the pre-define job roles with specific sets of access privileges. If there is any change in the position of an existing user or there is a new employee, then it impacts the user&#8217;s rights directly.<\/li>\n<li><strong>Single Sign-On (SSO):<\/strong> It\u2019s a login mechanism where the users have to authenticate themselves once. Then, they are given access to all the data, applications and systems, they require without logging into those individually.<\/li>\n<li><strong><a href=\"https:\/\/www.varutra.com\/varutrapreprod\/best-practices-to-harden-office-365\/\">Multi-Factor Authentication (MFA)<\/a>:<\/strong> This mechanism uses a combination like a credential (e.g., password), a user token, or something that only the user uses, like a fingerprint, to provide authentication of other individuals and grant them access.<\/li>\n<li><strong>Privileged Access Management:<\/strong> This procedure integrates with the employee database and pre-defined job roles to establish and provide employees with access to perform their functions.<\/li>\n<\/ul>\n<h3><\/h3>\n<h3><strong>Identity and Access Management System\u2019s Benefits:<\/strong><\/h3>\n<ul>\n<li><strong>Improved Security:<\/strong> These systems help to identify and mitigate security risks. It is done to identify policy violations or remove access rights from the employees without searching through multiple systems. It also ensures appropriate security measures are in place to meet the regulatory and audit requirements.<\/li>\n<li><strong>Information sharing:<\/strong> It is a common platform for sharing all the information regarding identity management. It allows the organizations to apply the same security policies across all the operating platforms and devices used by the organization. In addition, it helps you enforce user authentication, privileges, and validation policies and attend to \u201cprivilege creep\u201d.<\/li>\n<li><strong>Easy to use:<\/strong> It simplifies login and user management processes for system administrators and application owners. These systems promote user satisfaction as they are easily manageable and simple to work on.<\/li>\n<li><strong>Productivity gains:<\/strong> This system improves the processing time for accessing and reduces the errors, thus creating an automated workflow for any new changes in the role, like identity changes.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>While these system implementations will start by auditing an organization\u2019s needs (defining roles, access requirements, etc.) and creating a policy, many different Identity and Access Management solutions can help you execute these programs. Any system you select should meet the use cases for your environment.<\/p>\n<p>&nbsp;<\/p>\n<p>Also, prioritize identity management and IAM administration tools, as they simplify those highly automated workflows. Check that they seamlessly integrate with other systems and security technologies. This way, you can improve your business operations and close the security gaps of your working environment.<\/p>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><strong>Sobiya Munshi,<\/strong><\/p>\n<p>Associate Security Consultant<\/p>\n<p>Audit and Compliance Team,<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction to Identity and Access Management Identity and Access Management (IAM) defines user identities and permissions. It encompasses the provisioning and de-provisioning of identities, securing&#8230;<\/p>\n","protected":false},"author":4,"featured_media":17061,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[259,274],"tags":[502,503,501,504,506,505],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Guide to Identity and Access Management (IAM)\" \/>\n\t\t<meta property=\"og:description\" content=\"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t\t<meta property=\"article:section\" content=\"Authentication &amp; Authorization\" \/>\n\t\t<meta property=\"article:tag\" content=\"authetication\" \/>\n\t\t<meta property=\"article:tag\" content=\"authorization\" \/>\n\t\t<meta property=\"article:tag\" content=\"iam\" \/>\n\t\t<meta property=\"article:tag\" content=\"identitymanagement\" \/>\n\t\t<meta property=\"article:tag\" content=\"mfa\" \/>\n\t\t<meta property=\"article:tag\" content=\"pam\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-09-16T06:34:30+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T06:43:27+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Guide to Identity and Access Management (IAM)\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#article\",\"name\":\"Guide to Identity and Access Management (IAM)\",\"headline\":\"Guide to Identity &#038; Access Management (IAM)\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Guide-to-Identity-Access-Management-IAM-1.png\",\"width\":1200,\"height\":627,\"caption\":\"Guide to Identity &amp; Access Management (IAM)\"},\"datePublished\":\"2021-09-16T12:04:30+05:30\",\"dateModified\":\"2022-12-02T12:13:27+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#webpage\"},\"articleSection\":\"Authentication &amp; Authorization, Security Hardening, authetication, authorization, IAM, identitymanagement, MFA, PAM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#listItem\",\"position\":2,\"name\":\"Guide to Identity & Access Management (IAM)\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/\",\"name\":\"Guide to Identity and Access Management (IAM)\",\"description\":\"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Guide-to-Identity-Access-Management-IAM-1.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"Guide to Identity &amp; Access Management (IAM)\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/guide-to-identity-access-management-iam\\\/#mainImage\"},\"datePublished\":\"2021-09-16T12:04:30+05:30\",\"dateModified\":\"2022-12-02T12:13:27+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Guide to Identity and Access Management (IAM)<\/title>\n\n","aioseo_head_json":{"title":"Guide to Identity and Access Management (IAM)","description":"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Guide to Identity and Access Management (IAM)","og:description":"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png","og:image:width":"1200","og:image:height":"627","article:section":"Authentication &amp; Authorization","article:tag":["authetication","authorization","iam","identitymanagement","mfa","pam"],"article:published_time":"2021-09-16T06:34:30+00:00","article:modified_time":"2022-12-02T06:43:27+00:00","twitter:card":"summary_large_image","twitter:title":"Guide to Identity and Access Management (IAM)","twitter:description":"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"3 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#article","name":"Guide to Identity and Access Management (IAM)","headline":"Guide to Identity &#038; Access Management (IAM)","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png","width":1200,"height":627,"caption":"Guide to Identity &amp; Access Management (IAM)"},"datePublished":"2021-09-16T12:04:30+05:30","dateModified":"2022-12-02T12:13:27+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#webpage"},"articleSection":"Authentication &amp; Authorization, Security Hardening, authetication, authorization, IAM, identitymanagement, MFA, PAM"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#listItem","position":2,"name":"Guide to Identity & Access Management (IAM)","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/","name":"Guide to Identity and Access Management (IAM)","description":"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#mainImage","width":1200,"height":627,"caption":"Guide to Identity &amp; Access Management (IAM)"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/#mainImage"},"datePublished":"2021-09-16T12:04:30+05:30","dateModified":"2022-12-02T12:13:27+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"17057","title":"Guide to Identity and Access Management (IAM)","description":"The role of Identity and Access Management (IAM) is to make sure that the right employee gets access to the tools to complete a job in an organization.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Identity and Access Management\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":4},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase not found in the URL.\",\"score\":1,\"maxScore\":5,\"error\":1},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase not found in image alt attribute(s). Add an image with your Focus keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}},\"score\":73},\"additional\":[{\"keyphrase\":\" Access Management\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"IAM\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/09\/Guide-to-Identity-Access-Management-IAM-1.png","og_image_width":"1200","og_image_height":"627","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Authentication &amp; Authorization","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:10:53","updated":"2022-12-02 06:51:20"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/authentication-authorization\/\" title=\"Authentication &amp; Authorization\">Authentication &amp; Authorization<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tGuide to Identity &amp; Access Management (IAM)\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Authentication &amp; Authorization","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/authentication-authorization\/"},{"label":"Guide to Identity &#038; Access Management (IAM)","link":"https:\/\/www.varutra.com\/varutravrt3\/guide-to-identity-access-management-iam\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17057"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=17057"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17057\/revisions"}],"predecessor-version":[{"id":20267,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17057\/revisions\/20267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/17061"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=17057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=17057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=17057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}