The real use-cases - IAM, Security & Architecture
Sign in Subscribe

Access Management

Mobile Security in the Context of IAM
Access Management

Mobile Security in the Context of IAM

How does it starts? Protecting access tokens on mobile devices is critical
Read More
Sayed M
Identity and its Schema
Access Management

Identity and its Schema

An Identity in this system acts as a central point for managing
Read More
Sayed M
Overarching IAM Architecture
Access Management

Overarching IAM Architecture

Read More
Sayed M
AM Technology Operating Model
Access Management

AM Technology Operating Model

Read More
Sayed M
Various OIDC Grants
Access Management

Various OIDC Grants

Read More
Sayed M
IAM/Okta Interview Questions
Access Management

IAM/Okta Interview Questions

Read More
Sayed M
What is PasswordLess Authentication?
Access Management

What is PasswordLess Authentication?

Read More
Sayed M
Types of Application - Confidential vs Public Clients
IAM

Types of Application - Confidential vs Public Clients

I have asked this question multiple times during Interviews : What are the
Read More
Sayed M
IAM Skill Roadmap
IAM

IAM Skill Roadmap

"Everyone is welcome in IAM", don't get overwhelm
Read More
Sayed M
What is Entitlement ?
Authorization

What is Entitlement ?

Entitlements refer to the specific permissions or rights granted to users or
Read More
Sayed M
Authentication in the context of Digital Identity
Access Management

Authentication in the context of Digital Identity

Types of Authentication: Here's a breakdown of the different authentication
Read More
Sayed M
The real use-cases - IAM, Security & Architecture © 2025
  • Sign up
Powered by Ghost