Access Management Mobile Security in the Context of IAM How does it starts? Protecting access tokens on mobile devices is critical