The real use-cases - IAM, Security & Architecture
  • Home
  • About
Sign in Subscribe

IAM

Overarching IAM Architecture
Access Management

Overarching IAM Architecture

Read More
Sayed M
Building an Extensive IAM Architecure
Architecture Design

Building an Extensive IAM Architecure

Understanding IAM Architecture Features as an IAM Architect An IAM architect requires
Read More
Sayed M
IAM Architect 101 Series
IAM

IAM Architect 101 Series

Understanding the Architectural Journey Becoming an IAM Architect involves more than just
Read More
Sayed M
Understanding AM vs IGA Features
IGA

Understanding AM vs IGA Features

Read More
Sayed M
IGA Capabilities
IGA

IGA Capabilities

Read More
Sayed M
AD > Azure AD > Entra ID > ..and then to the write-back
IAM

AD > Azure AD > Entra ID > ..and then to the write-back

Read More
Sayed M
Automate Permission Management via IGA Tools ( SailPoint, Saviynt )
IAM

Automate Permission Management via IGA Tools ( SailPoint, Saviynt )

Let's dive into entitlement management in a business context and
Read More
Sayed M
Learning SailPoint IIQ
IAM

Learning SailPoint IIQ

SailPoint is a leading IAM solution that helps organizations manage user identities,
Read More
Sayed M
SailPoint IdentityNow Learning Series - 1
IdentityNow

SailPoint IdentityNow Learning Series - 1

Read More
Sayed M
AWS IAM 101
IAM

AWS IAM 101

Read More
Sayed M
What is PasswordLess Authentication?
Access Management

What is PasswordLess Authentication?

Read More
Sayed M
Types of Application - Confidential vs Public Clients
IAM

Types of Application - Confidential vs Public Clients

I have asked this question multiple times during Interviews : What are the
Read More
Sayed M
The real use-cases - IAM, Security & Architecture © 2025
  • Sign up
Powered by Ghost