
Identity and access management (IAM) systems have evolved over the years with different degrees of adoption and use. Use of password and username remains one of the IAM systems being used by many firms across developing economies. However, it has emerged that such an approach has its own hassles and business implications. Among the several IAM technologies that can be implemented, SSO is gaining more market share due to its simplicity and robustness in securing cloud users especially against unauthorised access. Furthermore, it improves efficiency by allowing users to use the same credentials to log-on to multiple services. Enterprises prefer log-on systems than are more secure but delivering parsimony. This paper then provides some background on the development of IAM systems and the emergence of SSO before articulating on the reviewing on related work conducted by other researchers across the globe. The review of literature is aimed at priming the current study and giving insights into the possibilities of deploying SSO at New Generation Tech.
Accountability; Availability; Authentication; Authorisation.
Accountability; Availability; Authentication; Authorisation.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
