Identity and Access Management Our customers trust us with some of their most sensitive data, but with thousands of systems and employees around the globe, we've never been systematic about access control. We want to give employees exactly the right set of privileges they need to do their work.
Welcome! You have been appointed the technical lead of a project to build an identity and access management (IAM) system. At a high level, the components are:
• A way of storing access policies (who can do what); • An API to query these access policies; and • An APl to manage these access policies.
Examples of requests that the system should serve