Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/9874
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gupta, Mayank | - |
dc.date.accessioned | 2023-09-07T10:33:49Z | - |
dc.date.available | 2023-09-07T10:33:49Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/9874 | - |
dc.description | Enrolment No. 191438 | en_US |
dc.description.abstract | Identity and Access Management (IAM) is a known security discipline that enables the right entities (people or things) to access the right resources (applications or data) they need, using their preferred devices, without interference. IAM consists of systems and processes that allow IT administrators to assign a single digital identity to each entity, authenticate them after they log in, authorize them to get the right of entry to designated resources and display and manipulate the identities at some point in their lifecycle. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Database management system | en_US |
dc.subject | Google cloud | en_US |
dc.subject | Amazon web services | en_US |
dc.subject | Quality assurance | en_US |
dc.title | Deployment of Identity and Access Management Solutions (IAM) using DevOps Environment | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Deployment of Identity and Access Management Solutions (IAM) using DevOps Environment.pdf | 2.53 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.