1 |
Identity access managementEncapsulates people, processes and products to identify and manage the data used in an information system to authenticate users and grant or deny access rights to data and system resources. The goal o [..]
|
<< Hypertext Transfer Protocol | Idle standby >> |