{"id":26,"date":"2025-06-24T08:37:57","date_gmt":"2025-06-24T08:37:57","guid":{"rendered":"https:\/\/tham098.thamtuuytin.org\/?p=26"},"modified":"2025-06-24T08:37:57","modified_gmt":"2025-06-24T08:37:57","slug":"identity-and-access-management-iam-solutions-controlling-who-gets-in-and-what-they-can-do","status":"publish","type":"post","link":"https:\/\/tham098.thamtuuytin.org\/?p=26","title":{"rendered":"Identity and Access Management (IAM) Solutions: Controlling Who Gets In, and What They Can Do"},"content":{"rendered":"<p data-start=\"346\" data-end=\"405\">In the digital age, <strong data-start=\"366\" data-end=\"404\">your identity is the new perimeter<\/strong>.<\/p>\n<p data-start=\"407\" data-end=\"582\">Whether it\u2019s employees accessing internal apps, third-party vendors connecting to systems, or customers using your services \u2014 the <strong data-start=\"537\" data-end=\"581\">first line of defense is always identity<\/strong>.<\/p>\n<p data-start=\"584\" data-end=\"664\">That\u2019s why <strong data-start=\"595\" data-end=\"635\">Identity and Access Management (IAM)<\/strong> solutions are now essential.<\/p>\n<hr data-start=\"666\" data-end=\"669\" \/>\n<h2 data-start=\"671\" data-end=\"719\">What Is Identity and Access Management (IAM)?<\/h2>\n<p data-start=\"721\" data-end=\"876\"><strong data-start=\"721\" data-end=\"728\">IAM<\/strong> refers to a framework of technologies and policies that ensure the <strong data-start=\"796\" data-end=\"875\">right people have the right access to the right resources at the right time<\/strong>.<\/p>\n<p data-start=\"878\" data-end=\"1048\">It includes authentication, authorization, role and policy management, and governance. In 2025, IAM is the backbone of <strong data-start=\"997\" data-end=\"1011\">Zero Trust<\/strong> and <strong data-start=\"1016\" data-end=\"1036\">compliance-first<\/strong> strategies.<\/p>\n<hr data-start=\"1050\" data-end=\"1053\" \/>\n<h2 data-start=\"1055\" data-end=\"1081\">Why IAM Matters in 2025<\/h2>\n<ul data-start=\"1083\" data-end=\"1375\">\n<li data-start=\"1083\" data-end=\"1147\">\n<p data-start=\"1085\" data-end=\"1147\"><strong data-start=\"1085\" data-end=\"1100\">Hybrid work<\/strong> has broken the traditional network perimeter<\/p>\n<\/li>\n<li data-start=\"1148\" data-end=\"1196\">\n<p data-start=\"1150\" data-end=\"1196\"><strong data-start=\"1150\" data-end=\"1164\">Cloud apps<\/strong> require identity-aware access<\/p>\n<\/li>\n<li data-start=\"1197\" data-end=\"1251\">\n<p data-start=\"1199\" data-end=\"1251\"><strong data-start=\"1199\" data-end=\"1220\">Third-party risks<\/strong> are a growing threat surface<\/p>\n<\/li>\n<li data-start=\"1252\" data-end=\"1317\">\n<p data-start=\"1254\" data-end=\"1317\"><strong data-start=\"1254\" data-end=\"1269\">Regulations<\/strong> demand strict access control and auditability<\/p>\n<\/li>\n<li data-start=\"1318\" data-end=\"1375\">\n<p data-start=\"1320\" data-end=\"1375\"><strong data-start=\"1320\" data-end=\"1336\">Cyberattacks<\/strong> often start with credential compromise<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1377\" data-end=\"1494\">IAM empowers organizations to <strong data-start=\"1407\" data-end=\"1434\">enforce least privilege<\/strong>, <strong data-start=\"1436\" data-end=\"1456\">audit all access<\/strong>, and <strong data-start=\"1462\" data-end=\"1493\">stop identity-based threats<\/strong>.<\/p>\n<hr data-start=\"1496\" data-end=\"1499\" \/>\n<h2 data-start=\"1501\" data-end=\"1535\">Core Functions of IAM Solutions<\/h2>\n<ol data-start=\"1537\" data-end=\"2043\">\n<li data-start=\"1537\" data-end=\"1621\">\n<p data-start=\"1540\" data-end=\"1621\"><strong data-start=\"1540\" data-end=\"1558\">Authentication<\/strong> \u2013 Verifying user identity (e.g., passwords, biometrics, MFA)<\/p>\n<\/li>\n<li data-start=\"1622\" data-end=\"1689\">\n<p data-start=\"1625\" data-end=\"1689\"><strong data-start=\"1625\" data-end=\"1642\">Authorization<\/strong> \u2013 Granting access based on roles or policies<\/p>\n<\/li>\n<li data-start=\"1690\" data-end=\"1749\">\n<p data-start=\"1693\" data-end=\"1749\"><strong data-start=\"1693\" data-end=\"1717\">SSO (Single Sign-On)<\/strong> \u2013 One login for multiple apps<\/p>\n<\/li>\n<li data-start=\"1750\" data-end=\"1827\">\n<p data-start=\"1753\" data-end=\"1827\"><strong data-start=\"1753\" data-end=\"1790\">MFA (Multi-Factor Authentication)<\/strong> \u2013 Additional identity verification<\/p>\n<\/li>\n<li data-start=\"1828\" data-end=\"1905\">\n<p data-start=\"1831\" data-end=\"1905\"><strong data-start=\"1831\" data-end=\"1860\">User Lifecycle Management<\/strong> \u2013 Automating joiner\/mover\/leaver processes<\/p>\n<\/li>\n<li data-start=\"1906\" data-end=\"1971\">\n<p data-start=\"1909\" data-end=\"1971\"><strong data-start=\"1909\" data-end=\"1930\">Access Governance<\/strong> \u2013 Reviewing and certifying user rights<\/p>\n<\/li>\n<li data-start=\"1972\" data-end=\"2043\">\n<p data-start=\"1975\" data-end=\"2043\"><strong data-start=\"1975\" data-end=\"2004\">Audit Logging &amp; Reporting<\/strong> \u2013 For compliance and incident response<\/p>\n<\/li>\n<\/ol>\n<p data-start=\"2045\" data-end=\"2149\">Modern IAM systems may also include <strong data-start=\"2081\" data-end=\"2100\">adaptive access<\/strong>, <strong data-start=\"2102\" data-end=\"2118\">risk scoring<\/strong>, and <strong data-start=\"2124\" data-end=\"2148\">device trust signals<\/strong>.<\/p>\n<hr data-start=\"2151\" data-end=\"2154\" \/>\n<h2 data-start=\"2156\" data-end=\"2183\">Types of IAM Deployments<\/h2>\n<div class=\"_tableContainer_16hzy_1\">\n<div class=\"_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"2185\" data-end=\"2844\">\n<thead data-start=\"2185\" data-end=\"2294\">\n<tr data-start=\"2185\" data-end=\"2294\">\n<th data-start=\"2185\" data-end=\"2205\" data-col-size=\"sm\">Type<\/th>\n<th data-start=\"2205\" data-end=\"2261\" data-col-size=\"md\">Description<\/th>\n<th data-start=\"2261\" data-end=\"2294\" data-col-size=\"sm\">Best For<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"2405\" data-end=\"2844\">\n<tr data-start=\"2405\" data-end=\"2514\">\n<td data-start=\"2405\" data-end=\"2425\" data-col-size=\"sm\"><strong data-start=\"2407\" data-end=\"2422\">On-Prem IAM<\/strong><\/td>\n<td data-start=\"2425\" data-end=\"2481\" data-col-size=\"md\">Legacy systems integrated with Active Directory<\/td>\n<td data-start=\"2481\" data-end=\"2514\" data-col-size=\"sm\">Enterprises with data centers<\/td>\n<\/tr>\n<tr data-start=\"2515\" data-end=\"2624\">\n<td data-start=\"2515\" data-end=\"2535\" data-col-size=\"sm\"><strong data-start=\"2517\" data-end=\"2530\">Cloud IAM<\/strong><\/td>\n<td data-start=\"2535\" data-end=\"2591\" data-col-size=\"md\">SaaS-based platforms like Okta, Azure AD, Ping<\/td>\n<td data-start=\"2591\" data-end=\"2624\" data-col-size=\"sm\">Modern, cloud-first companies<\/td>\n<\/tr>\n<tr data-start=\"2625\" data-end=\"2734\">\n<td data-start=\"2625\" data-end=\"2651\" data-col-size=\"sm\"><strong data-start=\"2627\" data-end=\"2650\">Consumer IAM (CIAM)<\/strong><\/td>\n<td data-start=\"2651\" data-end=\"2701\" data-col-size=\"md\">IAM for customer-facing apps<\/td>\n<td data-start=\"2701\" data-end=\"2734\" data-col-size=\"sm\">B2C platforms, mobile apps<\/td>\n<\/tr>\n<tr data-start=\"2735\" data-end=\"2844\">\n<td data-start=\"2735\" data-end=\"2755\" data-col-size=\"sm\"><strong data-start=\"2737\" data-end=\"2751\">Hybrid IAM<\/strong><\/td>\n<td data-start=\"2755\" data-end=\"2811\" data-col-size=\"md\">Combines cloud + on-prem for flexibility<\/td>\n<td data-start=\"2811\" data-end=\"2844\" data-col-size=\"sm\">Large or transitioning orgs<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"sticky end-(--thread-content-margin) h-0 self-end select-none\">\n<div class=\"absolute end-0 flex items-end\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr data-start=\"2846\" data-end=\"2849\" \/>\n<h2 data-start=\"2851\" data-end=\"2883\">Leading IAM Solutions in 2025<\/h2>\n<h3 data-start=\"2885\" data-end=\"2915\">1. <strong data-start=\"2892\" data-end=\"2915\">Okta Identity Cloud<\/strong><\/h3>\n<p data-start=\"2917\" data-end=\"2991\">One of the most popular identity platforms for workforce and customer IAM.<\/p>\n<ul data-start=\"2993\" data-end=\"3249\">\n<li data-start=\"2993\" data-end=\"3048\">\n<p data-start=\"2995\" data-end=\"3048\"><strong data-start=\"2995\" data-end=\"3007\">Best for<\/strong>: Cloud-native and hybrid organizations<\/p>\n<\/li>\n<li data-start=\"3049\" data-end=\"3249\">\n<p data-start=\"3051\" data-end=\"3068\"><strong data-start=\"3051\" data-end=\"3065\">Highlights<\/strong>:<\/p>\n<ul data-start=\"3071\" data-end=\"3249\">\n<li data-start=\"3071\" data-end=\"3109\">\n<p data-start=\"3073\" data-end=\"3109\">SSO, MFA, and lifecycle management<\/p>\n<\/li>\n<li data-start=\"3112\" data-end=\"3143\">\n<p data-start=\"3114\" data-end=\"3143\">App integration marketplace<\/p>\n<\/li>\n<li data-start=\"3146\" data-end=\"3191\">\n<p data-start=\"3148\" data-end=\"3191\">Adaptive authentication based on behavior<\/p>\n<\/li>\n<li data-start=\"3194\" data-end=\"3221\">\n<p data-start=\"3196\" data-end=\"3221\">B2B and B2C IAM support<\/p>\n<\/li>\n<li data-start=\"3224\" data-end=\"3249\">\n<p data-start=\"3226\" data-end=\"3249\">Developer-friendly APIs<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"3251\" data-end=\"3254\" \/>\n<h3 data-start=\"3256\" data-end=\"3305\">2. <strong data-start=\"3263\" data-end=\"3305\">Microsoft Entra ID (formerly Azure AD)<\/strong><\/h3>\n<p data-start=\"3307\" data-end=\"3367\">Integrated deeply with Microsoft 365 and Azure environments.<\/p>\n<ul data-start=\"3369\" data-end=\"3645\">\n<li data-start=\"3369\" data-end=\"3416\">\n<p data-start=\"3371\" data-end=\"3416\"><strong data-start=\"3371\" data-end=\"3383\">Best for<\/strong>: Microsoft-centric enterprises<\/p>\n<\/li>\n<li data-start=\"3417\" data-end=\"3645\">\n<p data-start=\"3419\" data-end=\"3436\"><strong data-start=\"3419\" data-end=\"3433\">Highlights<\/strong>:<\/p>\n<ul data-start=\"3439\" data-end=\"3645\">\n<li data-start=\"3439\" data-end=\"3470\">\n<p data-start=\"3441\" data-end=\"3470\">Conditional Access policies<\/p>\n<\/li>\n<li data-start=\"3473\" data-end=\"3522\">\n<p data-start=\"3475\" data-end=\"3522\">Seamless integration with Intune and Defender<\/p>\n<\/li>\n<li data-start=\"3525\" data-end=\"3563\">\n<p data-start=\"3527\" data-end=\"3563\">Identity protection (risk scoring)<\/p>\n<\/li>\n<li data-start=\"3566\" data-end=\"3602\">\n<p data-start=\"3568\" data-end=\"3602\">Role-based access control (RBAC)<\/p>\n<\/li>\n<li data-start=\"3605\" data-end=\"3645\">\n<p data-start=\"3607\" data-end=\"3645\">Guest and external identity management<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"3647\" data-end=\"3650\" \/>\n<h3 data-start=\"3652\" data-end=\"3676\">3. <strong data-start=\"3659\" data-end=\"3676\">Ping Identity<\/strong><\/h3>\n<p data-start=\"3678\" data-end=\"3743\">Enterprise-grade IAM with strong federation and SSO capabilities.<\/p>\n<ul data-start=\"3745\" data-end=\"3985\">\n<li data-start=\"3745\" data-end=\"3796\">\n<p data-start=\"3747\" data-end=\"3796\"><strong data-start=\"3747\" data-end=\"3759\">Best for<\/strong>: Complex, multi-cloud environments<\/p>\n<\/li>\n<li data-start=\"3797\" data-end=\"3985\">\n<p data-start=\"3799\" data-end=\"3816\"><strong data-start=\"3799\" data-end=\"3813\">Highlights<\/strong>:<\/p>\n<ul data-start=\"3819\" data-end=\"3985\">\n<li data-start=\"3819\" data-end=\"3851\">\n<p data-start=\"3821\" data-end=\"3851\">Identity orchestration flows<\/p>\n<\/li>\n<li data-start=\"3854\" data-end=\"3893\">\n<p data-start=\"3856\" data-end=\"3893\">API and mobile-ready authentication<\/p>\n<\/li>\n<li data-start=\"3896\" data-end=\"3921\">\n<p data-start=\"3898\" data-end=\"3921\">On-prem and cloud IAM<\/p>\n<\/li>\n<li data-start=\"3924\" data-end=\"3949\">\n<p data-start=\"3926\" data-end=\"3949\">Smart adaptive access<\/p>\n<\/li>\n<li data-start=\"3952\" data-end=\"3985\">\n<p data-start=\"3954\" data-end=\"3985\">OpenID Connect and SAML support<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"3987\" data-end=\"3990\" \/>\n<h3 data-start=\"3992\" data-end=\"4022\">4. <strong data-start=\"3999\" data-end=\"4022\">IBM Security Verify<\/strong><\/h3>\n<p data-start=\"4024\" data-end=\"4081\">AI-powered IAM with deep compliance and governance tools.<\/p>\n<ul data-start=\"4083\" data-end=\"4323\">\n<li data-start=\"4083\" data-end=\"4129\">\n<p data-start=\"4085\" data-end=\"4129\"><strong data-start=\"4085\" data-end=\"4097\">Best for<\/strong>: Heavily regulated industries<\/p>\n<\/li>\n<li data-start=\"4130\" data-end=\"4323\">\n<p data-start=\"4132\" data-end=\"4149\"><strong data-start=\"4132\" data-end=\"4146\">Highlights<\/strong>:<\/p>\n<ul data-start=\"4152\" data-end=\"4323\">\n<li data-start=\"4152\" data-end=\"4177\">\n<p data-start=\"4154\" data-end=\"4177\">Visual policy builder<\/p>\n<\/li>\n<li data-start=\"4180\" data-end=\"4210\">\n<p data-start=\"4182\" data-end=\"4210\">Risk-based adaptive access<\/p>\n<\/li>\n<li data-start=\"4213\" data-end=\"4247\">\n<p data-start=\"4215\" data-end=\"4247\">Full identity governance suite<\/p>\n<\/li>\n<li data-start=\"4250\" data-end=\"4292\">\n<p data-start=\"4252\" data-end=\"4292\">Threat analytics and incident insights<\/p>\n<\/li>\n<li data-start=\"4295\" data-end=\"4323\">\n<p data-start=\"4297\" data-end=\"4323\">Workforce and consumer IAM<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"4325\" data-end=\"4328\" \/>\n<h3 data-start=\"4330\" data-end=\"4368\">5. <strong data-start=\"4337\" data-end=\"4368\">ForgeRock Identity Platform<\/strong><\/h3>\n<p data-start=\"4370\" data-end=\"4432\">A flexible and extensible IAM platform with open-source roots.<\/p>\n<ul data-start=\"4434\" data-end=\"4706\">\n<li data-start=\"4434\" data-end=\"4497\">\n<p data-start=\"4436\" data-end=\"4497\"><strong data-start=\"4436\" data-end=\"4448\">Best for<\/strong>: Large-scale IAM deployments with custom needs<\/p>\n<\/li>\n<li data-start=\"4498\" data-end=\"4706\">\n<p data-start=\"4500\" data-end=\"4517\"><strong data-start=\"4500\" data-end=\"4514\">Highlights<\/strong>:<\/p>\n<ul data-start=\"4520\" data-end=\"4706\">\n<li data-start=\"4520\" data-end=\"4554\">\n<p data-start=\"4522\" data-end=\"4554\">CIAM and workforce IAM support<\/p>\n<\/li>\n<li data-start=\"4557\" data-end=\"4587\">\n<p data-start=\"4559\" data-end=\"4587\">Microservices architecture<\/p>\n<\/li>\n<li data-start=\"4590\" data-end=\"4631\">\n<p data-start=\"4592\" data-end=\"4631\">AI-driven user access recommendations<\/p>\n<\/li>\n<li data-start=\"4634\" data-end=\"4661\">\n<p data-start=\"4636\" data-end=\"4661\">SDKs for mobile and IoT<\/p>\n<\/li>\n<li data-start=\"4664\" data-end=\"4706\">\n<p data-start=\"4666\" data-end=\"4706\">Identity governance and admin automation<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"4708\" data-end=\"4711\" \/>\n<h2 data-start=\"4713\" data-end=\"4734\">IAM and Zero Trust<\/h2>\n<p data-start=\"4736\" data-end=\"4776\">IAM is the <strong data-start=\"4747\" data-end=\"4775\">foundation of Zero Trust<\/strong>.<\/p>\n<p data-start=\"4778\" data-end=\"4896\">Zero Trust requires verifying identity <strong data-start=\"4817\" data-end=\"4833\">continuously<\/strong> and enforcing access <strong data-start=\"4855\" data-end=\"4871\">contextually<\/strong>, not just once at login.<\/p>\n<p data-start=\"4898\" data-end=\"4919\">IAM solutions enable:<\/p>\n<ul data-start=\"4921\" data-end=\"5087\">\n<li data-start=\"4921\" data-end=\"4951\">\n<p data-start=\"4923\" data-end=\"4951\"><strong data-start=\"4923\" data-end=\"4949\">Least privilege access<\/strong><\/p>\n<\/li>\n<li data-start=\"4952\" data-end=\"4991\">\n<p data-start=\"4954\" data-end=\"4991\"><strong data-start=\"4954\" data-end=\"4989\">Risk-based conditional policies<\/strong><\/p>\n<\/li>\n<li data-start=\"4992\" data-end=\"5033\">\n<p data-start=\"4994\" data-end=\"5033\"><strong data-start=\"4994\" data-end=\"5031\">Session management and monitoring<\/strong><\/p>\n<\/li>\n<li data-start=\"5034\" data-end=\"5087\">\n<p data-start=\"5036\" data-end=\"5087\"><strong data-start=\"5036\" data-end=\"5087\">Federated identities across hybrid environments<\/strong><\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"5089\" data-end=\"5092\" \/>\n<h2 data-start=\"5094\" data-end=\"5126\">IAM Compliance Considerations<\/h2>\n<p data-start=\"5128\" data-end=\"5178\">IAM helps businesses comply with regulations like:<\/p>\n<ul data-start=\"5180\" data-end=\"5437\">\n<li data-start=\"5180\" data-end=\"5223\">\n<p data-start=\"5182\" data-end=\"5223\"><strong data-start=\"5182\" data-end=\"5190\">GDPR<\/strong> \u2013 Data access and user consent<\/p>\n<\/li>\n<li data-start=\"5224\" data-end=\"5274\">\n<p data-start=\"5226\" data-end=\"5274\"><strong data-start=\"5226\" data-end=\"5235\">HIPAA<\/strong> \u2013 Access logs for health information<\/p>\n<\/li>\n<li data-start=\"5275\" data-end=\"5328\">\n<p data-start=\"5277\" data-end=\"5328\"><strong data-start=\"5277\" data-end=\"5284\">SOX<\/strong> \u2013 Segregation of duties (SoD) enforcement<\/p>\n<\/li>\n<li data-start=\"5329\" data-end=\"5380\">\n<p data-start=\"5331\" data-end=\"5380\"><strong data-start=\"5331\" data-end=\"5342\">PCI DSS<\/strong> \u2013 Strong authentication and logging<\/p>\n<\/li>\n<li data-start=\"5381\" data-end=\"5437\">\n<p data-start=\"5383\" data-end=\"5437\"><strong data-start=\"5383\" data-end=\"5400\">ISO\/IEC 27001<\/strong> \u2013 Identity governance best practices<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5439\" data-end=\"5515\">Without a strong IAM strategy, <strong data-start=\"5470\" data-end=\"5514\">compliance audits can become a nightmare<\/strong>.<\/p>\n<hr data-start=\"5517\" data-end=\"5520\" \/>\n<h2 data-start=\"5522\" data-end=\"5557\">Challenges in IAM Implementation<\/h2>\n<ul data-start=\"5559\" data-end=\"5815\">\n<li data-start=\"5559\" data-end=\"5617\">\n<p data-start=\"5561\" data-end=\"5617\"><strong data-start=\"5561\" data-end=\"5591\">Over-permissioned accounts<\/strong> due to poor role design<\/p>\n<\/li>\n<li data-start=\"5618\" data-end=\"5668\">\n<p data-start=\"5620\" data-end=\"5668\"><strong data-start=\"5620\" data-end=\"5641\">Shadow identities<\/strong> from unmanaged SaaS apps<\/p>\n<\/li>\n<li data-start=\"5669\" data-end=\"5715\">\n<p data-start=\"5671\" data-end=\"5715\"><strong data-start=\"5671\" data-end=\"5692\">Orphaned accounts<\/strong> after employee exits<\/p>\n<\/li>\n<li data-start=\"5716\" data-end=\"5768\">\n<p data-start=\"5718\" data-end=\"5768\"><strong data-start=\"5718\" data-end=\"5742\">Poor user experience<\/strong> if MFA is too intrusive<\/p>\n<\/li>\n<li data-start=\"5769\" data-end=\"5815\">\n<p data-start=\"5771\" data-end=\"5815\"><strong data-start=\"5771\" data-end=\"5797\">Integration complexity<\/strong> in legacy systems<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5817\" data-end=\"5949\">To overcome these, adopt an IAM platform that supports <strong data-start=\"5872\" data-end=\"5886\">automation<\/strong>, <strong data-start=\"5888\" data-end=\"5916\">delegated access reviews<\/strong>, and <strong data-start=\"5922\" data-end=\"5948\">context-aware controls<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the digital age, your identity is the new perimeter. Whether it\u2019s employees accessing internal apps, third-party vendors connecting to systems, or customers using your services \u2014 the first line of defense is always identity. That\u2019s why Identity and Access&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-26","post","type-post","status-publish","format-standard","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=26"}],"version-history":[{"count":1,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/26\/revisions"}],"predecessor-version":[{"id":27,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/26\/revisions\/27"}],"wp:attachment":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}