Organizations may increase data security and operational efficiency by
connecting Salesforce with Identity and Access Management (IAM) systems like
Saviynt. This study delves deeply into the details of this revolution that is
being encouraged to shift towards IAM software and potential drawbacks such as
excessive provisioning and implementation issues. The study illuminated
excellent practices and emphasized the importance of constant monitoring by
using secondary theme analysis and qualitative research as proof. The findings
indicate Saviynt as a viable solution and provide detailed information for
firms seeking a smooth and secure integration path.
References
[1]
Ren, Y., Werner, R., Pazzi, N. and Boukerche, A. (2010) Monitoring Patients via a Secure and Mobile Healthcare System. Journal of IEEE Wireless Communications, 17, 59-65. https://doi.org/10.1109/MWC.2010.5416351
[2]
Kuperberg, M. and Klemens, R. (2022) Integrating Self-Sovereign Identity into Conventional Software Using Established IAM Protocols: A Survey. https://doi.org/10.18420/OID2022_04
[3]
Talluri, S. (2022) Active Directory Service Interfaces (ADSI): Provisioning / De-Provisioning Access and Ensuring Accurate User Identity and Access across All the Forest Using IAM. International Journal of Science and Research (IJSR), 11, 2090-2096. https://www.ijsr.net/getabstract.php?paperid=SR231208201440
[4]
Mecozzi, R., Perrone, G., Anelli, D., Saitto, N., Paggi, E. and Mancini, D. (2022) Blockchain-Related Identity and Access Management Challenges: (de) Centralized Digital Identities Regulation. 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, 22-25 August 2022, 443-448
[5]
Anand, D. and Khemchandani, V. (2019) Identity and Access Management Systems. In: Tanwar, S., Tyagi, S. and Kumar, N., Eds., Security and Privacy of Electronic Healthcare Records: Concepts, Paradigms and Solutions, The Institution of Engineering and Technology, Stevenage, 61. https://doi.org/10.1049/PBHE020E_ch4
[6]
Ming, Y. and Zhang T. (2018) Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System. Journal of Sensors, 18, Article 3520. https://doi.org/10.3390/s18103520
[7]
Nakamoto, S. (2023) Bitcoin: A Peer-to-Peer Electronic Cash System. https://news.bitcoin.com/
[8]
Takabi, H., Joshi, J.B.D. and Ahn, G.-J. (2010) Security and Privacy Challenges in Cloud Computing Environments. Journal of IEEE Security and Privacy, 8, 24-31. https://doi.org/10.1109/MSP.2010.186
[9]
Gajera, H., Naik, S. and Das, M.L. (2016) On the Security of “Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems. Information Systems Security: 12th International Conference, Jaipur, 16-20 December 2016, 324-335.
[10]
Underwood, S. (2016) Blockchain beyond Bitcoin. Journal of Communications of ACM, 59, 15-17. https://doi.org/10.1145/2994581
[11]
Xiao, Z. and Xiao, Y. (2013) Security and Privacy in Cloud Computing. Journal of IEEE Communications Surveys & Tutorials, 15, 843-859. https://doi.org/10.1109/SURV.2012.060912.00182
[12]
Talluri, S. and Anne, V.P. (2023) Active Directory Implementation: Resolving Provisioning/Deprovisioning Access and Ensuring Accurate User Identity and Access across the Organization Using IAM. International Journal of Information Technology, 4, 29-37. https://iaeme.com/MasterAdmin/Journal_uploads/IJIT/VOLUME_4_ISSUE_2/IJIT_4_02_004.pdf