Research Article | Open Access | Download PDF
Volume 73 | Issue 11 | Year 2025 | Article Id. IJETT-V73I11P114 | DOI : https://doi.org/10.14445/22315381/IJETT-V73I11P114Identity and Access Management (IAM) Federation, Tools, and Techniques: An Overview
Raja Viswanatha, Banumathi A, Manivel Kandasamy
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 11 Jul 2025 | 01 Nov 2025 | 10 Nov 2025 | 25 Nov 2025 |
Citation :
Raja Viswanatha, Banumathi A, Manivel Kandasamy, "Identity and Access Management (IAM) Federation, Tools, and Techniques: An Overview," International Journal of Engineering Trends and Technology (IJETT), vol. 73, no. 11, pp. 173-192, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I11P114
Abstract
Access and Identity Management (IAM) federations are an important area for protecting organizational resources and permitting seamless access across multiple domains. Still, modern IAM implementations are typically faced with challenges like inconsistent authentication schemes, fragmented access control, and cross-domain interoperability. These challenges highlight the gap in the research on securing, operationalizing, and the comfort level of IAM federation systems in hybrid and cloud environments. This paper will provide a fully-fledged discussion of IAM federation, including its tools, techniques, and applications in present-day organizations. The study of ten leading IAM tools and protocols, such as Single Sign-On (SSO), Multifactor Authentication (MFA), Privileged Access Management (PAM), SAML, OAuth, and OpenID Connect, will comprise a part of the research undertaken on a qualitative comparative review methodology. They are evaluated based on the strength of security, interoperability, compliance with regulations (GDPR, HIPAA, FERPA), and usability. The results show that SAML and OAuth protocols give better assurance of security, while SSO and PAM are better in usability and governance efficiencies. The paper is helpful because it provides a simple model of federated IAM definition, illustrating both the technical advantages and drawbacks that are present today. It also argues about the ethical and data compliance implications, indicating where the future enterprise system federation models of AI should be developed.
Keywords
Identity and Access Management (IAM), IAM Federation, Security Protocols, Single Sign-On (SSO), Multifactor Authentication (MFA).
References
[1] Sampath Talluri, “Identity and Access Management for the
Internet of Things (IoT),” Journal of Engineering and Applied Sciences
Technology, vol. 4, no. 1, pp. 1-4, 2022.
[Publisher Link]
[2] Amjad
Alsirhani, Mohamed Ezz, and Ayman Mohamed Mostafa, “Advanced Authentication
Mechanisms for Identity and Access Management in Cloud Computing,” Computer
Systems Science and Engineering, vol. 43, no. 3, pp. 967-984, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Chetanpal
Singh, Rahul Thakkar, and Jatinder Warraich, “IAM Identity Access
Management-Importance in Maintaining Security Systems within Organizations,”
European Journal of Engineering and Technology Research, vol. 8, no. 4, pp.
30-38, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Daniela Pöhn,
and Peter Hillmann, “Reference Service Model for Federated Identity
Management,” International Conference on Business Process Modeling, Development
and Support, Melbourne, VIC, Australia, pp. 196-211, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] None Saloni
Kumari, “Identity and Access Management: “Elevating Security and Efficiency:
Unveiling the Crucial Aspects of Identity and Access Management”,”
International Journal of Engineering & Technology, vol. 12, no. 1, pp.
11-14, 2023.
[Publisher Link]
[6] Prashant
Pandey, and T.N. Nisha, “Challenges in Single Sign-On,” Journal of Physics:
Conference Series: Advances in Computer Science Engineering, vol. 1964, no. 4,
pp. 1-12, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Swapnoneel Roy,
Sam Matloob, and Debajyoti Mukhopadhyay, “On Application of Blockchain to
Enhance Single Sign-On (SSO) Systems,” 2021 IEEE 20th International Conference
on Trust, Security and Privacy in Computing and Communications (TrustCom),
Shenyang, China, pp. 1191-1195, 2021.
[Google Scholar] [Publisher Link]
[8] Anna Schlenker,
and Milan Šárek, “Behavioral Biometrics for Multifactor Authentication in
Biomedicine,” European Journal for Biomedical Informatics, vol. 8, no. 5, pp.
19-24, 2012.
[Google Scholar] [Publisher Link]
[9] Muhammad Aslam,
“The Impact of Multi-Factor Authentication (MFA) on Strengthening Cybersecurity
in E-Commerce Applications,” 2020.
[Google Scholar]
[10] Ayman Mohamed
Mostafa et al., “Strengthening Cloud Security: An Innovative Multifactor
Multi-Layer Authentication Framework for Cloud User Authentication,” Applied
Sciences, vol. 13, no. 19, pp. 1-24, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] K. Krishna
Prasad, “Multifactor Authentication Model using Fingerprint Hash Code and Iris
Recognition” International Journal of Management, Technology, and Social
Sciences (IJMTS), vol. 3, no. 2, pp. 47-56, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Alexander D.
Kent, Lorie M. Liebrock, and James Wernicke, “Differentiating User
Authentication Graphs,” Journal of Wireless Mobile Networks, Ubiquitous
Computing, and Dependable Applications, vol. 5, no. 2, pp. 24-38, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Swetha Gadde
et al., “Secure Data Sharing in Cloud Computing: A Comprehensive Survey of
Two-Factor Authentication and Cryptographic Solutions,” Information Systems
Engineering, vol. 28, no. 6, pp. 1467-1477, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Iryna Topalova
et al., “Business Process Management in Entrepreneurial Activity Based on a
Platform Approach,” Indian Journal of Information Sources and Services, vol.
14, no. 2, pp. 46-55, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Srikanth
Mandru, “Privileged Access Management and Regulatory Compliance,” Journal of
Artificial Intelligence, Machine Learning and Data Science, vol. 2, no. 2, pp.
728-732, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] André Koot,
“Introduction to Privileged Access Management (v2),” IDPro Body of Knowledge,
vol. 1, no. 15, pp. 1-21, 2024.
[CrossRef] [Google Scholar] [Publisher
Link]
[17] Ifteher Alom
et al., “Dynamic Management of Identity Federations using Blockchain,” 2021
IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney,
Australia, pp. 1-9, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Amani K.
Samha, “Strategies for Efficient Resource Management in Federated Cloud
Environments Supporting Infrastructure as a Service (IaaS),” Journal of
Engineering Research, vol. 12, no. 2, pp. 101-114, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Srivathsan G.
Morkonda, Paul C. van Oorschot, and Sonia Chiasson, “Exploring Privacy
Implications in OAuth Deployments,” arXiv Preprint, pp. 1-15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Sasibhushana
Matcha, and Munish Kumar, “Enhancing Software Security with OAuth 2.0:
Implementation Strategies and Vulnerability Mitigation,” Journal of Emerging
Technologies and Innovative Research, vol. 12, no. 3, pp. e886-e902, 2025.
[Google Scholar] [Publisher Link]
[21] Seyyed Keyvan
Mousavi et al., “Security of Internet of Things based on Cryptographic
Algorithms: A Survey,” Wireless Networks, vol. 27, no. 2, pp. 1515-1555, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Louis Jannett
et al., “Sok: SSO-MONITOR-The Current State and Future Research Directions in
Single Sign-on Security Measurements,” 2024 IEEE 9th European Symposium on
Security and Privacy (EuroS&P), Vienna, Austria, pp. 173-192, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Sven Hammann,
Ralf Sasse, and David Basin, “Privacy-Preserving OpenID Connect,” ASIA CCS '20:
The 15th ACM Asia Conference on Computer and Communications Security, Taipei,
Taiwan, pp. 277-289, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Santripti
Bhujel, and N. Priya, A Review of Identity and Access Management as a Service,
2021. [Online]. Available:
https://www.researchgate.net/publication/351810416_A_REVIEW_ON_IDENTITY_AND_ACCESS_MANAGEMENT_AS_A_SERVICE?channel=doi&linkId=60ab2b61299bf1031fc41d96&showFulltext=true
[25] Jana Glöckler
et al., “A Systematic Review of Identity and Access Management Requirements in
Enterprises and Potential Contributions of Self-Sovereign Identity,” Business
& Information Systems Engineering, vol. 66, no. 4, pp. 421-440, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Omer Eltayeb,
“The Crucial Significance of Governance, Risk, and Compliance in Identity and
Access Management,” Journal of Ecohumanism, vol. 3, no. 4, pp. 2395-2405, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Andrew
Cormack, “An Introduction to the GDPR (v3),” IDPro Body of Knowledge, vol. 1,
no. 5, pp. 1-13, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Michal Maciej
Kepkowski, “Privacy-Enhancing Technologies for Identity and Access Management,”
Doctoral Dissertation, Macquarie University, 2024.
[Google Scholar] [Publisher Link]
[29] Tom Petersen,
“Distributed Architectures for Data Pseudonymization and Anonymization in
Medical Research,” Doctoral Dissertation, University of Hamburg, 2024.
[Google Scholar] [Publisher Link]
[30] Javed Akhtar
Khan, Role-Based Access Control (RBAC) and Attribute-Based Access Control
(ABAC), Improving Security, Privacy, And Trust in Cloud Computing, IGI Global
Scientific Publishing, pp. 113-126, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Santosh Kumar
Singh, Priyanka Dubey, and Gyanendra Kumar Shukla, “MongoDB in a Cloud
Environment” Don Bosco Institute of Technology Delhi Journal of Research, vol.
1, no. 1, pp. 13-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Thomas Baumer,
Mathis Müller, and Günther Pernul, “System for Cross-Domain Identity Management
(SCIM): Survey and Enhancement with RBAC,” IEEE Access, vol. 11, pp.
86872-86894, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Morey J.
Haber, and Darran Rolls, System for Cross-Domain Identity Management (SCIM),
Identity Attack Vectors, Apress, Berkeley, CA, pp. 159-161, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Mersedeh
Sadeghi, “Interoperability of Heterogeneous Systems of Systems: from
Requirements to a Reference Architecture,” The Journal of Supercomputing, vol.
80, no. 7, pp. 8954-8987, 2023.
[Google Scholar] [Publisher Link]