Identity / Access Management
Glossary Page
Identity & Access Management (IAM) controls access to data and provides answers to two fundamental questions: Who is the user? The user's identity is verified through authentication and typically stored in an employee directory. What permissions does the user have? This question relates to authorization for specific actions. For example, the right to read or edit data may be tied to the user's role. IAM is an established concept that is also used in big data solutions.
Latest Webinars
Latest Articles
HM2024: Dataspace first movers’ success
Discover the success stories and cutting-edge advancements showcased at Hannover Messe 2024, where leaders in dataspaces, digital twins, and smart mobility converge to shape the future of Industry 4.0 and global supply chains.
Read more
Chris S. Langdon
Apr 29, 2024
Tractus-X Sandbox
Discover an innovative application development environment powered by Eclipse Tractus-X, offering unparalleled focus and speed from concept to implementation success. With Tractus-X Sandbox, Catena-X Sandbox, and LivingLab Tractus-X, choose the option that fits your needs and start building your data-driven applications effortlessly. Benefit from trusted transactions, ease of use, and T-Systems' expertise in providing reliable data infrastructure solutions.
Read more
Chris S. Langdon
Apr 15, 2024
Enabling trust in dataspaces: Exploring T-Systems and OpenCorporates collaboration
Explore how the collaboration between OpenCorporates and T-Systems is revolutionizing dataspace onboarding by providing robust verification solutions. Leveraging company information from OpenCorporates and verification expertise from T-Systems, participants can seamlessly join dataspace ecosystems with confidence, ensuring authenticity, security, and trust.
Read more
Lena Matsela, Andrea Garcia
Apr 05, 2024