The different evaluation criteria in approaching cloud-based Identity and Access Management (IAM). It maps key considerations in the evaluation process, as well as perceived barriers to achieving Identity-as-a-Service (IDaaS).
↧