Identity Access Management

Identity Access Management (IAM)

Krutrim Cloud Identity Access Management (IAM) controls who can access what within an organization using a Role-Based Access Control (RBAC) model.

IAM is designed to be secure by default, deterministic, and extensible.


How IAM Works

IAM permissions flow through four entities:

  • Users → human identities

  • Policies → permission rules

  • Roles → collections of policies

  • Groups → collections of roles

Policy → Role → (User | Group) → User

Last updated

Was this helpful?