← Back|CYBERSECURITY›Section 1/15
0 of 15 completed

IAM basics

Beginnerā± 12 min readšŸ“… Updated: 2026-02-17

Introduction

Imagine oru big office building. Front la security guard iruppaan — ID card check pannuvaan, visitor ah na register pannuvaan, certain floors ku access illa nu solluvan. šŸ¢


Digital world la idhe same job panradhu dhaan IAM — Identity and Access Management!


Yaaru login pannalam, yaaru enna access pannalam, yaaru enna panna allowed — ivanga ellam control pannuradhu IAM. Indha article la IAM basics, concepts, and real examples paapom! šŸ”‘

What is IAM?

IAM = Identity and Access Management


Two main questions:

  1. Identity: "Nee yaaru?" — Verify who you are
  2. Access: "Nee enna panna allowed?" — What can you do

ConceptReal WorldDigital World
IdentityAadhar Card, PassportUsername, Email
AuthenticationSecurity guard ID checkPassword, Biometric
Authorization"VIP area allowed?"Admin vs User role
Access ControlRoom key cardFile permissions

Why IAM important?

  • 80% of data breaches involve compromised credentials
  • Companies average 187 apps use pannuranga — access manage pannanum
  • Compliance (GDPR, HIPAA) require proper access control

Authentication vs Authorization

Ivanga rendu most confused concepts:


Authentication (AuthN) 🪪

  • "Prove who you are"
  • Login process — username + password
  • Biometric — fingerprint, face ID
  • Result: Identity verified āœ… or rejected āŒ

Authorization (AuthZ) šŸ”

  • "What are you allowed to do?"
  • After authentication, permissions check
  • Admin can delete files, User can only view
  • Result: Access granted āœ… or denied āŒ

Analogy: Cinema theatre šŸŽ¬

  • Authentication = Ticket check at entrance (nee valid customer ah?)
  • Authorization = Seat assignment (Gold class ah, Regular ah?)

First AuthN, then AuthZ — always this order!

MFA — Multi-Factor Authentication

MFA = 2 or more factors use panni identity verify pannuradhu.


Three types of factors:


🧠 Something you KNOW — Password, PIN, security question

šŸ“± Something you HAVE — Phone (OTP), hardware token, smart card

šŸ‘† Something you ARE — Fingerprint, face scan, iris scan


MFA CombinationExampleSecurity Level
Password + OTPGoogle login with SMS OTPMedium
Password + AuthenticatorGitHub with Google AuthenticatorHigh
Password + BiometricBanking app with fingerprintHigh
Password + Hardware KeyYubiKey for admin accountsVery High

Why MFA matters: Password alone compromise aanalum, second factor illama hacker login panna mudiyaadhu! 99.9% of account attacks MFA prevent pannum. šŸ›”ļø

RBAC — Role-Based Access Control

RBAC = Users ku roles assign panni, roles ku permissions assign pannuradhu.


Office example:

  • CEO → All departments access
  • HR Manager → HR files, employee data
  • Developer → Code repo, dev servers
  • Intern → Only shared documents

RBAC Benefits:

  • Easy to manage — role add/remove pannunga
  • Principle of Least Privilege follow aagum
  • Audit easy — who has what access clear ah theriyum

Other access control models:

  • ABAC (Attribute-Based) — attributes based access (time, location, department)
  • MAC (Mandatory) — Government/military use, strict labels
  • DAC (Discretionary) — Owner decides who gets access

IAM Architecture

šŸ—ļø Architecture Diagram
ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│                 IAM ARCHITECTURE                   │
ā”œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¤
│                                                   │
│  USER ──▶ IDENTITY PROVIDER (IdP)                │
│              │                                    │
│              ā”œā”€ā”€ Authentication                    │
│              │   ā”œā”€ā”€ Password                      │
│              │   ā”œā”€ā”€ MFA/2FA                       │
│              │   ā”œā”€ā”€ Biometric                     │
│              │   └── SSO Token                     │
│              │                                    │
│              ā”œā”€ā”€ Authorization                     │
│              │   ā”œā”€ā”€ RBAC (Roles)                  │
│              │   ā”œā”€ā”€ ABAC (Attributes)             │
│              │   └── Policies                      │
│              │                                    │
│              └── Access Management                 │
│                  ā”œā”€ā”€ Provisioning                   │
│                  ā”œā”€ā”€ De-provisioning                │
│                  └── Audit Logs                     │
│                                                   │
│  ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”  ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”  ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”          │
│  │  App 1  │  │  App 2  │  │  App 3  │          │
│  │ (Email) │  │ (CRM)   │  │ (Code)  │          │
│  ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜  ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜  ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜          │
│       ā–²            ā–²            ā–²                 │
│       ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜                 │
│            SSO / OAuth / SAML                     │
│                                                   │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜

SSO — Single Sign-On

SSO = Oru login, multiple app access.


Without SSO 😫:

  • Gmail — separate login
  • YouTube — separate login
  • Google Drive — separate login
  • 10 apps = 10 passwords = 10 headaches!

With SSO šŸ˜Ž:

  • Google account login → Gmail, YouTube, Drive, Maps — ellam access!
  • One password to remember
  • One place to manage security

SSO Protocols:

  • SAML — Enterprise SSO standard (XML-based)
  • OAuth 2.0 — Authorization framework ("Login with Google")
  • OIDC — OpenID Connect, identity layer on top of OAuth
  • Kerberos — Windows Active Directory uses this

SSO Risk: Single point of failure — oru account compromise aana, all apps affected! Adhanalaa MFA essential. šŸ”‘

Real Scenario: New Employee Onboarding

āœ… Example

Scenario: Kumar joins TCS as Junior Developer.

Day 1 — IAM in action:

šŸ“‹ HR creates Kumar's identity in Active Directory

šŸ”‘ Kumar gets employee ID + temporary password

šŸ“§ Email account auto-provisioned (RBAC: "Developer" role)

šŸ’» Code repo access granted (Git, Jira, Confluence)

🚫 Finance systems — NO access (not his role)

šŸ“± MFA setup — Microsoft Authenticator install

Day 365 — Kumar promoted to Tech Lead:

šŸ”„ Role change: Developer → Tech Lead

āœ… New access: Team management tools, deployment servers

šŸ“Š Audit: All access changes logged

Kumar leaves company:

āŒ All access revoked immediately (de-provisioning)

šŸ“§ Email disabled, VPN removed, badges deactivated

This is IAM lifecycle management! šŸ”„

Principle of Least Privilege

šŸ’” Tip

šŸ” Least Privilege = Give minimum access needed to do the job. Nothing more.

Why?

- Attack surface reduce aagum

- Accidental damage prevent aagum

- Compliance requirements meet aagum

Examples:

- Intern ku admin access venaam āŒ

- Developer ku production database direct access venaam āŒ

- HR ku source code repo access venaam āŒ

Implementation:

- Start with zero access, add as needed

- Regular access reviews (quarterly)

- Remove access immediately when not needed

- Temporary elevated access with approval workflow

"Need-to-know basis" — military concept, but cybersecurity la gold standard! šŸ†

Popular IAM Tools

Industry la use aagura IAM tools:


ToolTypeUsed By
**Azure AD**Cloud IAMMicrosoft ecosystem
**Okta**SSO + MFAEnterprise
**Auth0**Developer IAMStartups, Apps
**AWS IAM**Cloud IAMAWS users
**Keycloak**Open-source IAMSelf-hosted
**OneLogin**SSO PlatformEnterprise
**CyberArk**Privileged AccessEnterprise
**JumpCloud**Directory-as-a-ServiceSMBs

Cloud IAM is booming — every company cloud ku move aagum bodhu IAM first priority! ā˜ļø

Try It: IAM Policy Prompt

šŸ“‹ Copy-Paste Prompt
You are an IAM security consultant. Design an access control policy for a small startup with these roles:

1. CEO (2 people)
2. Developers (10 people)
3. HR (3 people)
4. Marketing (5 people)
5. Interns (4 people)

Resources: Email, Code Repo, HR System, Marketing Tools, Financial Data, Admin Panel

Create a RBAC matrix showing who gets access to what. Include MFA requirements.
Explain in simple Tanglish.

āœ… Summary & Key Takeaways

IAM basics recap:


āœ… IAM = Identity and Access Management

āœ… Authentication = Who are you? (verify identity)

āœ… Authorization = What can you do? (check permissions)

āœ… MFA = Multiple verification factors (password + OTP)

āœ… RBAC = Role-based permissions

āœ… SSO = One login, many apps

āœ… Least Privilege = Minimum access needed


Next article: "Password Security" — strong passwords create pannuradhu, password managers, and passkeys! šŸ”’

šŸ Mini Challenge

Challenge: Build an IAM Policy for Startup


Oru tech startup la IAM system design pannunga:


  1. Role Definition — 4 roles define pannunga: Admin, Developer, QA, Intern. Each role ku specific permissions decide pannunga (database access, deployment rights, code review).

  1. RBAC Implementation — Oru spreadsheet create pannunga. Users list, roles assign, permissions matrix create pannunga. Least privilege principle follow pannunga.

  1. MFA Setup — Un personal devices la Google Authenticator, Authy, or Microsoft Authenticator install pannunga. Gmail, GitHub, AWS account la 2FA/MFA enable pannunga.

  1. SSO Simulation — Okta trial account signup pannunga (free plan available). Single Sign-On configure pannunga. Multiple apps add pannunga, oru login use panni all access panna paappom.

  1. Access Audit — Current access analyze pannunga. "Who has what access?" chart create pannunga. Unnecessary access identify panni remove pannunga (principle of least privilege).

  1. Offboarding Checklist — Employee leave pannidha, access revoke enna steps pannuradhu? Checklist create pannunga — systems, accounts, devices, keys ellam remove pannunga.

Certificate: Nee startup ka IAM architect! šŸ†

Interview Questions

Q1: IAM enna? Real-world analogy solli explain pannunga.

A: IAM = Right person, right time, right resource. Physical example: Office building la security guard. ID verify panni (authentication), employee ID scan panni (authorization), office access allow pannum. Digital la same concept.


Q2: Authentication vs Authorization — clear difference solu.

A: Authentication = "Nee yaaru?" (I am Priya, password prove pannunga). Authorization = "Nee enna panna allowed?" (Priya, nee spreadsheet edit panna allowed, but salary data edit panna allowed ille).


Q3: MFA vs 2FA difference? Which is better?

A: 2FA = exactly 2 factors (usually password + OTP). MFA = 2 or more factors (password + OTP + biometric + security questions). MFA more secure. But 2FA already good protection — 99.9% attacks block aagudhu.


Q4: SSO vs passwords — SSO security risks?

A: SSO convenience increase panunum, single point of failure kuda create panunum. SSO account compromise-ael, all connected apps access lost. Mitigation: SSO provider security strong irukkanum, conditional access policies use pannunga, regular audit pannunga.


Q5: Company la new hire engineer onboard pannuradhu — IAM process enna?

A: 1) Manager request approve panni 2) Orum necessary systems identify panni 3) Least privilege role assign panni 4) Accounts create panni 5) MFA setup ensure panni 6) Access test panni 7) Documentation complete panni.

Frequently Asked Questions

ā“ IAM na enna?
Identity and Access Management — right people ku right resources ku right time la access kudukradhu. Digital bouncer maari!
ā“ Authentication vs Authorization enna difference?
Authentication = "Nee yaaru?" (identity verify). Authorization = "Nee enna panna allowed?" (permissions check).
ā“ MFA na enna?
Multi-Factor Authentication — 2 or more verification methods use pannuradhu. Password + OTP maari.
ā“ SSO na enna?
Single Sign-On — oru login use panni multiple applications access pannuradhu. Google login use panni YouTube, Gmail, Drive ellam access panra maari.
🧠Knowledge Check
Quiz 1 of 2

Password + OTP is an example of?

0 of 2 answered