Google Cloud Identity and Access Management
GPTKB entity
Statements (77)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:cloud_services
|
gptkbp:allows |
User authentication
|
gptkbp:enables |
Policy management
Single sign-on Secure collaboration Identity verification Access transparency Secure access Secure identity management Secure user access |
gptkbp:facilitates |
Compliance management
|
https://www.w3.org/2000/01/rdf-schema#label |
Google Cloud Identity and Access Management
|
gptkbp:integrates_with |
gptkb:Google_Workspace
|
gptkbp:is_available_on |
gptkb:Google_Cloud_Console
|
gptkbp:is_compatible_with |
Mobile applications
Third-party identity providers |
gptkbp:is_designed_for |
Data security
Security management Access management User management Enterprise security |
gptkbp:is_integrated_with |
gptkb:Cloud_Identity
Cloud services Security information and event management (SIEM) tools |
gptkbp:is_part_of |
gptkb:Google_Cloud_Platform
Cloud security Identity governance Identity and access management solutions Access management frameworks Identity and access management best practices |
gptkbp:is_used_by |
gptkb:organization
IT administrators |
gptkbp:is_used_for |
Resource management
User data protection Compliance auditing |
gptkbp:is_used_in |
Enterprise environments
|
gptkbp:is_used_to |
Manage user access
Control user permissions Manage access rights |
gptkbp:is_utilized_by |
gptkb:developers
Security teams |
gptkbp:is_utilized_for |
Data protection
|
gptkbp:is_utilized_in |
Cloud environments
|
gptkbp:offers |
Audit logging
Security policies User provisioning Security features User access management Access management tools Identity protection features |
gptkbp:provides |
Access control
Identity management solutions Access control policies Identity management Group management User roles Access control lists Identity federation Access control mechanisms Access policies Access reviews Service account management |
gptkbp:supports |
Multi-factor authentication
Role-based access control User activity monitoring API access control User authentication methods Identity verification processes Custom roles Delegated administration Identity lifecycle management Access levels Identity verification technologies User role assignments |
gptkbp:bfsParent |
gptkb:Google
gptkb:cloud_services |
gptkbp:bfsLayer |
4
|