IBM Cloud Identity and Access Management
GPTKB entity
Statements (64)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:enables |
Identity Governance
Access Control Policies Self-Service_Password_Reset |
gptkbp:features |
Audit Logs
Custom_Branding |
https://www.w3.org/2000/01/rdf-schema#label |
IBM Cloud Identity and Access Management
|
gptkbp:includes |
API_Access_Management
|
gptkbp:integratesWith |
gptkb:IBM_Cloud_Services
Third-Party_Applications |
gptkbp:isAvailableIn |
gptkb:IBM_Cloud_Platform
Public Sector Multiple_Regions |
gptkbp:isCompatibleWith |
Various Operating Systems
Cloud Applications |
gptkbp:isDesignedFor |
Cloud Environments
Digital_Transformation |
gptkbp:isIntegratedWith |
gptkb:IBM_Watson
gptkb:IBM_Cloud_Pak |
gptkbp:isPartOf |
gptkb:IBM_Security_Portfolio
gptkb:IBM_Cloud Identity_Management_Solutions |
gptkbp:isSuitableFor |
Large User Bases
|
gptkbp:isUsedBy |
Enterprises
|
gptkbp:isUsedFor |
Secure Access
|
gptkbp:isUtilizedFor |
Developers
IT Administrators |
gptkbp:offers |
Service Level Agreements
User Experience Customization User Self-Registration Access Token Management User_Management Identity_Federation Delegated_Administration Access_Management_Dashboard Integration_with_IAM_Solutions |
gptkbp:provides |
Access Control Lists
Incident Response Role-Based Access Control Single Sign-On Security Policies Access Reviews User Provisioning Compliance Reporting Risk-Based Authentication User Activity Monitoring Security_Incident_Management |
gptkbp:supports |
gptkb:Multi-Factor_Authentication
Data Encryption OAuth 2.0 API Security Compliance Standards User Experience Optimization User Segmentation Session Management User Authentication Methods User Consent Management SAML 2.0 LDAP Integration Cloud Security Standards Mobile_Device_Management Federated_Identity_Management Identity_Analytics Password_Policies |