eLanka

Monday, 24 Nov 2025
  • Home
  • Read History
  • Articles
    • eLanka Journalists
  • Events
  • Useful links
    • Obituaries
    • Seeking to Contact
    • eLanka Newsletters
    • Weekly Events and Advertisements
    • eLanka Testimonials
    • Sri Lanka Newspapers
    • Sri Lanka TV LIVE
    • Sri Lanka Radio
    • eLanka Recepies
  • Gallery
  • Contact
Newsletter
  • eLanka Weddings
  • Property
  • eLanka Shop
  • Business Directory
eLankaeLanka
Font ResizerAa
Search
  • Home
  • Read History
  • Articles
    • eLanka Journalists
  • Events
  • Useful links
    • Obituaries
    • Seeking to Contact
    • eLanka Newsletters
    • Weekly Events and Advertisements
    • eLanka Testimonials
    • Sri Lanka Newspapers
    • Sri Lanka TV LIVE
    • Sri Lanka Radio
    • eLanka Recepies
  • Gallery
  • Contact
Follow US
© 2005 – 2025 eLanka Pty Ltd. All Rights Reserved.
Home » Goodnews Stories Srilankan Expats » Articles » Changing identity management methods – By Aditya Abeysinghe
Aditya AbeysingheArticles

Changing identity management methods – By Aditya Abeysinghe

eLanka admin
Last updated: November 19, 2022 3:16 pm
By
eLanka admin
ByeLanka admin
Follow:
Share
4 Min Read
SHARE

Changing identity management methods – By Aditya Abeysinghe

Aditya-AbeysingheIdentity management

Identity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access to a resource. It is a term used to describe a range of methods that identifies and authorizes people, groups, and apps using access management rights. With this method, only authorized people, groups of people, and external services can request or use a service or product which could reduce attacks to data, applications or services, and hardware. Identity management is only a defense used to minimize attacks by preventing unauthorized access and is often added using an identity service and an authorization service.

Traditional IAM methods

Sign in with a username and password has been the typical method to authenticate users. It is still the most used method for authenticating users to products and applications. The method used to authenticate a user with a username and password differs based on whether it is used within a device, within a software, or within a remote environment. However, this method often poses a risk to a resource if the username and/or password could be attacked. Many methods to overcome issues with this method have been used.

More Read

A New Era for Sri Lankan Seafaring Talent as Centrum Marine Facilitates High Value ALAM Scholarships
Sri Lanka glows in a tea pot on global stage
A.M.A. AZEEZ, EMINENT SCHOLAR AND VISIONARY – By Capt. A.G.A. Barrie SLE, P.Eng.

Changing identity management methods

 

Using an additional method to authenticate users is one method to overcome issues with usernames and passwords. This is often called Multi-Factor Authentication (MFA) and is often used with a code that is sent in a text or email message. MFA is used as the main additional method in systems which use username and password for user identity. Many other methods for using MFA have been used with higher security.

Tokens are typically the method used in validating web service or external service-related calls. With access tokens, data including user permissions, roles, and policies for the user request is sent by an authentication server to the user. With access tokens, the payload (information about the user, resources, and other data used for authentication), the header (data about the token type), and signature is sent to a user. Tokens are often temporary methods used to access resources and often are invalid after a period.

New methods for IAM

Adaptive MFA is a new method used to authenticate users. With adaptive MFA, MFA can be used to change the method used to access resources. A common use of this method is when a user uses the same resource when travelling, working with a network of an organization, and when accessing them from a remote location. Using this type of user authentication, methods addition to MFA can be used when a user is working from a location outside an organization and easier methods to sign on such as use of identification tags after the initial login can be used when inside an organization.

Biometric methods are also emerging as user authentication methods to access resources.  Facial recognition, retina scans, and fingerprint mapping are some methods used to access resources. These are commonly used to reduce hassle of frequently using username and password-based logins to the same device or application. They are often used in addition to a username/password or pattern-based method to allow users to login when scanning biometrics fail. However, they are often more secure if the scanning is accurate as it identifies the user rather than data entered to a resource.

Image courtesy: https://www.perfecto.io/

TAGGED:access management rightsIdentity and Access ManagementIdentity managementTraditional IAM methods
Share This Article
Email Copy Link Print
Previous Article Jesus is living in me SUNDAY CHOICE – Jesus is living in me
Next Article Rajan David Rajan David Moonesinghe – falls victim to Gun violence in US
FacebookLike
YoutubeSubscribe
LinkedInFollow
Most Read
10 Pictures With Fascinating Stories Behind Them!

“A PICTURE SPEAKS A 1000 WORDS” – By Des Kelly

Look past your thoughts so you may drink the pure nectar of this moment

A Life Hack for when we’re Burnt Out & Broken Down – By Uma Panch

Narration of the History of our Proud Ancestral (Orang Jawa) Heritage. by Noor R. Rahim

eLanka Weddings

eLanka Marriage Proposals

Noel News

Noel News

Noel News

Noel News- By Noel Whittaker

EILEEN MARY SIBELLE DE SILVA (nee DISSANAYAKE) – 29 September 1922 – 6 April 2018 – A Woman of Value an Appreciation written by Mohini Gunasekera

K.K.S. Cement Factory

Dr.Harold Gunatillake’s 90th Birthday party

Sri Lanka's women's cricket squad in Melbourne

Cricket: Sri Lanka’s women’s squad in Melbourne

- Advertisement -
Ad image
Related News
Christmas just around the corner-eLanka
Articles Noor Rahim

PRELUDE TO A FESTIVE SEASON. – By Noor Rahim

Articles Sunil Thenabadu

SRI LANKA IN ANOTHER LACKLUSTRE DISPLAY LOSE AGAIN TO PAKISTAN – By Sunil Thenabadu

Windies Cricketers-eLanka
Articles

The Ceylon Civil Service at Cricket 1910-by Michael Roberts

Articles

Sri Lanka ‘zimbabwe-yed’ at Rawalpindi

Articles Charles Schokman

SUNDAY CHOICE – God Has A Plan for our life -by Charles Schokman

  • Quick Links:
  • Articles
  • DESMOND KELLY
  • Dr Harold Gunatillake
  • English Videos
  • Sri Lanka
  • Sinhala Videos
  • eLanka Newsletters
  • Obituaries
  • Tamil Videos
  • Sunil Thenabadu
  • Dr. Harold Gunatillake
  • Sinhala Movies
  • Trevine Rodrigo
  • Tamil Movies
  • Photos

eLanka

Your Trusted Source for News & Community Stories: Stay connected with reliable updates, inspiring features, and breaking news. From politics and technology to culture, lifestyle, and events, eLanka brings you stories that matter — keeping you informed, engaged, and connected 24/7.
Kerrie road, Oatlands , NSW 2117 , Australia.
Email : info@eLanka.com.au / rasangivjes@gmail.com.
WhatsApp : +61402905275 / +94775882546

(c) 2005 – 2025 eLanka Pty Ltd. All Rights Reserved.