News & Community eLanka

eLanka

Monday, 4 May 2026
  • Home
  • Read History
  • Articles
    • eLanka Journalists
  • Events
  • Useful links
    • Obituaries
    • Seeking to Contact
    • eLanka Newsletters
    • Weekly Events and Advertisements
    • eLanka Testimonials
    • Sri Lanka Newspapers
    • Sri Lanka TV LIVE
    • Sri Lanka Radio
    • eLanka Recepies
  • Gallery
  • Contact
Newsletter
Sri lankan news
  • eLanka Weddings
  • Property
  • eLanka Shop
  • Business Directory
eLankaeLanka
Font ResizerAa
Search
  • Home
  • Read History
  • Articles
    • eLanka Journalists
  • Events
  • Useful links
    • Obituaries
    • Seeking to Contact
    • eLanka Newsletters
    • Weekly Events and Advertisements
    • eLanka Testimonials
    • Sri Lanka Newspapers
    • Sri Lanka TV LIVE
    • Sri Lanka Radio
    • eLanka Recepies
  • Gallery
  • Contact
Follow US
© 2005 – 2026 eLanka Pty Ltd. All Rights Reserved.
Home » Goodnews Stories Srilankan Expats » Articles » Changing identity management methods – By Aditya Abeysinghe
Aditya AbeysingheArticles

Changing identity management methods – By Aditya Abeysinghe

eLanka admin
Last updated: November 19, 2022 3:16 pm
By
eLanka admin
ByeLanka admin
Follow:
Share
4 Min Read
SHARE
Views: 12

Changing identity management methods – By Aditya Abeysinghe

Aditya-AbeysingheIdentity management

Identity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access to a resource. It is a term used to describe a range of methods that identifies and authorizes people, groups, and apps using access management rights. With this method, only authorized people, groups of people, and external services can request or use a service or product which could reduce attacks to data, applications or services, and hardware. Identity management is only a defense used to minimize attacks by preventing unauthorized access and is often added using an identity service and an authorization service.

Traditional IAM methods

Sign in with a username and password has been the typical method to authenticate users. It is still the most used method for authenticating users to products and applications. The method used to authenticate a user with a username and password differs based on whether it is used within a device, within a software, or within a remote environment. However, this method often poses a risk to a resource if the username and/or password could be attacked. Many methods to overcome issues with this method have been used.

Changing identity management methods

 

Using an additional method to authenticate users is one method to overcome issues with usernames and passwords. This is often called Multi-Factor Authentication (MFA) and is often used with a code that is sent in a text or email message. MFA is used as the main additional method in systems which use username and password for user identity. Many other methods for using MFA have been used with higher security.

Tokens are typically the method used in validating web service or external service-related calls. With access tokens, data including user permissions, roles, and policies for the user request is sent by an authentication server to the user. With access tokens, the payload (information about the user, resources, and other data used for authentication), the header (data about the token type), and signature is sent to a user. Tokens are often temporary methods used to access resources and often are invalid after a period.

New methods for IAM

Adaptive MFA is a new method used to authenticate users. With adaptive MFA, MFA can be used to change the method used to access resources. A common use of this method is when a user uses the same resource when travelling, working with a network of an organization, and when accessing them from a remote location. Using this type of user authentication, methods addition to MFA can be used when a user is working from a location outside an organization and easier methods to sign on such as use of identification tags after the initial login can be used when inside an organization.

Biometric methods are also emerging as user authentication methods to access resources.  Facial recognition, retina scans, and fingerprint mapping are some methods used to access resources. These are commonly used to reduce hassle of frequently using username and password-based logins to the same device or application. They are often used in addition to a username/password or pattern-based method to allow users to login when scanning biometrics fail. However, they are often more secure if the scanning is accurate as it identifies the user rather than data entered to a resource.

Image courtesy: https://www.perfecto.io/

TAGGED:access management rightsIdentity and Access ManagementIdentity managementTraditional IAM methods
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Email Copy Link Print
Previous Article Jesus is living in me SUNDAY CHOICE – Jesus is living in me
Next Article Rajan David Rajan David Moonesinghe – falls victim to Gun violence in US
FacebookLike
YoutubeSubscribe
LinkedInFollow
Most Read
10 Pictures With Fascinating Stories Behind Them!

“A PICTURE SPEAKS A 1000 WORDS” – By Des Kelly

Look past your thoughts so you may drink the pure nectar of this moment

A Life Hack for when we’re Burnt Out & Broken Down – By Uma Panch

Narration of the History of our Proud Ancestral (Orang Jawa) Heritage. by Noor R. Rahim

eLanka Weddings

eLanka Marriage Proposals

Noel News

Noel News

Noel News

Noel News- By Noel Whittaker

Appreciation: Eileen Mary Sibelle De Silva

K.K.S. Cement Factory

Dr.Harold Gunatillake’s 90th Birthday party

Sri Lanka's women's cricket squad in Melbourne

Cricket: Sri Lanka’s women’s squad in Melbourne

- Advertisement -
Ad image
Related News
Cholesterol Gets the Attention — But High Triglycerides Are Sri Lanka’s Silent Killer
Articles Dr Harold Gunatillake

Cholesterol Gets the Attention — But High Triglycerides Are Sri Lanka’s Silent Killer-by Harold Gunatillake

Ehipassiko and Sati-eLanka
Articles

Ehipassiko and Sati: Rethinking humanity through Laika and Aloka-by K.K.S Perera

Muscateers Gathering in the Land of the Royals on Friday May 1 2026
Articles

Muscateers Gathering in the Land of the Royals on Friday May 1 2026

Articles N.S.Venkataraman

DOES GOD PUNISH THE WRONG DOERS ?- by N.S.Venkataraman

Articles Sunil Thenabadu

NAVEESHA- A STAR IS BORN AFTER HER SEMI FINAL TRIUMPH AT VOICE SRI LANKA SEASON ONE IS SOUGHT AFTER TO SING IN TELIVISION-by Sunil Thenabadu

  • Quick Links:
  • Articles
  • DESMOND KELLY
  • Dr Harold Gunatillake
  • English Videos
  • Sri Lanka
  • Sinhala Videos
  • eLanka Newsletters
  • Obituaries
  • Sunil Thenabadu
  • Dr. Harold Gunatillake
  • Tamil Videos
  • Sinhala Movies
  • Trevine Rodrigo
  • Photos
  • eLanka Newsletter

eLanka

Your Trusted Source for News & Community Stories: Stay connected with reliable updates, inspiring features, and breaking news. From politics and technology to culture, lifestyle, and events, eLanka brings you stories that matter — keeping you informed, engaged, and connected 24/7.
Kerrie road, Oatlands , NSW 2117 , Australia.
Email : info@eLanka.com.au / rasangivjes@gmail.com.
WhatsApp : +61402905275 / +94775882546
  • About eLanka
  • Terms & Conditions

Disclaimer:
eLanka is committed to sharing positive and community-focused stories. We do not publish or endorse political, religious, or ethnic viewpoints. The content published on eLanka, including articles and newsletters, reflects the opinions and views of the respective authors and not those of eLanka. eLanka accepts no responsibility or liability for the accuracy, completeness, or consequences of any content provided by contributors.

(c) 2005 – 2025 eLanka Pty Ltd. All Rights Reserved.