
Organizations now have an innumerable amount of data and information. Incidents of theft of confidential data from workplace have been rising significantly. Thus, every organization is now investing to enhance the existing security infrastructure. However, security systems do not affect the profitability of the organization directly but any security breach may pose a considerable threat to the organization's reputation and value. Hence identity management systems play a very important role, as this framework involves identification of individuals within a network, country or an enterprise to give them required access for business operations. identity and access management (IAM) required initiating, capturing, recording and managing the data related to identities and access permission. An IAM system is used for authorization, authentication, central user repository and for user management.