The next underpinning service used is the Identity and Access Management Service. Traditionally, this meant having a common directory which the applications can query to authenticate end users.Â
The IAM is normally a team effort between the system that can store and authenticate the users (the directory), and also provide the ability for us to tag the users and the application in some way. The application uses the tags in order to control the permissions for the user. The ability to fine-tune the authorization is called Role Based Access Control (RBAC).Â
So, it can safely be assumed that the authentication is dependent on the directory. The authorization on the other hand is dependent on the application, which use the tags that are associated to the user or that the user is associated to.Â