Access management (AM) applies to technologies that use access control engines to provide centralized authentication, single sign-on (SSO), session management and authorization enforcement for target applications in multiple use cases. Access managers have evolved from early "web access managers." Target applications may have traditional web application architectures using web browsers and web application servers, and these applications may run on customers' premises or in the cloud. Capabilities have expanded to support native mobile or hybrid mobile applications. In addition, these applications may run on internet-connected things with or without human operators. Protected target resources may include on-premises or SaaS applications and web services APIs across business-to-employee (B2E), B2B and B2C use cases.
Select a vendor to view user ratings and reviews.