IntroductionIn an increasing digital environment, balancing the efficiency and security of business and ITsolutions is of utmost importance. As Identity and Access Management is a cornerstone ofInformation Security, providing controlled access to systems and applications is crucial to anycompany. On the other hand, the number and variety of applications and systems that peopleneed to access increases rapidly, hence an equal high demand for solutions that are easy-to-useand efficient. Being able ..