Welcome to Scholar Publishing Group

International Journal of Big Data Intelligent Technology, 2026, 7(1); doi: 10.38007/IJBDIT.2026.070104.

Security Improvement and Application of Identity and Access Management in Saas Platform

Author(s)

Qingyang Zhang

Corresponding Author:
Qingyang Zhang
Affiliation(s)

Simon Business School, University of Rochester, Rochester 14627, NY, United States

Abstract

With the widespread application of SaaS platforms in various enterprises, Identity and Access Management (IAM), as the core mechanism for ensuring platform security and user data privacy, is facing multiple challenges such as multi tenant environments, complex permission configurations, and integration of third-party interfaces. This article analyzes the functional scope and architecture composition of IAM on the architecture of SaaS systems, deeply discusses the main security issues that IAM faces in practical use, and proposes targeted solutions such as multi factor authentication, zero trust architecture, and unified identity system. The aim is to build an efficient, secure, and scalable IAM system suitable for SaaS platforms, enhance the overall platform's security and customer trust, and provide theoretical support and practical reference.

Keywords

SaaS platform; Identity and Access Management (IAM); Multi-factor authentication

Cite This Paper

Qingyang Zhang. Security Improvement and Application of Identity and Access Management in Saas Platform. International Journal of Big Data Intelligent Technology (2026), Vol. 7, Issue 1: 28-34. https://doi.org/10.38007/IJBDIT.2026.070104.

References

[1] Vegas J, Llamas C. Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments. Future Internet, 2024, 16(12):469-469.

[2] Glöckler J, Sedlmeir J, Frank M, et al. A Systematic Review of Identity and Access Management Requirements in Enterprises and Potential Contributions of Self-Sovereign Identity. Business & Information Systems Engineering, 2023, 66(4):421-440.

[3] Wu Y, Pang M, Ma J, et al. An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine. Sensors, 2025, 25(7):2118-2118.

[4] Cambou F B, Alam M. Challenge–Response Pair Mechanisms and Multi-Factor Authentication Schemes to Protect Private Keys. Applied Sciences, 2025, 15(6):3089-3089.

[5] Sousa J D M, Gondim L R P. A multi-factor user authentication protocol for the internet of drones environment. Peer-to-Peer Networking and Applications, 2025, 18(2):69-69.

[6] Lu, Z. (2025). AI-Driven Cross-Cloud Operations Language Standardisation and Knowledge Sharing System. European Journal of AI, Computing & Informatics, 1(4), 43-50.

[7] Yu, X. (2025). Application Analysis of User Behavior Segmentation in Enhancing Customer Lifetime Value. Journal of Humanities, Arts and Social Science, 9(10).

[8] Zheng, H. (2025). Research on Delay-aware Scheduling Algorithms for Edge Task Migration in High-concurrency Environments. Engineering Advances, 5(4).

[9] Li, J. (2025). The Impact of Distributed Data Query Optimization on Large-Scale Data Processing.

[10] Dingyuan Liu. The Relationship between Household Consumption Pattern Changes under Disasters and the Recovery of Business Ecosystems. Academic Journal of Business & Management (2025), Vol. 7, Issue 12: 151-156.

[11] Lu, Z. (2025). Design and Practice of AI Intelligent Mentor System for DevOps Education. European Journal of Education Science, 1(3), 25-31.

[12] Zheng, H. (2025). Research on Lifecycle Configuration and Reclamation Strategies for Edge Nodes Based on Microservice Architectures. Advances in Computer and Communication, 6(5).