IT 2.0
Identity, Access & Role Management Role Management -Secured Authentication and Access Control Role mapping – One time activity IT 1.0 Roles mapped to Users Repetitive work as the duties of a user changes everytime he gets transferred promoted deputed etc IT-20 Roles mapped to Posts One time activity as the roles are mapped to Post […]






































































































































































































