Finally, there is the information-centric view within IAM/IAG. Aside of services that allow managing users and their access, information must be managed and protected. This final part of the workshop will have a closer look at how to set up Secure Information Sharing as a service within the IAM strategy of large organizations.