In this part of the bootcamp, we plan to discuss what Identity and Access Management brings to the table. We will also discuss how IAM technologies can assist in managing security risks associated with the use of Microservices. We will also discuss which IAM technologies are most effective in managing what kinds of security risks and why. In the later part of this section, we will also discuss delivering ‘IAM as Microservices’ and benefits and challenges of this approach.