Differences from Traditional ITLife Cycle for Identity and AccessRequestApproveCreate, Delete, Grant, or RevokeAuthenticationCloud IAM IdentitiesBusiness-to-Consumer and Business-to-EmployeeMulti-Factor AuthenticationPasswords, Passphrases, and API KeysShared IDsFederated IdentitySingle Sign-OnInstance Metadata and Identity DocumentsSecrets ManagementAuthorizationCentralized AuthorizationRolesRevalidatePutting It All Together in the Sample ApplicationConclusionExercises