I. Introduction
Identity and Access Management (IAM) is pivotal in safeguarding digital and at times physical identities. IAM solution is being extensively used in a typical on-premises environment where deploying organisations own everything including user administration, cost of software, underlying support infrastructure along with security aspects such as vulnerability and patch management, as well as penetration testing. On the other side, in a cloud-based model such as Infrastructure as a server (laaS), Software as a Service (SaaS) IAM is addressed by the Cloud service provider (CSP).