This project presents a dynamic, risk-based approach to identity security using risk-scoring algorithms for five real-time use cases. By applying zero-trust principles, sign-in logs are analyzed for anomalies, classifying users and devices as risky or safe. Results are displayed on a dashboard, enabling security admins to make informed decisions.
java html spring-boot salesforce microsoft-azure privileged-access-management identity-and-access-management zero-trust-security
- Updated
Nov 25, 2024 - Java