a) Identity management: It authorizes the application services
b) Access control: permission has to be provided to the users so that they can control the access of another user who is entering into the cloud environment.
c) Authentication and Authorization: Allows only the authorized and authenticated user only to access the data and applications