Fig. 5From: Adaptive identity and access management—contextual data based policiesExample of access privilege activation analysisBack to article page