Note: Timings
  for
  all events
  are listed in the local timezone detected
  from your browser - 
        
          
          
          
                    
            Access control is ultimately about relationships—between people, systems, and resources. In this talk, we’ll look at how modeling connected identities with a graph database unlocks a more efficient and transparent way to manage Identity and Access Management (IAM).
Using Neo4j and Python, we’ll walk through a practical approach to building an IAM system that prioritizes clarity, performance, and portability. You’ll learn how to model users, roles, and permissions as a connected graph, write access logic in Cypher, and deploy a lightweight system that scales without adding complexity.