Through use of cloud computing, information may be accessible from a range of different types of devices. It is now possible to communicate with a company at any time or location, regardless of location or time zone. Using the cloud has a number of advantages, some of which include lower expenditures on information technology and infrastructure expenses, more agility, and improved continuity planning. These benefits can only be attained via the implementation of a reliable identity and access control system for cloud applications and services. Managing these identities and limiting the access that cloud clients and applications have continues to be a significant challenge in the modern day. In order to strengthen the protection offered by a venture, it is necessary to set up a trust worthy identity and access management (IAM) system in the cloud. The findings of this study provide an intelligent and reliable IAM system that is based on cloud computing.