Identity and Access Management

Discuss in 550 words or more why, in this age of distributed computing, centralized IAM systems are necessary.