A Three-Step Approach for Taking Identity and Access Management to the Cloud