Workforce IAM – The Evolution which is a Revolution: The Impact of CIAM on WIAM
For many years, Identity & Access Management (IAM) systems in companies were focused on the internal organization, the employees and the access to internal company software systems and possibly other resources.
Read moreWhy SCIM challenges the exchange of user identities?Â
Why SCIM challenges the exchange of user identities? The System for Cross-domain Identity Management (SCIM) standard was originally developed to ...
Smooth migration to cidaas – The migration guide for Identity & Access Management
Migrating to a new Identity & Access Management solution can be a challenging task. It is an important part of ...
Seamless connectivity – integration of cidaas with cnips (iPaaS)
Seamless integration of your (customer) identity & access management solution with other systems such as CRM, marketing automation and ERP ...
Branded User Experience – Login UI in your own design with cidaas Hosted PagesÂ
A well-designed login experience is not only functional, but also an essential part of your company's brand identity. With cidaas ...
Seamless integration of OAuth 2.1 with cidaas
Authentication and authorization of users is an essential part of modern web applications. In this blog post, we will explore ...
6 trends in (customer) identity & access management for 2024: a comprehensive insight
In the ever faster evolving digital world, (Customer) Identity & Access Management is central to a seamless and secure user ...
Fine sand – why many CIAM installations require finer authorization
In recent years, many companies have successfully modernized both their internal access management systems (AM) for employees and their access ...
Passwordless authentication – the future of logging in
In the ever-changing digital world, online identity security is playing an increasingly important role. Account takeover, i.e. the hacking of ...
Online Access Act – implementation made easy with a powerful Customer Identity & Access Management
The Online Access Act (OZG) and its ongoing development (OZG Amendment Act) are important milestones in the digitalization of German ...
Two-factor authentication: when does it become a requirement?
Currently, the use of authentication methods is voluntary in many cases, which often leads to the additional security mechanisms being ...
NIS2 – the future of cybersecurity in the EU: what companies need to know now
The European Union has adopted a new directive - NIS2. But what exactly does NIS2 regulate and who is affected? ...
The shift from on-premise to cloud-based IAM solutions: Trends in Identity & Access Management (IAM)Â
In today's digital world, Identity & Access Management (IAM) is crucial to ensure the security and smooth running of business ...