cidaas blog

Blog

passwordless

Bye bye password – an easy way to passwordless authentication with cidaas 

Learn how organizations can transition their employees, customers, and partners from a traditional user ID and password to easier and more secure authentication methods. Bye bye password - an easy way to multifactor authentication with cidaas based login to passwordless authentication and why this path is very important for everyone's security ...
Read More
cidaas the best alternative to Keycloak

Keycloak-as-a-Service – Open-Source Vendor-LockIn?

Keycloak-as-a-Service is a service around the open source solution Keycloak - but why is cidaas as SaaS the best Keycloak alternative ...
Read More
A Guide to Complete Zero Trust - What is ‘Zero Trust’ and why do we need it?

A Guide to Complete Zero Trust – Identity as the core building block of Zero Trust 

Find out everything about identity as the core building block of Zero Trust. Read about the IT security concept & what role verification plays ...
Read More
A Guide to Complete Zero Trust - How Forrester and Google have made Zero Trust mainstream?

A Guide to Complete Zero Trust – How Forrester and Google have made Zero Trust mainstream?

In this third part of our blog on “A Guide to Complete Zero Trust”, we delve deeper into the historical aspects of the concept of Zero Trust ...
Read More
A Guide to Complete Zero Trust - What is ‘Zero Trust’ and why do we need it?

A Guide to Complete Zero Trust – Cloud, Mobile and Remote-work as Drivers of the Zero Trust Approach

The IT landscape has indeed changed massively in recent years. In this second blog in our “A Guide to Complete Zero Trust” blog series, we take a closer look at two of the biggest changes in recent years and analyze what impact these changes are having on IT security ...
Read More
A Guide to Complete Zero Trust - What is ‘Zero Trust’ and why do we need it?

A Guide to Complete Zero Trust – What is ‘Zero Trust’ and why do we need it? 

For some years now, the entire IT sector has been in a state of upheaval, which has triggered simultaneously a paradigm shift in IT security; consequently, the IT security concept ‘Zero Trust’ has acquired immense importance ...
Read More
Future Success Factors for Software as a Service (SaaS) Provider - Customer Identity & Access Management with Group Management and Integration of Identity Providers (IdPs)

Success Factors for Software as a Service (SaaS) Provider – Customer Identity & Access Management with Group Management and Integration of Identity Providers (IdPs)

Group management and identity providers (IdPs) are success factors for SaaS providers - Customer Identity & Access Management with cidaas ...
Read More
SAAS

Customer Identity & Access Management and Customer Experience become Enthusiasm Factors for Software as a Service Provider

Software as a Service (SaaS) is the future for many software solutions - there are many reasons for this, including quick and easy setup, low maintenance, and fast availability of new features. There is much to be said for the use of SaaS solutions. But what do SaaS providers have to do to inspire customers? Enthusiasm (also known as Attractive Qualities) decides today more than ever about winning and losing customers ...
Read More
Automated Video Identification with AutoIdent by cidaas ID Validator now becomes TKG Compliant

Automated Video Identification with AutoIdent by cidaas ID Validator now becomes TKG Compliant

Great moments of official recognition for cidaas ID Validator! Automated video identification with AutoIdent by cidaas ID Validator will be TKG compliant as soon as the new TKG amendment becomes legally effective, i.e., by December 1, 2021 ...
Read More
take a auth shot pkce Grant

Take a auth-shot – PKCE Grant

What is the OAuth 2.0 Authorization Code - PKCE Grant? - PKCE = best for Single Page Applications (SPA) - More in the take a auth-shot blog 📚 ...
Read More