Modern data exchange between systems: Why iPaaS is the future
In a world where systems need to be ever more closely linked, it is no longer enough to view standards such as SCIM as a universal solution for exchanging identity and user data.
Read moreModern data exchange between systems: Why iPaaS is the future
Discover why iPaaS is the future of data exchange: flexible, efficient & use case-oriented. Make your systems fit for the ...
Why SCIM challenges the exchange of user identities?
Why SCIM challenges the exchange of user identities? The System for Cross-domain Identity Management (SCIM) standard was originally developed to ...
Smooth migration to cidaas – The migration guide for Identity & Access Management
Migrating to a new Identity & Access Management solution can be a challenging task. It is an important part of ...
Seamless connectivity – integration of cidaas with cnips (iPaaS)
Seamless integration of your (customer) identity & access management solution with other systems such as CRM, marketing automation and ERP ...
Branded User Experience – Login UI in your own design with cidaas Hosted Pages
A well-designed login experience is not only functional, but also an essential part of your company's brand identity. With cidaas ...
Seamless integration of OAuth 2.1 with cidaas
Authentication and authorization of users is an essential part of modern web applications. In this blog post, we will explore ...
6 trends in (customer) identity & access management for 2024: a comprehensive insight
In the ever faster evolving digital world, (Customer) Identity & Access Management is central to a seamless and secure user ...
Fine sand – why many CIAM installations require finer authorization
In recent years, many companies have successfully modernized both their internal access management systems (AM) for employees and their access ...
Passwordless authentication – the future of logging in
In the ever-changing digital world, online identity security is playing an increasingly important role. Account takeover, i.e. the hacking of ...
Online Access Act – implementation made easy with a powerful Customer Identity & Access Management
The Online Access Act (OZG) and its ongoing development (OZG Amendment Act) are important milestones in the digitalization of German ...
Two-factor authentication: when does it become a requirement?
Currently, the use of authentication methods is voluntary in many cases, which often leads to the additional security mechanisms being ...
NIS2 – the future of cybersecurity in the EU: What companies need to know now
The European Union has adopted a new directive - NIS2. But what exactly does NIS2 regulate and who is affected? ...



