Workforce IAM – The Evolution which is a Revolution: The Impact of CIAM on WIAM

For many years, Identity & Access Management (IAM) systems in companies were focused on the internal organization, the employees and the access to internal company software systems and possibly other resources.

Read more
Support by cidaas

The Professional secrecy holders and Identity & Access Management 

In this blog, we will take a closer look at a special professional group - the professional secrecy holders - ...

Authentication vs. Authorization – how both concepts work hand in hand 

The concepts of authentication and authorization, and in particular the difference between the two, still cause some difficulties in understanding ...

Top 3 Software Trends in 2023 – so far! 

Halfway through 2023, it's time to take a look at the top 3 software trends so far. New and cool ...

Group selection as the key to an easy and consistent user experience – The cidaas Group Management in a Nutshell

Consistent user experience and navigation in the context of user groups, especially where a user is a member of multiple ...

An overview of the Group Admin UI functionalities – Guide to the extended cidaas Group Admin UI

In this second part of our blog series “The cidaas Group Management in a Nutshell”, we take a closer look ...

The cidaas group management – delegated user administration quick and easy! For family & friends or B2B use cases. 

The blog series – “The cidaas group management in a nutshell” - shows how the most diverse use cases from ...

Bye bye password – an easy way to passwordless authentication with cidaas 

Learn how organizations can transition their employees, customers, and partners from a traditional user ID and password to easier and ...

Keycloak-as-a-Service – Open-Source Vendor-LockIn?

Keycloak-as-a-Service is a service around the open source solution Keycloak - but why is cidaas as SaaS the best Keycloak ...

A Guide to Complete Zero Trust – Identity as the core building block of Zero Trust 

Find out everything about identity as the core building block of Zero Trust. Read about the IT security concept & ...

A Guide to Complete Zero Trust – How Forrester and Google have made Zero Trust mainstream?

In this third part of our blog on “A Guide to Complete Zero Trust”, we delve deeper into the historical ...

A Guide to Complete Zero Trust – Cloud, Mobile and Remote-work as Drivers of the Zero Trust Approach

The IT landscape has indeed changed massively in recent years. In this second blog in our “A Guide to Complete ...

A Guide to Complete Zero Trust – What is ‘Zero Trust’ and why do we need it? 

For some years now, the entire IT sector has been in a state of upheaval, which has triggered simultaneously a ...