Workforce IAM – The Evolution which is a Revolution: The Impact of CIAM on WIAM

For many years, Identity & Access Management (IAM) systems in companies were focused on the internal organization, the employees and the access to internal company software systems and possibly other resources.

Read more
Support by cidaas

An AutoIdent in the SCHUFA MyConnect hub – The role of the cidaas ID validator! 

The SCHUFA, whoever hears this name, immediately thinks of credit assessment, creditworthiness and not without reason. Schufa is the largest ...

Identity & Access Management as a Core Building Block of cyber insurance: multi-factor authentication 

In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...

The Professional secrecy holders and Identity & Access Management 

In this blog, we will take a closer look at a special professional group - the professional secrecy holders - ...

Authentication vs. Authorization – how both concepts work hand in hand 

The concepts of authentication and authorization, and in particular the difference between the two, still cause some difficulties in understanding ...

Top 3 Software Trends in 2023 – so far! 

Halfway through 2023, it's time to take a look at the top 3 software trends so far. New and cool ...

Group selection as the key to an easy and consistent user experience – The cidaas Group Management in a Nutshell

Consistent user experience and navigation in the context of user groups, especially where a user is a member of multiple ...

An overview of the Group Admin UI functionalities – Guide to the extended cidaas Group Admin UI

In this second part of our blog series “The cidaas Group Management in a Nutshell”, we take a closer look ...

The cidaas group management – delegated user administration quick and easy! For family & friends or B2B use cases. 

The blog series – “The cidaas group management in a nutshell” - shows how the most diverse use cases from ...

Bye bye password – an easy way to passwordless authentication with cidaas 

Learn how organizations can transition their employees, customers, and partners from a traditional user ID and password to easier and ...

Keycloak-as-a-Service – Open-Source Vendor-LockIn?

Keycloak-as-a-Service is a service around the open source solution Keycloak - but why is cidaas as SaaS the best Keycloak ...

A Guide to Complete Zero Trust – Identity as the core building block of Zero Trust 

Find out everything about identity as the core building block of Zero Trust. Read about the IT security concept & ...

A Guide to Complete Zero Trust – How Forrester and Google have made Zero Trust mainstream?

In this third part of our blog on “A Guide to Complete Zero Trust”, we delve deeper into the historical ...