Modern data exchange between systems: Why iPaaS is the future
In a world where systems need to be ever more closely linked, it is no longer enough to view standards such as SCIM as a universal solution for exchanging identity and user data.
Read moreIdentity & Access Management as a Core Building Block of cyber insurance: multi-factor authentication
In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...
The Professional secrecy holders and Identity & Access Management
In this blog, we will take a closer look at a special professional group - the professional secrecy holders - ...
Authentication vs. Authorization – how both concepts work hand in hand
The concepts of authentication and authorization, and in particular the difference between the two, still cause some difficulties in understanding ...
Top 3 Software Trends in 2023 – so far!
Halfway through 2023, it's time to take a look at the top 3 software trends so far. New and cool ...
Group selection as the key to an easy and consistent user experience – The cidaas Group Management in a Nutshell
Consistent user experience and navigation in the context of user groups, especially where a user is a member of multiple ...
An overview of the Group Admin UI functionalities – Guide to the extended cidaas Group Admin UI
In this second part of our blog series “The cidaas Group Management in a Nutshell”, we take a closer look ...
The cidaas group management – delegated user administration quick and easy! For family & friends or B2B use cases.
The blog series – “The cidaas group management in a nutshell” - shows how the most diverse use cases from ...
Bye bye password – an easy way to to modern authentication with cidaas
Learn how organizations can transition their employees, customers, and partners from a traditional user ID and password to easier and ...
Keycloak-as-a-Service – Open-Source Vendor-LockIn?
Keycloak-as-a-Service is a service around the open source solution Keycloak - but why is cidaas as SaaS the best Keycloak ...
A Guide to Complete Zero Trust – Identity as the core building block of Zero Trust
Find out everything about identity as the core building block of Zero Trust. Read about the IT security concept & ...
A Guide to Complete Zero Trust – How Forrester and Google have made Zero Trust mainstream?
In this third part of our blog on “A Guide to Complete Zero Trust”, we delve deeper into the historical ...
A Guide to Complete Zero Trust – Cloud, Mobile and Remote-work as Drivers of the Zero Trust Approach
The IT landscape has indeed changed massively in recent years. In this second blog in our “A Guide to Complete ...