Modern data exchange between systems: Why iPaaS is the future

In a world where systems need to be ever more closely linked, it is no longer enough to view standards such as SCIM as a universal solution for exchanging identity and user data.

Read more
Modern data exchange between systems

Identity & Access Management as a Core Building Block of cyber insurance: multi-factor authentication 

In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...

The Professional secrecy holders and Identity & Access Management 

In this blog, we will take a closer look at a special professional group - the professional secrecy holders - ...

Authentication vs. Authorization – how both concepts work hand in hand 

The concepts of authentication and authorization, and in particular the difference between the two, still cause some difficulties in understanding ...

Top 3 Software Trends in 2023 – so far! 

Halfway through 2023, it's time to take a look at the top 3 software trends so far. New and cool ...

Group selection as the key to an easy and consistent user experience – The cidaas Group Management in a Nutshell

Consistent user experience and navigation in the context of user groups, especially where a user is a member of multiple ...

An overview of the Group Admin UI functionalities – Guide to the extended cidaas Group Admin UI

In this second part of our blog series “The cidaas Group Management in a Nutshell”, we take a closer look ...

The cidaas group management – delegated user administration quick and easy! For family & friends or B2B use cases. 

The blog series – “The cidaas group management in a nutshell” - shows how the most diverse use cases from ...

Bye bye password – an easy way to to modern authentication with cidaas

Learn how organizations can transition their employees, customers, and partners from a traditional user ID and password to easier and ...

Keycloak-as-a-Service – Open-Source Vendor-LockIn?

Keycloak-as-a-Service is a service around the open source solution Keycloak - but why is cidaas as SaaS the best Keycloak ...

A Guide to Complete Zero Trust – Identity as the core building block of Zero Trust 

Find out everything about identity as the core building block of Zero Trust. Read about the IT security concept & ...

A Guide to Complete Zero Trust – How Forrester and Google have made Zero Trust mainstream?

In this third part of our blog on “A Guide to Complete Zero Trust”, we delve deeper into the historical ...

A Guide to Complete Zero Trust – Cloud, Mobile and Remote-work as Drivers of the Zero Trust Approach

The IT landscape has indeed changed massively in recent years. In this second blog in our “A Guide to Complete ...