Do you want to offer your users secure & convenient access to your digital channels?
With cidaas this is no longer a problem. Whether with biometric features, uniquely generated codes or via social login: cidaas enables you to offer your users simple, fast and secure password alternatives. For especially sensitive accounts, two-factor authentication (requesting a second factor) can further increase security.
Modern authentication procedures
Most devices already support fingerprint technology. We make this technology available for you.
Orientation points provide viewpoint attributes for the clear identification of the user.
To verify the user’s identity, a user must confirm his chosen pattern, as with the well-known mobile blocking pattern.
Verification codes are sent as a text message.
A person’s voice signature is unique and can therefore be used for secure biometric verification.
Social Login and Enterprise Identity Provider
With the help of a social media account, a login can be made to an external provider.
Default option where the verification codes are sent by E-mail.
With the help of certain browser providers, the login via (USB-)token, fingerprint or other biometric methods is possible.
A technology which uses the push notification of a mobile device and requires the user to select the correct code
In case a user does not have his mobile phone in hand or cannot receive codes via SMS, voice call, using the cidaas Authenticator app, he would use the back-up code to login.
TOTP (Time-based One-time Password) is a temporary, six- or eight-digit access code generated by an algorithm. Based on the time and device, it is used for user authentication.
Verification codes are communicated by voice call.
Unique user identification
Cloud Identity and Access Management Platform
cidaas is ideal for providing your users with easy and secure access to your channels as well as offering many other features. With cidaas, you can manage a wide range of customers, employees or partners and their identities on a central platform. Inspire your users with excellent user comfort and create trust through strong security. We will show you which functions this includes.
Single Sign-On (SSO)
Using SSO, one registration is enough to access all services.
Cookie Consent, consent forms, general terms and conditions - using cidaas consent management you can manage all consents from A to Z, remain compliant with EU-GDPR and create transparency on versions and approved consents to you and your users
cidaas offers many different authentication methods e.g., biometric methods such as TouchID or WebAuthn, One-Time Password and FIDO. Some authentication methods implicitly use several factors or use cidaas to query further factors sequentially in the process.
By login and registration through common social providers, your customers can easily and quickly access your applications and services.
Know Your Customer
Use Progressive User Profiling to create convenient registration processes and other functions to create comprehensive profiles of your users.
Real World Identification
Link digital and real identities through technologies such as Geofences, BLE or NFC - for excellent services, offers and smart access control to buildings.
Choose the plan that is most suitable for you
Test the free service package now!