Blog EN

Blog EN, Real World Identification

Tante Emma 2.0 – The unique customer experience, thanks to the linking of the offline and online worlds

Who still remembers it? The little shop around the corner where “Aunt Emma” was still standing behind the counter selling everyday essentials to her customers. The special thing about these shops was that “Aunt Emma” often knew her customers from an early age and therefore knew exactly what their preferences were and what they liked to buy. She knew when the budgie needed new food again and which type of bread was eaten by all family members. And obviously, the inevitable “candy” to eat on the way could not be missed!

Today, “Tante Emma“ or the traditional “mom and pop“ stores have largely disappeared from the scene. The changes that the retail industry, in particular, has undergone in the course of digitalization are immense. Communication, sales and customer contact takes place predominantly in the digital world. As a result, shopping no longer starts at the doorstep of the store.

Digitalization of the POS bridges the gap inorder to present a continuous customer journe

One thing that has not changed and has in fact gained relevance with increasing digitalization: Understanding the customer and his needs. In the online world, personalized advertising is already common practice and is regarded as the decisive success criterion. In the offline world, i.e. in the real world, there is often still some catching up to do. The digitalization of the point of sale represents a “must-have” for a successful future for retail companies, because in the physical world the same principle applies, as in the digital world: Only those who know their customers do business. Tante Emma (Aunt Emma) already knew this!

The touchpoints that customers access today before making a purchase are manifold. They cannot be limited to online or offline, but rather consist of a mix of both the worlds.

The word of the hour is: Omnichannel. Customers shop conveniently using a tablet or PC from home, on a smartphone while on the move, or – even today – visit a stationery shop. For retailers, this means that they now have to cater to all channels. Many have already done so and offered their customers not only stationery stores but also online shops and smartphone apps as digital customer cards. What many still lack, however, is the link between the digital and the real world in order to make the customer journey consistent and the customer experience unique.

Connecting the real world with the digital world – quite easily: with CIAM and Location Based Services

Thanks to modern location-based service technologies, customers can be identified at the POS via their devices with the help of apps. A Customer Identity and Access Management (CIAM) serves as an interface between the localization technology and the device/app and can uniquely identify the customer. This enables retailers to address their customers at the POS in the same personalized way as they do today on online channels. In addition to the unique authentication of customers, a CIAM also offers a 360° view of user data, thus providing a consistent shopping experience across all channels. This also turns the stationary shop into a networked world of experience.


With geofencing, a certain area around the shop is virtually fenced in. If a registered customer enters this zone, he is recognized via GPS and automatically receives targeted marketing messages such as the indication of a discount via push messaging, SMS or email on his mobile device.


Beacons are small mini transmitters and are often used within stores to mark certain areas, analyze them or, like geofencing, trigger messages to customers in the store. In contrast to geofencing, the beacon range is rather limited.

NFC (Near field communication

NFC is a wireless transmission technology that is mainly used today for mobile payment. However, NFC technology can also be used to communicate offers or product information to customers. The technological developments presented in the field of information transfer make it possible to locate customers or their mobile devices. But how do the little helpers manage to determine the identity of the customer and trigger marketing messages according to their taste? This is exactly where a CIAM system comes into play.

Omnichannel Experience for Customers

By using a customer identity management system, touchpoints – whether online or offline – are synchronized and linked to the real identity of the buyer. If a buyer has been known in the “online world” for a long time, Real World Identification at the POS allows this digital customer profile to be linked to the actual person – making the purchase an omnichannel experience for the customer:

  • Real-world identification: thanks to smart information technologies, the real person can be linked to the digital identity as soon as the person approaches the shop
  • Proximity Marketing: through holistic user profiles, targeted campaigns can be managed, which in turn leads to a
  • Higher conversion due to individual addres

In this blog post we have described how a CIAM can get the customer journey going and sustainably contribute to a higher conversion rate.

Thanks to CIAM, the stationary shop has become a networked world of experience.

The Customer Journey has become more multifaceted in times of Omnichannel retailing

Retail is changing: online trade is booming, but over-the-counter trade also remains an important sales channel. Consumers no longer want to have to choose between online and offline, but prefer to use all sales channels in parallel. The key to continued success in the future can clearly be summarized by the key words “Omnichannel” or “Synchronization of touchpoints”. Where digital touchpoints such as online shops or apps merge with traditional customer contact points, the customer experiences the “Tante Emma feeling” of the past and will always remain a loyal customer.

Are you a retailer and would like to learn more about the use of customer identity management at your POS? Simply book a non-committal appointment for a meeting

Blog EN

Happy Birthday GDPR

The new data protection regulation turns 1 year old

The new edition of the European Union – General Data Protection Regulation (EU-GDPR) celebrates its first anniversary today.
But even one year after it’s coming into force, many still ask what exactly is behind the GDPR and the effects it has on companies and the management of personal data.

The Data Protection Act of the European Union, in effect since 25 May 2018, is considered one of the most important changes to data privacy regulations. It defines how the personal data of EU citizens must be handled. In short, citizens now have more rights to know their data, that companies store and can have the data deleted upon request. Businesses, on the other hand, must ensure that data is handled in a lawful manner and make the processing of personal data more transparent and secure. The regulation comes with clearly defined penalties for non-compliance – companies could be fined up to 4% of their annual global turnover or €20 Million (whichever is greater).

Less progress in compliance with the data protection regulation

One year after the GDPR came into effect, there was no major wave of warnings, but more than 59,000 violations were reported throughout Europe. A study by the Digital Association Bitkom e.V. also shows that so far only 24% of all German companies have fully implemented the GDPR. This leads to the conclusion that many companies still have difficulties in fully implementing and complying with the Data Protection Regulation.

The successful implementation of the GDPR remains a major challenge.

The hurdles that companies still face today are more or less the same as they were a year ago:

  • Numerous data silos: Companies often store personal customer data across multiple systems. This makes it very difficult to gain a holistic view of personal data and the corresponding processing of data.
  • Incomplete Self-Services: The GDPR stipulates that the personal data of people should always be up to date – preferably by leveraging the function of self-service. Due to the data silos that companies have, this becomes an impractical challenge.
  • Insufficient data governance: Access to data must be mapped in all applications via centralized data access policies. In most cases, these role-based access privileges, which should be built according to the “need to know” principle, are not comprehensively implemented across the operational file system.
  • Lack of data security: The GDPR requires the implementation of technical and organisational measures (TOM) to protect data. Many companies have not yet fully complied with these security requirements, which include data encryption.

Customer Identity and Access Management helps you become GDPR-compliant

For companies that have not yet completed their GDPR homework, the implementation of customer identity and access management software such as cidaas is the optimal solution for managing digital identities on a single unified platform.

CIAM makes you GDPR compliant at one go:

Figure 1: cidaas centralizes the management of your digital identities on one platform

  1. Management of consents
    Informational self-determination of every single individual provides the basis of the GDPR. As soon as the data subject gives his unambiguous consent, or a legal allowance is granted the data processing is permitted (principle of prohibition).

    • Companies should collect the consent of the data subject at the start of data collection e.g. during the registration process or if a change of the purpose of use occurs (art. 6 (1) point (a) GDPR)
    • The data subject can withdraw his or her consent. The withdrawal shall be as easy as giving consent (art. 7 (3) GDPR)
    • The company must provide a proof of consent on request (formal requirement, mandatory record) (art. 7 para. 1 EU-GDPR)

    cidaas fully supports you in the management of consent preferences and offers you the possibility to send stored personal data (PII= personally identifiable information) to your customers at the push of a button.

  2. User Self-Services
    According to Art. 5 para. 1 d), personal data must be factually correct and, if necessary, up to date. Furthermore, all reasonable measures must be taken to ensure that personal data which are inaccurate with regard to the purposes of their processing are deleted or rectified without delay (“accuracy”).
    So why not give the customer himself the control over it? After all, he knows best about his personal data.

    With cidaas, you return control over data management to the user and
    thus ensure that the data is up to date.

  3. Data Security
    Art. 32 of the GDPR requires the implementation of technical and organisational measures (TOM) to protect data. However, what this means exactly and what actions must be taken to ensure data security is not specified in more detail.

    A CIAM solution such as cidaas guards personal data and protects it from unauthorized access through procedures such as two-factor authentication (2FA) and biometric registration procedures. Furthermore, the integrated role and group management of cidaas makes it possible to trace exactly who accessed which data and which changes were made. Thus every data entry, change and deletion can be traced, as required by Art. 5 para. 1 EU-GDPR.

  4. One identity across multiple channels
    In order to comply with the stricter regulations of the Data Protection Regulation, companies must abandon stand-alone applications.

    Customer Identity and Access Management consolidates the existing data silos and enables the management of all user data on one platform.

Data protection can only be achieved through targeted identity management.

In the past, data protection was a fringe issue, but today violations are penalized with heavy fines. As current studies show, the implementation of the GDPR still has gaps in many companies today.

By using a Customer Identity and Access Management solution, you can master the technical requirements of the Data Protection Regulation.

Have you still not completely fulfilled the requirements of the GDPR and still need support in its implementation? Contact us or start today with our free cidaas Freeplan

CIAM Guide: What need to be considered when choosing a Customer Identity and Access Management solution?

Find out in our guide which criteria you should consider when making your decision.

Blog EN

Data protection and process optimization – how do they go hand in hand?

Implementation of Identity and access management in the Healthcare industry

The EU-GDPR is already live in action and no industry would be spared. The healthcare sector is hence forced to strictly adhere to the regulations, failing which, a huge penalty could be imposed. Companies that have a digital presence are wary of it – up to 4% of the annual turnover of the organization could be levied in the event of non-compliance.

It is claimed that medical records are worth more than credit card information in the black market– and the strict enforcement of such data protection regulations that come in the wake of data breaches is not surprising. In the light of digitalization, the best way to remain compliant and protect digital assets is to adopt the right digital strategy – to be precise, the best option is to embrace a CIAM (Customer Identity and Access management) product that offers the highest standards of security and facilitates regulatory compliance through a robust consent management system.

The Healthcare industry involves a diverse group of stakeholders that includes doctors, pharmaceutical companies, medical insurance companies, medical engineering companies, medial diagnostics providers etc. and most importantly, the patients. By implementing an Identity and access management solution, the cumbersome task of managing roles, accesses and privileges of such a varied group of users is simplified, thereby helping organizations focus on their core activities and the same time be compliant to all local and regional data privacy regulations. The use of latest biometric techniques to support authentication and authorization only enhances security further.

One such solution is cidaas, a product from WidasID GmbH that could be easily integrated into any existing software. With cidaas, we are committed to providing data protection in a highly regulatory environment by implementing proven and advanced industry standards in line with exemplary security models without compromising on user convenience. This way, company-specific or industry-specific international regulations can also be covered. The use of state-of-the-art biometric techniques to support authentication and authorization only further increases security – and companies can focus on their core tasks.

In this white paper, we take you through the challenges and intricacies associated with implementing the EU-GDPR guidelines and how a smart CIAM solution can be leveraged not only for ensuring compliance but also to optimize and enhance existing processes and systems – improve authentication, manage accesses and privileges and simplify the various other process workflows.

An intelligent CIAM solution like cidaas can be used in the healthcare industry not only for identity management but also to ensure regulatory compliance and at the same time optimize existing workflows. This white paper shows you how.

Blog EN

Arriving at the perfect Identity and Access management solution

Is identity management really required – this question no longer arises for many companies. The use of Identity Management has become a fundamental functional requirement in every organization, that has a digital presence of any form. This realization stems from the fact that customer identities and related personal data are considered the most valuable assets, that help companies take data-driven marketing and other business decisions. Companies have myriads of options when it comes to choosing the perfect identity and access management solution. Organizations have various options to choose from – Either build a proprietary identity solution with available in-house expertise or adopt a commercially available off-the-shelf cloud-based solution that would satisfy all the business requirements.

Many a times, the advantages of opting for a readily available identity management system outweigh those of creating such a solution from scratch. The major benefits include:

  • Technical Expertise
  • Ready for immediate use
  • Significantly shorter implementation time
  • Saves time, costs, effort and human resources
  • Solution remains up-to-date always and without downtimes
  • Bridging personal bottlenecks
  • You can concentrate on your core business.

There are a number of CIAM solutions available in the market today – The key to choosing the product that suits your organization the best is to clearly understand your requirements. In order to outline your exact requirements, it is essential to have a fair idea on the basic functionalities a CIAM solution is expected to deliver, the value-added functionalities it could deliver and how you could leverage the features through customization to suit your individual needs.


The above figure depicts few of the major functionalities that need to be seriously considered while assessing a CIAM solution. To get more insights into all the factors that should be well-thought of, if you plan to go for an identity and access management solution, read through our freely downloadable CIAM Buyer’s Guide that will give you a better picture of the capabilities of a CIAM solution, what to look out for, and will hopefully help you define your individual requirements better.

This white paper sheds light on the potential advantages of adopting a readily available CIAM product various aspects that one should consider while choosing a CIAM solution.

Blog EN

The Payments Directive PSD2 – deadline is approaching! Is your authentication solution ready for it?

What is PSD2?

PSD2 follows the original Payment Services Directive (PSD) that was adopted by the European Union in the year 2009. This regulation breaks the monopoly of banks on their customers’ data and represents an important step towards “open banking”. The new EU regulation directs financial institutions to open up their interfaces and give third party providers (TPPS) access to customer data. The third parties could leverage the data to create new & innovative services to enhance customer experience. This results in new services, such as the initiation of payments directly from an online shop – obviously, with the consent of the account holder or the customer. In short, the new EU directive aims to boost competition in European payments, encourage innovation and make money transfers more convenient and secure.

But this is nothing new and has been known for a long time. But slowly things are getting serious. The deadline to implement PSD2 is only a few days away and banks have to provide a technical interface including a test environment for payment initiation services and access to their customers’ account information. For established financial institutions, the new directive would mean both opportunity and risk.

The implications - What to keep in mind

The new directive that is set to revolutionize the payments industry, poses technical challenges to banks- Banks will have to ensure that they have the right infrastructure to support secure data-sharing across all channels via APIs and other services to TTPs while providing a strong authentication solution to secure payment transactions. There is no much time left, as by March 14, 2019, financial service providers are expected to provide a PDS2 test environment and the deadline to be PSD2-compliant, September 2019, is fast approaching.

The requirements are not really new

The challenge of secure data exchange and unique authentication is not new. Many companies outside the banking sector have already implemented this in the past. However, this is the first time that the financial services industry has been forced to interface with third parties. In order to implement the regulatory requirements accurately and on time, banks should rely on a partner who has the necessary expertise from completed customer projects and can implement the PSD2 requirements quickly. cidaas, our Customer Identity and Access Management solution (CIAM), delivers the required functionalities out-of-the-box. A comprehensive feature set ensures PSD2 conformity and the cloud service can be easily integrated into any existing IT landscape.

Secure and seamless authentication with cidaas

Based on the OAuth2 and OpenID connect standards, cidaas guarantees the secure access to accounts (XS2A) required in the PSD2 context as well as the required SCA – strong customer authentication. cidaas relies on strong multi-factor authentication methods, which also include biometric factors such as face, voice, fingerprint etc. in its two-factor authentication.

Within the framework of the PSD2, special attention must also be paid to data protection regulations. Payment service providers should process the customers’ personal data only upon obtaining their consent. The respective account-holding organization must check the consents and ensure that they are accessible and editable by the end customer himself at any given point in time. By default, cidaas supplies all features necessary for the administration of the consents. Financial institutions can thus obtain and manage the obligatory consents of the customers and at the same time grant access based on their defined preferences.

Are you impacted by the upcoming PSD2 guidelines and still need help implementing them? Please feel free to contact us or start with our free cidaas Freeplan

Read what Thomas Widmann, CEO of WidasConcepts, has to say about PSD2 and the importance of an identity and access management solution for secure and unique customer authentication.

cidaas helps financial institutions meet the requirements of the PSD2 regulation while ensuring a consistent strategy for the digital transformation of financial services providers. Read our factsheet to know how we do it.

Blog EN, Real World Identification

Identity and Access Management: The business driver to boost sales in the Retail industry

Customer Identity Management is the recipe for success when it comes to making Customer Journey safe and exceptional
Yael Widmann, Business Development

With the retail industry being one of the worst hit by the digital disruption wave, the most dynamic retail brands are becoming more customer-centric. Today’s digitally empowered customers yearn for more – they expect a unique shopping experience each time. Hence providing exceptional omnichannel experience has become one of the most critical goals that retailers have to achieve. A diverse range of digital & physical shopping options would only mean a diverse and humungous amount of data to manage! And this is exactly why Identity and Access management has evolved over time into a “must-have” critical business enabler that not only provides the omnichannel experience but also makes the organization more successful.

So how is such an omnichannel experience accomplished?

The customer is given the same identity across all channels, enabling the delivery of a personalized shopping experience while ensuring data protection

Easy and convenient registration for better conversions

Asking users to fill extensive forms, requesting for verification at the initial stages of the customer-conversation and the like are things of the past – In today’s digital world, this is enough reason for customers to turn to other competitors who provide them seamless access to their services.

Cidaas enables an easy and convenient registration process

  • Social Login allows the end user to register with their Social network accounts.
  • Progressive or intelligent profiling allows the creation of forms with minimal data entry requirements
  • Single Sign On (SSO) enables end-users to log on to all devices and platforms

In short: With the login and registration features, retailers are sure to make an impressive start with their customers!

Holistic User profiles to identify your customers, understand them better and provide a unique shopping experience

To begin with, understanding your customer, their behavior & interests and insights into their decision-making traits would prove crucial in delivering the experience of their choice – to keep them hooked to your business.

Cidaas CIAM solution plays a pivotal role here – like fixing the pieces of a jigsaw puzzle, cidaas analyses each of the interactions of the customer in course of time, join the dots and assesses if it was the same customer who made all these interactions and, with the help of its “progressive user profiling”, incrementally & step-by-step, builds a holistic profile of the customer. This helps is delivering personalized content and the appealing experience to the user that results in brand loyalty.

Connecting digital and real-world identities: Real time marketing across all channels

cidaas goes one step further and enables the identification of digital customers in the real world – Thanks to the feature “Real World Identification”. A link between the two identities (real world and digital) can be accomplished with the help of installed IP cameras, beacons or NFC-based devices such as smartphones. This extends the Omni-Channel experience to include the stationary point-of-sale and allows retailers to run targeted marketing campaigns.

Consider the scenario in which the customer is in the vicinity of your store – cidaas leverages beacons to identify the customer and correspondingly present customized offers on his registered mobile devices, that entice him into visiting your store. Or, say, the customer is already in your store – cidaas could inform the customer about special offers or discounts.

Want to track customer traffic within your store? Cidaas uses NFC technology and IP cameras to help you figure out the most and least visited areas of your store – accordingly, you may want to consider refining your marketing strategies.

cidaas can be easily integrated into existing systems through open interfaces and offers plenty of scope for customization – from the defining the fields to be displayed on the registration pages to the design of an individual look and feel.

It’s not too late to seriously consider investing in an all-in-one comprehensive and reliable CIAM solution like cidaas – because the goal is not to just to sell a product, but to build a long-lasting relationship of confidence and faith with the customer.

Read our freely downloadable factsheet to know more about how retailers can profit from a CIAM solution.

Interested in knowing how cidaas can add value to your company? Then arrange your personal demo appointment today: Schedule a Demo

Blog EN

Multi-Factor-Authentication against data theft

Digitalization has, no doubt, created a spike in cyberattacks. The recent online attack on politicians and celebrities that led to the arrest of a 20-year-old in Hesse, is proof to the same. “It is possible to carry out data attacks from anywhere in the world – even from children’s rooms. This can have serious consequences for public life”, quotes Ungefuk, from the Attorney General’s office on the issue.


IT Security has become a critical business function without which the very reputation of any company could land at stake. However, many companies still overlook the very many aspects of security. This results in significant gaps, which hackers easily exploit. Most of the famous hacks are inexpensive, easy and lucrative, yielding huge money in exchange for stolen data.

Authentication is indispensable in protecting data or resources – Be it entering an office premise, backing up confidential information, performing an online banking transaction or even making an online purchase. The growth of the “Internet of Things”, with a massive number of sensors and other devices connected to the internet, only adds on to the pressing need for authentication.

If you are the one, who uses the same password across platforms or slight variations of it or write it down, then for your own good, you will need to change. Passwords, as we know, have outlived their time. However, the process of authentication has evolved – to stay one step ahead of cybercriminals who find it easy to crack conventional passwords, and simultaneously maintain the optimal customer experience.

Thinking beyond passwords, organizations today rely on the fact that Biometrics certainly serves as a unique key to a person’s identity. This, when combined with smart fraud detection based on Big Data Analytics, Machine Learning, user profiling and predictive factors, could be leveraged to enhance authentication and ensure that all the requirements of data protection and cybersecurity are met.

Multi factor Authentication (MFA) using biometric recognition technology, hence, ensures adequate security and acts as a shield that safeguards data and resources. The following methods could be used and combined for effective identification and authentication:

  • Face Recognition: Users identified using advanced, biometric facial features
  • Voice recognition: Identification by voice
  • Fingerprint recognition: Touch based identification
  • Pattern: Identification through a user-drawn pattern
  • Push notification: Identification by the confirmation of message by the user only on the configured device

These methods could be leveraged to facilitate password-less authentication – Where the user could just scan a code or even their face using their phone’s camera to gain access to their devices. This not only provides an enhanced user experience but could also minimizes successful phishing attacks.

A two-factor authentication (2FA) only heightens security – for example, finger or face recognition in addition to a password validation provides the required “strong security”. Triggering 2FA in case of suspicious activities detected using fraud detection systems could help in protecting data and keeping fraudsters at bay.

Hence, 2-Factor authentication combined with biometric technologies would certainly be the way ahead, making it difficult to gain unauthorized access to data or information across devices, platforms and systems.

The panacea to the global “Data theft epidemic” is certainly a robust identity management solution. A modern, Big Data Technology based Customer Identity and Access Management (CIAM) software is essential not only to manage data and identities, but also to provide the appropriate authentication mechanism – for example, to allow the distribution of roles and access rights to the employees of an organization and correspondingly authorize them, be into physical or digital spaces.

cidaas, with its in-built intelligent fraud detection system, offers a wide range of authentication options to ensure that data is never compromised. Users can benefit from its array of MFA options for password-less authentication/2FA and role-based/access-based authorization mechanism that provides the best-in-class security. With cidaas, you can confidently steer your business in the right direction – into a highly secure digital future!

You are already one step ahead and want to see our solution in action? Get your free demo version today:

safeguards data and resource

Blog EN

The right game tactics for supporting your fans digitally


Digitization is progressing across various industries at an ever increasing pace – including the world of sports. The Digital Market offers sports fans a host of channels to access services and offerings from their favorite club. But to excite fans today and to provide personalized attention throughout the game, a quick and above all, convenient access to the digital offerings and services is a must.

Improving the “Fan Experience” has become the core of the brand strategy for the sports and entertainment industry. Only those who can excite their fans can retain them.

The biggest challenge here is probably the overflow of data, caused by the variety of interactions that fans can perform today. This almost infinite amount of information is already gathered in most cases today, but unfortunately often in different data buckets. To put it in the language of a coach: it’s like training each player of your team individually and letting the team play as one whole team, only when the right time comes. With this tactic a game can be won badly. However, if you train everyone together, the world looks completely different.

If you apply this scenario now to the world of data, you can not ignore identity and access management. Such a software – preferably cloud-based – offers an intelligent solution for the various fan support stations throughout the course of a game.

The infographic shows how the right tactics for taking care of fans could practically look like:

Ticket purchase

A fan informs himself in advance of a game about quota and prices of tickets, and would like to order them right away online in the ticket shop. With cidaas the fan registers quickly and easily via social login registration into the online shop. The single sign-on function allows the user to access all contents and services after a one-time login, across all portals. In accordance with the EU GDPR, he gives his consent to the use of his data during the ordering process. This information is stored by cidaas. If the fan thinks differently over time, he can adjust his preferences of data usage through the self-service option.

Shop offers

If a fan is a real fan, he would want to be well-provided accordingly. Personalized offers can increase sales of merchandise or special game offers. Data collected through email campaigns, advertising platforms or ticket purchases can be used to create a complete fan profile using big data technologies. This now contributes to the fact that organizers can align offers to individual needs and interests of the fans and thus not only improve customer journey, but also increase their own sales.

Access control to the stadium on the day of the game

Physical access control is the linchpin of a fan’s customer experience, especially at sports events – because who likes to stand in a queue for hours? With the physical access control function, cidaas offers an intelligent solution for access control to the stadium, but also inside the building, such as access to the VIP area. Authentication is based on the physical identity of a person. Different access rights can be assigned – secure and with reduced time and costs. Various methods of multi-factor authentication using Biometrics are available, for e.g. Face recognition, speech recognition, or Touch ID.

Visit to the fan shop before the game begins

The fans are now in the stadium-can the organizer can lean back? No way! On entering the stadium, the “Fan experience” begins. With the help of WiFi, beacons or apps, the digital fan now gets a real identity and can be directly provided with information on his smartphone, like e.g. about special offers in the fan shop or about special food and beverage offers during the game. The organizer benefits not only from higher sales, but also from detailed reports on customer traffic, the most visited areas of fan shops, as well as customer interest and behavior.

Intelligent identity and access management is a must for every club

Intelligent identity and access management is therefore a must for the sports and entertainment industry. Our Customer Identity Management solution cidaas includes all the necessary functionalities for managing user identities in digital business processes.Our cloud service is cross-platform and can be quickly and easily integrated into existing processes. Obviously, you can continue to use your current user authentication.

Do you want to learn more about cidaas? If so, contact us today at 07044 – 95 103 200 or at

You are already one step ahead and want to see our solution in action? Get your free demo version today:

Blog EN

cidaas : Release of Executive View by KuppingerCole analysts / Webinars / Events

Passwords are like undergarments. You must not allow them to be seen, they have to be changed regularly, and should not be swapped with strangers.” – Chris Pirillo would say now. The KuppingerCole analysts took a close look at cidaas and published an executive view on our modern customer identity management solution.

The Executive View outlines cidaas and summarizes the basic and prominent features of cidaas very well. An elementary advantage of cidaas lies in its modern micro service architecture, which enables a clean separation and scaling of the individual services as well as continuous improvement. In addition, cidaas impresses with its extensive application of Big Data technologies and concepts. For example, cidaas Fraud Detection creates several additional layers of security and intelligently queries in a second factor, if required, from the extensive set of multifactors (Multifactor Authentication). With the various multifactor methods, a Password-free authentication is also available. Moreover, cidaas recognizes itself as the event trigger of the business software and supports the personalization of services and automation of marketing. An analysis of the user behaviour serves as the foundation, based on which the business software is informed on the particular behaviour of the User in Real time, the simplest example here, being the change of an iOS follower on Android devices!

Our “Real World Identification” services were also highlighted by KuppingerCole. With these functionalities, it is possible to link the real identitiy with the digital identity, and to cater to the customer and his needs in a better and personalized way. With its SDKs for iOS and Android, for example, cidaas helps to recognize users in local shops via geofencing or beacons and creates a link to the user’s digital activities. Thus, a personalized shopping experience in a local business facility of a company is made possible.

cidaas is rounded off with its very good Consent Management functionalities (Compliance management). Cidaas follows the Kanatara Consent Receipt specifications and offers many additional features that not only accommodates the GDPR but also allows a flexible approach to the most diverse use cases. This includes, for example, the ability to provide the Consent not only at login, but also based on action and context.

cidaas convinces not only with its extensive set of functions / features, but also with its flexible expandability options, which are also essentially built on the Microservice architecture. For example, it is very easy to integrate further multifactors or own connectors for connecting to an existing user base. In this way, cidaas is optimal and easy to integrate into the IT landscape.

Read the complete Executive View here.

By participating in the Customer Identity World (CIW) in Amsterdam and Singapore, we are taking the next steps with KuppingerCole. In addition, we are represented at many other conferences in Europe and Asia, ahead of IT-SA in Nuremberg and the Future Banking Summit in Mumbai.

We are also pleased to announce two partnerships with the German Chamber of Commerce to bring cidaas to France and Italy. In this context, we are currently building partnerships with integrators in Italy and France and have also been able to attract some interested parties/customers.

There are of course many more cool and useful features in the pipeline, including new functionalities in the field of “Internet of Things”.

We would like to thank John Tolbert and KuppingerCole for their great review and valuable inputs. We look forward to the Webinar on 11th September and the conferences in Amsterdam and Singapore.

If you want to know more about cidaas, please leave us your contact details and we will contact you. Or register on cidaas-in-action and experience some of our features live!

Blog EN

Biometric – future oriented Identity and Access Management

Biometric – future oriented Identity and Access Management

Biometric authentication with cidaas
Unlocking their smartphone or laptop with the finger scan is nothing new for many users. Biometrics technology makes this possible. Because it is the technology that is best able to ensure a clear identification. Irises, fingerprints and faces are some of the best-known features that make each person unique and suitable for biometric authentication.

Biometric – the automated measurement of specific characteristics

The biometric features of each human being are unique and therefore very personal. Recognition methods using biometrics for people identification are not new. Francis Galton laid the scientific foundation for the use of the fingerprint in 1892. Fingerprint scans are currently the most widely used biometric method worldwide. However, in comparison to other biometric methods, they are comparatively unsafe, since it is easier to falsify or emulate the features. In addition, moisture, dirt or even a simple hand cream can affect the accuracy of the measurements. But compared to entering pin numbers for e.g., this detection method is much safer. In any case, biometric authentication offers a higher level of security than other methods of identification. A much-improved capability is provided by multi-factor authentication, for e.g. the combination of factors are used for unique identification including biometric authentication (such as face, speech, or fingerprint).

The advantage of future oriented identity and access management, which includes biometrics, is that it makes much harder for unauthorized people to gain access to, for example, a physical location, a computing device, a network, or a database. Biometrics can be used for internal access to portals, servers and systems of the enterprises, above all also in the customer communication. Biometric solutions are user-friendly and offer the highest level of security.

User identification and highest security is also what cidaas stands for – a cloud-based customer identity software solution from WidasConcepts. Multi-factor authentication verifies customer or employee identity over a second channel and stops fraudulent attempts or suspicious cases with built-in tools.

WidasConcepts has received the coveted “Software Hosted in Germany” quality seal for its cloud-based software solution cidaas. The seal is only awarded to software solutions that use German data centers and German contract law. Plus, it is certified that the German standard for data protection (BDSG) is complied with. A fact that makes it attractive for companies to use cidaas, the identity solution that implements biometrics technology.