Blog EN

E-Commerce Week - digitale Kanäle absichern mit modernen Login Verfahren von cidaas
Blog EN

Recap of E-Commerce Week 2020 – “Securing digital channels.”

„Hallo modernes Login“

Recap of E-Commerce Week 2020 – “Securing digital channels.

At the beginning of May we were part of E-Commerce Week 2020 with the presentation “Securing digital channels. Bye password, hello modern login!”.
Sadrick Widmann showed how important the passwordless login is for security. Which password alternatives do users want to be offered today and, how do our customers use this important feature of cidaas to inspire their customers?

Especially in e-commerce, companies are now being targeted by cyber criminals very quickly, yet at the same time customer expectations regarding outstanding comfort are enormous.

We have summarized the following points of E-Commerce Week for you:

1. Passwords are no longer up to date.

Nowadays, users have numerous accounts with various portals and it is impossible to remember strong, complex passwords. As a result, the same passwords or just simple passwords are used quite often.

Even the BSI withdrew its recommendation for password guidelines. We believe this is a clear sign of passwords no longer being up-to-date, insufficient for high security and above all leading to bad user comfort.

2. We are already using modern, password-free procedures

TouchID, FaceID, the fingerprint sensor, or the voice recognition of the laptop or the smart home device – these are all already the common authentication methods that users are using every day. Hardware manufacturers quickly noticed that passwords and PINs are annoying with mobile devices. Biometric methods are practical alternatives.

However, procedures such as SMS (mTAN) or push codes are also reliable password alternatives for transaction releases in banking.

3. How Conrad inspires its users with passwordless authentication

cidaas integration in Conrad

Read the Conrad reference story to find out how Conrad is using cidaas to provide an excellent user experience to its customers.

Did you miss our E-Commerce Week presentation? Our next series of webinars are coming up soon or we will talk about your opportunities with cidaas and your requirements in a personal meeting.

Please follow and like us:
Wordpress plugin from wordpress
Blog EN

Secure your WordPress Site absolutely Free

Secure your WordPress Site absolutely Free

Are you running your WordPress Site with adequate security? Do you want to encourage your customers to use the login of their choice., say social login, password-less, or do you need to enforce additional protection like Multi-Factor Authentication, identify Brute Attacks/malware and stop them affecting your website?

What if you are running multiple websites, and keeping a list of users in sync would be a challenge, and would you appreciate if all your users can be managed in one place, moreover allowing them to use the same user credentials to log in to all your websites?

Here is what cidaas can help you. cidaas, is one of the fastest upcoming quality product entering the enterprise space as a Cloud-based Identity Systems. Integrating your WordPress Website or any complex web system with cidaas will immediately enhance security as well as login related experiences of your users. It comes with a long list of social providers that can be enabled during login while following secure protocols & standards. End-user can benefit this convenience of not needing to sit and fill a huge registration screen, but simply use their already existing profiles on socially significant providers like LinkedIn, Google, or any such.

Why cidaas?

cidaas integration to CMS is only a few minutes if not an hour and with that, the samurai of authentication & authorization is put to work. cidaas secure user information storage, secure authentication and comply with authorization standards like OpenIDConnect or OAuth 2.0 standards.

Authentication is not fun to write. cidaas has Authentication and User Management API that allows you to develop your apps faster and cidaas will take care of login headache. Our API and SDKs make it easy for you to authenticate, manage, and secure your users in no time.

With all these superior security features, cidaas offers absolutely free Starter pack which will allow you to have 10000 active users for $0.

Mitigate the problem before it arises, secure your website communication using HTTPS and OAuth 2.0.

Please visit this page for WordPress plugin that replaces the WordPress login form with the cidaas Sign-In Widget!

Once you install and activate this plugin, the next time you try to log in to WordPress, you’ll instead see the cidaas sign-in page.

As always, we’d love to hear from you. Hit us up with questions or feedback in the comments, or find us on Twitter, FaceBook, LinkedIn

Please follow and like us:
cidaas login extension for Typo3
Blog EN

New Age Solutions for securing your CMS!

CMS has been gaining ground as flexibility and scalable enterprise options to host websites. Once the content is generated, the next immediate questions become securing it. Being digital and being online poses threats that are wide and varied. Often homegrown solutions are used to secure access to content. Then we lead to the question of why look at a product to secure?

Why an Identity Management Product?

With new-age threats on data breach and privacy issues, it often becomes necessary to constantly update and secure against new vulnerabilities. the risk with a homegrown authentication solution is that once commissioned, it is never upgraded to watch against new threats. Often newer technology standards and best practices get published but it becomes impossible for customers to keep track of changes and updates.

New Age Solutions for securing your CMS!

Enter an enterprise Identity Management product! – and all the above issues are resolved as a byproduct. The main aim of such products is to secure user information storage, secure authentication, and comply with authorization standards like OpenIDConnect or OAuth 2.0 standards. New age products are designed to run with any web platforms like your favorite CMS like Typo3 or WordPress, without needing a heavy footprint. Techniques are too leveraged to configure various features online, with reverse URI references to your system. User authentication and authorization is almost transparent to the end-user, that the challenge-response is done without them noticing the involvement of another product. Cloud-based identity and access management product brings you the convenience of a minimal footprint on your system as well as the onus of bulletproofing security of identities and authentication requests.

Cidaas – is one of the fastest upcoming quality product entering the enterprise space as a cloud-based Identity Systems. Integrating your CMS or any complex web system immediately enhances security as well as login related experiences of you users. It comes with a long list of social providers that can be enabled during login while following secure protocols & standards. End-user can benefit this convenience of not needing to sit and fill a huge registration screen, but simply use their already existing profiles on socially significant providers like LinkedIn, google or many such.

Cidaas integration to CMS is only few minutes if not an hour and with that the samurai of authentication & authorization is put to work. Product comes with features like Groups, roles to customize access to your resources. Often CMS systems need to run with varying privileges right identification and access rights becomes key.

Advanced security

Quite often it becomes essential to perform secondary verification when a more confidential task needs to be carried out. cidaas provides out of the box capabilities for Multi Factor Authentiation (MFA, 2FA). A user has liberty to choose numerous ways from OTP, fingerprint, face, video recognition as their secondary proof of identification if system detects any need to throw MFA challenge. Many more conveniences like passwordless access can be easily extended to end users of any integrated CMS / cloud platforms.

Last but not least, cidaas has under its hood, several Fraud Detection System working overtime to keep a watch on unsolicited activities when integrated. This gives the peace of mind to end users to focus on their productive work without fear of data threats. Integration can be achieved by configuring your CMS with cidaas using unique client ID.
Never has it been easier to secure and enhance login experience for popular platforms!

cidaas face recognition
Please follow and like us:
Digitale Identitäten mithilfe künstlicher Intelligenz vollautomatisiert nachweisen.
Blog EN

Proving digital identities clearly through artificial intelligence.

Digitale Identität mithilfe von Gesichtserkennung nachweisen

Using so-called authentication options, such as face recognition, it is possible to verify digital identities clearly.

Proving digital identities clearly through artificial intelligence.

What is a digital identity and how should a company deal with digital identities? Learn how important customers’ digital identities are today and how comfortable their management can appear in the age of AI and ML.

The term “digital identity” is no longer a strange word for most companies. Nowadays, companies are more and more challenged to efficiently manage the digital identities of their numerous users. Unfortunately, cyber criminals are enriching themselves on the digital identities of real people and posing as them on the World Wide Web. Especially in the high-involvement product segment, the unique proof of identity of a person is indispensable for almost all companies. This article covers the theoretical background of the concept of identity and evaluates technical implementations of digital identity checks.

What is a digital identity?

Every person has a unique identity. So-called identity attributes define identities and make them unique. In real life, identities are described by means of attributes such as character traits, appearance, gestures or general personal data. Attributes of this kind no longer exist as soon as a real person moves around on digital platforms in the World Wide Web. People have numerous digital identities, one for each platform (social networks, online shops, forums, account variations, etc.). Digital identities, in contrast to their real counterparts have electronically recordable identity attributes. These are divided into three categories:

  • Possession: IDs, cards, terminals, chips, papers, …
  • Knowledge: Names, dates of birth, addresses, client numbers, PINs…
  • Inherence: Biometrics, genetics, facial expressions, gestures, …

Possession attributes are considered the most insecure to date, as material objects such as ID cards or papers can change ownership very easily and identity thieves have an easy job of it. Knowledge attributes can be communicated and thus fall into the wrong hands. The safest way to disclose attributes of inherence is to declare them, as they are bound to a specific person, can hardly be shared and can only be replicated with great effort.

For a successful, digital authentication of identity on the Internet, identity attributes are assigned to a specific person. One of the most common processes of this kind is known to many as the “username + password” on request. The correct entry of these knowledge attributes is then assigned to the real person so that authentication can take place. This process is described as digital or electronic identity verification.

Did you know?

Even devices can have digital identities, within the framework of IoT (Internet of Things). Alexa, Cortana and Siri are just a few of the famous examples of devices that have their own identity attributes and can be integrated into processes. Also, in the smart home and office area, electronic devices are used which are authenticated by their device ID alone and can pass a digital identity check.

Due to the rapid development of cybercrime, it is important for companies as well as for everyone to protect their data and to act proactively. Digital identities today should meet individual security requirements, as criminals can use a stolen digital identity to gain entry, access or access to secured resources or impersonate someone else if the theft is successful. Depending on the size of the company, the resulting damage can quickly run into millions.


How are digital identities protected?

There are numerous measures for the protection of digital identities. Depending on the confidentiality of the data to be protected, which can be stolen when accessing an identity, different complex authentication options are used. In addition, specific misuse scenarios must be taken into consideration, such as the duplicate creation of digital identities, the intentionally false depositing of personal data or the violation of data protection law when processing personal data. Each of the authentication methods has specific advantages and is selected differently depending on the application.

Classification Normal Confidential of dataNormalConfidentialPersonalSensitive
DescriptionGeneral dataCommercial data (accounting, strategic plans, etc.)Identification information (e-mail address, date of birth, address, biometrics, etc.)Sensitive information (political opinion, religion, health, at contract signing, etc.)
Recommendation for accessEasy authenticationPassword less authentication2 Authentication factor (passwordless)Unique identification by badge and biometrics
Current authentication optionsPassword, Social Login, WebAuthnTOTP, IVR, biometrics, SmartCard, client certificate, Smart PushSocial login + Face ID, password + IVR, etc.By post office, video chat, AI
Cyber riskMedium-LowLowVery lowAlmost none

How to verify digital identities clearly?

The progressive digitization of all branches of the economy is also evident in the Digital 20’s in very data-sensitive sectors such as the financial and banking sector, which continuously have new requirements regarding the keyword “know your customer”. The demand for user-relevant and convenient identification solutions is therefore becoming ever greater. The most innovative possibility of digital identity verification is identification using artificial intelligence and machine learning. Smart, digital identity verification is replacing older procedures due to the added value for customers and the numerous advantages in the future.

SpeedTime frameRequired technical knowledgeCyber riskData protectionFor companiesFor users
Mailing addressTravel times, queues, service staff (30 min +)Limited to opening hoursNoneNoneGDPR- compliant€€€None
VideoidentCompletely digital, service staff (5-10 minutes)Tied to service employeeInternet, camera-enabled device, support by service staff, app obligationeIDAS compliantGDPR- compliant€€€None
Identification through artificial intelligenceCompletely digital, automated (max. 2 minutes)24/7, AutomatedInternet, Camera-enabled device, Automated, convenient processeIDAS compliantGDPR compliant, automated transfer into systemsNone


Why digital identity verification?

To prove the correctness of the digital identity and compliance with the real identity clearly, a digital, unambiguous procedure, such as the verification of an identity document, is required. Due to the flexible procedure and the extremely high user comfort, an independent digital identity verification maximizes the conversion rate. The consumer is not torn out of the individual customer journey and does not have to move cross-media. The reactive nature of the recipient’s information intake is completely avoided. The user is provided with a concrete increase in value. The result is satisfaction and loyalty.

The above-mentioned advantages are especially given by a digital identity check using artificial intelligence.

  • + Specific AI algorithms ensure highly secure authentication
    During the identification process, the artificial intelligence compares biometric aspects of the ID with the corresponding real person and checks the ID for security features that confirm the authenticity of the document.
  • + A unique, comfortable user experience is created
    There is no need for contact with a second person because the process is completely automated due to machine learning. Thus, the verification for e.g. the conclusion of a contract can be carried out at any time, any place and on any camera- and internet-enabled device.
  • + Process costs are significantly reduced
    The costs per identification case are significantly lower than with previous procedures, outsourcing of external labour can be resolved and internal employees experience an increase in work efficiency. The extraction and maintenance of personal customer data can be easily provided with the help of well-thought-out interfaces.
  • + Digital identity verification using modern AI with the cidaas ID Validator is both eIDAS and GDPR compliant


Which applications exist for digital identity verification?


Financial service provider

Financial service provider

Fast identity verification, for instance for the flexible opening of accounts, the safe transfer of large sums of money or the taking out of loans.

life insurance



Conclude or extend insurance online contracts conveniently, quickly and secure.


Automobile industry

Automobile industry

Digital identity proof in form of a driver's licence for example rental cars, car sharing or leasing. Mobile has never been so safe!

movie tickets

Entertainment industry

Entertainment industry

No more fake profiles! Identity checks for applications, proof of age for entertainment content and leisure activities with age restrictions (e.g. gambling or age-restricted film content).


Educational sector

Educational sector

Online verification for students for applying for digital exams or to enrol for the first time.




Conclude credit agreements easily and conveniently during the ordering process and indulge in dream products. Also, the conclusion of mobile phone contracts or the creation of customer and shopping credit cards is no longer a problem.

The cidaas ID Validator – the Digital 20’s AI innovation

An innovative solution for digital identity verification represents the cidaas ID. Validator With the help of artificial intelligence and machine learning, users can be identified in a most comfortable, secure and unique way. Thus, highly sensitive data can be comprehensively secured and processed. The ID Validator works in three steps.

  1. Face recognition: Scan of biometric data and verification of the authenticity of the person.
  2. ID card scan: recording the information and biometric data. Check for authenticity and validity.
  3. Intelligent analysis: comparison of the collected data and seamless, GDPR-compliant transfer of the data to the company’s systems.

Conclusion and outlook – The future of digital identities

The management of customers’ digital identities represents already a central element in all companies and should be integrated as an integral part of business processes. The digitalization megatrend has produced digital identities that can already be so-called microtrends. In order to reach new customer segments and maintain existing customer bases, trends should be picked up – especially with the trend “digital identities”, an „Identity and Access Management System“ can provide significant support. For this reason, the implementation of such a system can be regarded as a priority one. The following points represent the focus topics of an IAM solution.

An Identity and Access Management System can be a basis for the maintenance of all digital identities of different stakeholders (customers, employees, and suppliers). With a modern Identity and Access Management solution, data security, user comfort, and user insight management can be combined on one platform. It opens the doors for efficient and sustainable management of millions of users.

identity is everything.

Please follow and like us:
Blog EN

Bye password, hello modern login! – IT Afterwork

Bye password, hello modern login! – IT Afterwork

On 05.02.20 the IT Afterwork, together with Digital Hub Nordschwarzwald, was held in the Innotec building in Pforzheim. The security of identities in our digital era was evaluated in terms of access management of companies. The questions were examined whether modern authentication methods can replace the classical passwords in the future and which are the most efficient methods for a comfortable and secure login.

Just a quick glance into the glass-sphere is enough to see that the advancing digitalization demands an alternative to confirm our identities. Since several years now, the digital age has been opening new, more convenient ways for society to communicate, network and present itself. Companies are confronted with the challenge of making the volume of data tangible and offering their customers an extraordinarily convenient, digital and secure experience. This also includes the important process of checking digital identities against real identities to ensure security. In short, authentication.

The user experience should be as convenient as possible across the industry, as it is today’s society that most craves agility and time savings, both at home and at work. With the majority of everyday processes already running entirely digitally, there is almost no way around an authentication process. But which processes create a perfect balance between security and convenience?

The password – liked and disliked

The lecture was preceded by a fascinating live survey of the audience.

Das Passwort - Geliebt und gehasst

Would you have known the answer? Because 42% of the audience was wrong. Behind the cryptic combination ji32k7au4a83 is a system for transliterating Mandarin and means “My Password”. This password has been proven to be much more vulnerable to cyber attacks than Katzenfan75. In addition to great surprise, the thought slowly began to spread that passwords might not be as secure as they appear to be, especially as we move internationally in the digital world.

Passwords are not insecure per se, but thanks to today’s technology, they can be quickly picked up and circumvented. Through phishing, criminals deceive users; through real-looking sites, they deceive users. They willingly enter their password on the pages that appear trustworthy. The complexity of the password therefore does not play an important role at all. Complexity also plays a subordinate role in password spraying, as the system searches for the correct combination of characters until it recognizes it. This is easy with today’s computing power.

“59% of people use the same password everywhere.”1

The so-called Credential Stuffing makes excellent use of the factor of multiple passwords. If a password has already been stolen from other data sources, it is automatically tried out on thousands of portals to gain illegal access without having to steal new passwords. The so-called Credential Stuffing makes excellent use of the factor of multiple passwords. If a password has already been stolen from other data sources, it is automatically tried out on thousands of portals to gain illegal access without stealing new passwords.

“A hacker attack occurs once in every 39 seconds.”2

Whether we are users, companies or employees, we are forced to protect our data or let it be protected sufficiently. The question of safe and at the same time convenient solutions for this is becoming more and more important. But which options will prevail as established standards in the future?

Modern authentication – balance between convenience and security

Already familiar solutions such as passwords, pins and TAN lists are titled as insufficiently secure and impractical. As a result, modern authentication methods are becoming increasingly popular. These will be visualized below for your understanding.

Moderne Authentifizierung - Balance zwischen Komfort und Sicherheit
Moderne Authentifizierung - Balance zwischen Komfort und Sicherheit

Modern authentication – balance between convenience and security Modern authentication – balance between convenience and security If one observes the trend, it becomes clear that biometric solutions are gaining in popularity. Since almost everyone owns a hard device with this integrated technology, it is very easy for companies to integrate it into their access management and no further costs are incurred. In addition, major brands have already done preliminary work and created an initial awareness of the topic and have persuaded users to use mainly biometric access.

If you compare the time it takes to reset a password with the time it takes to authenticate by e-mail, it quickly becomes clear that the password has to be clearly superior to modern authentication methods in terms of time. According to a study, employees spend eleven hours a year resetting their passwords. If this time is offset against the average hourly wage, the damage per company is around five million dollars.3

So modern authentication methods provide not only more user comfort, higher security and significant cost savings, as well as increased work efficiency and employee motivation.

TOP 3 questions during the presentation

After the exciting lecture, there were obviously some open questions due to the relevance and depth of the topic. In the following TOP 3 questions, which attracted special attention.

Question: Can a fingerprint on a selfie (e.g. by a peace sign) be recognized, stolen and reconstructed?

Biometric procedures do not belong to a stealable knowledge. A password is usually recorded either in a password manager or in certain documents. This creates a security risk that biometric procedures do not have. It is potentially possible to find out biometric characteristics, but the effort to hack biometric authentication methods is much higher than with conventional alternatives such as passwords. Nowadays it is unimaginable that biometric identifiers can be stolen in a large scale because such a procedure requires a very high investment, which only becomes interesting for cybercriminals when it comes to stealing the identities for instance diplomats.

Question: How long does it take until biometric methods can be hacked as easily as conventional passwords?

It is a race between fraud detection, i.e. the protection of identities, and cybercriminal activity. Passwords must first be phased out completely so that cybercriminals can start researching and hacking biometrics. So far, there is no clear evidence that hackers have already reached the stage where they can efficiently trick modern authentication methods. In addition, the question of the location of the identification feature always arises. Where is it and how can I attack it? How expensive and inconvenient will it be to steal this digital identity?

Question: How far has standardization progressed in the field of modern authentication?

Nach der Fragerunde gab es übrigens Networking-Time mit einem sehr schönen Buffet!

Standardisation initially harbours the advantage of efficient error and risk management due to the high number of uses. Such procedures are thus more stable, secure and agile in their functioning. A very established procedure is the WebOAuthn Standard (FIDO2), which provides a password-free experience in a specific browser. Standardizations like this, but also Open ID Connect and OAuth2.0, allow a feather-light integration into your own applications.

By the way, after the question and answer session there was networking time with a very nice buffet!


The IT Afterwork was another milestone for cidaas. The lively attention and the interested exchange in the afterwork showed that the topic of passwordless authentication is becoming more and more anchored in our minds and is gaining in importance. The new authentication methods are slowly gaining acceptance among companies. The entire cidaas team would like to thank the organizers DigitalHub Nordschwarzwald and innotec GmbH once again.

In the future, fulfilling the customer and user needs for a balance between security and comfort when logging in will become more and more important. Convenience is often put before the factor of security by the users. This phenomenon is not only visible in access management, but also in industries such as the automotive, real estate and service sectors. Here, convenience is the most important factor in a purchase decision. Every company, from small to large, should immediately start looking for suitable solutions to continue to compete in the digital age and to efficiently satisfy the needs of its customers.

How do you want to secure your access in the future?
cidaas. identity is everything.

Please follow and like us:
Corner Store 2.0 – The unique customer experience, thanks to the linking of the offline and online worlds
Blog EN, Real World Identification

Corner Store 2.0 – The unique customer experience, thanks to the linking of the offline and online worlds

Who still remembers it? The little shop around the corner where “Aunt Emma” was still standing behind the counter selling everyday essentials to her customers. The special thing about these shops was that “Aunt Emma” often knew her customers from an early age and therefore knew exactly what their preferences were and what they liked to buy. She knew when the budgie needed new food again and which type of bread was eaten by all family members. And obviously, the inevitable “candy” to eat on the way could not be missed!

Today, “Tante Emma“ or the traditional “mom and pop“ stores have largely disappeared from the scene. The changes that the retail industry, in particular, has undergone in the course of digitalization are immense. Communication, sales and customer contact takes place predominantly in the digital world. As a result, shopping no longer starts at the doorstep of the store.

Digitalization of the POS bridges the gap inorder to present a continuous customer journe

One thing that has not changed and has in fact gained relevance with increasing digitalization: Understanding the customer and his needs. In the online world, personalized advertising is already common practice and is regarded as the decisive success criterion. In the offline world, i.e. in the real world, there is often still some catching up to do. The digitalization of the point of sale represents a “must-have” for a successful future for retail companies, because in the physical world the same principle applies, as in the digital world: Only those who know their customers do business. Tante Emma (Aunt Emma) already knew this!

The touchpoints that customers access today before making a purchase are manifold. They cannot be limited to online or offline, but rather consist of a mix of both the worlds.

The word of the hour is: Omnichannel. Customers shop conveniently using a tablet or PC from home, on a smartphone while on the move, or – even today – visit a stationery shop. For retailers, this means that they now have to cater to all channels. Many have already done so and offered their customers not only stationery stores but also online shops and smartphone apps as digital customer cards. What many still lack, however, is the link between the digital and the real world in order to make the customer journey consistent and the customer experience unique.

Connecting the real world with the digital world – quite easily: with CIAM and Location Based Services

Thanks to modern location-based service technologies, customers can be identified at the POS via their devices with the help of apps. A Customer Identity and Access Management (CIAM) serves as an interface between the localization technology and the device/app and can uniquely identify the customer. This enables retailers to address their customers at the POS in the same personalized way as they do today on online channels. In addition to the unique authentication of customers, a CIAM also offers a 360° view of user data, thus providing a consistent shopping experience across all channels. This also turns the stationary shop into a networked world of experience.

1 geo


With geofencing, a certain area around the shop is virtually fenced in. If a registered customer enters this zone, he is recognized via GPS and automatically receives targeted marketing messages such as the indication of a discount via push messaging, SMS or email on his mobile device.

1 Beacons


Beacons are small mini transmitters and are often used within stores to mark certain areas, analyze them or, like geofencing, trigger messages to customers in the store. In contrast to geofencing, the beacon range is rather limited.


NFC (Near field communication

NFC is a wireless transmission technology that is mainly used today for mobile payment. However, NFC technology can also be used to communicate offers or product information to customers. The technological developments presented in the field of information transfer make it possible to locate customers or their mobile devices. But how do the little helpers manage to determine the identity of the customer and trigger marketing messages according to their taste? This is exactly where a CIAM system comes into play.

1 user

Omnichannel Experience for Customers

By using a customer identity management system, touchpoints – whether online or offline – are synchronized and linked to the real identity of the buyer. If a buyer has been known in the “online world” for a long time, Real World Identification at the POS allows this digital customer profile to be linked to the actual person – making the purchase an omnichannel experience for the customer:

  • Real-world identification: thanks to smart information technologies, the real person can be linked to the digital identity as soon as the person approaches the shop
  • Proximity Marketing: through holistic user profiles, targeted campaigns can be managed, which in turn leads to a
  • Higher conversion due to individual addres

In this blog post we have described how a CIAM can get the customer journey going and sustainably contribute to a higher conversion rate.

blog img en

Thanks to CIAM, the stationary shop has become a networked world of experience.

The Customer Journey has become more multifaceted in times of Omnichannel retailing

Retail is changing: online trade is booming, but over-the-counter trade also remains an important sales channel. Consumers no longer want to have to choose between online and offline, but prefer to use all sales channels in parallel. The key to continued success in the future can clearly be summarized by the key words “Omnichannel” or “Synchronization of touchpoints”. Where digital touchpoints such as online shops or apps merge with traditional customer contact points, the customer experiences the “Tante Emma feeling” of the past and will always remain a loyal customer.

Are you a retailer and would like to learn more about the use of customer identity management at your POS? Simply book a non-committal appointment for a meeting

Please follow and like us:
feature image
Blog EN

Digital identity is the key to successful digitalization

The digitalization of processes is a challenging task. The topic of security in the digital space is primarily an important criterion for the further development of one’s own digital transformation. The protection and management of digital identities is therefore a central key function.

At the heart of the new, mostly digital business models lies the customer or his digital identity and direct contact with him. A digital identity cannot just be a customer, a partner or an employee. In Industry 4.0, too, the direct involvement of the customer and his devices takes centre stage in the business process. As a result, a machine or service also has a digital identity.

Many companies, especially medium-sized ones, continue to focus on the protection of classic end-points. The protection of the digital identities of users (such as customers, partners and employees) or “things” (such as machines and applications) is still neglected. The secure digital identity for man and machine is a key prerequisite for a complete digital transformation and to tap new business areas.

Digital Identity as a central asset for a fully digitalized value chain

In Technical Report No. 114 of the Hasso Plattner Institute for Software Systems Engineering at the University of Potsdam, digital identities are described as follows: “Digital identity is a collection of electronic data to characterize an internet user with a physical identity. Data belonging to a digital identity are e.g. user name, e-mail address, home address, account number, password etc. and are referred to as attributes. A physical user can exist on the Internet with many different digital identities (different username, different e-mail, etc.)”.

Digital identities are required so that users or machines can access services. This requires that persons or objects uniquely identify themselves.While in the real world this can be done via an ID document for example, in the virtual world it is much more difficult to ensure that the digital identity belongs to the corresponding physical user.

Secure authentication of digital identities through Two-Factor-Authentication

So how can the misuse of digital identities be prevented?

Authentication can be performed based on knowledge, ownership or biometrics. The former represents the classic known username/password query. Since both, companies and consumers, are becoming more and more afraid of identity theft and too simple or identical passwords often favour this, the latter two methods are becoming more and more established. In biometric queries, fingerprint, face or iris in the eyes of real people are scanned and compared with the stored identity. Since these are unique to each person and very difficult to forge, this type of authentication is the safest.

For convenience purposes, it is recommended to use an adaptive 2FA. The additional factor is only queried if particularly sensitive data is accessed or if access appears unusual, for example outside normal times or from an unusual location.

Digital identities require end-to-end identity management

Digital identity is a key element of the new technology trends and is significantly involved in the digitalization of the value chain. By placing identities at the heart of your business, you can acquire new customer segments and make existing processes within a company more efficient.

As a result, Customer Identity and Access Management (CIAM) is becoming increasingly significant. With a modern CIAM solution, the aspects of data security, user comfort and knowledge of the customer and his behaviour can be combined on one platform.

A customer identity and access management system can form the basis for customer-oriented digitalization efforts. It enables end-to-end identity management, helping to manage millions of users.

These aspects can thus be controlled centrally:

  • Data security through secure authentication procedures (also passwordless)
  • Simple and convenient onboarding into all channels and services (e.g. through social login)
  • GDPR-compliant consent management
  • Personalized marketing communications in real time

In a nutshell: A good CIAM solution brings IT, marketing and sales together and contributes significantly to the success of the company. The future also presents new challenges for medium-sized businesses and the complexity of the data is increasing. Targeted identity management is therefore an essential requirement for any organization that has a digital presence in any form.

Please follow and like us:
Blog EN

Happy Birthday GDPR

The new data protection regulation turns 1 year old

The new edition of the European Union – General Data Protection Regulation (EU-GDPR) celebrates its first anniversary today.
But even one year after it’s coming into force, many still ask what exactly is behind the GDPR and the effects it has on companies and the management of personal data.

The Data Protection Act of the European Union, in effect since 25 May 2018, is considered one of the most important changes to data privacy regulations. It defines how the personal data of EU citizens must be handled. In short, citizens now have more rights to know their data, that companies store and can have the data deleted upon request. Businesses, on the other hand, must ensure that data is handled in a lawful manner and make the processing of personal data more transparent and secure. The regulation comes with clearly defined penalties for non-compliance – companies could be fined up to 4% of their annual global turnover or €20 Million (whichever is greater).

Less progress in compliance with the data protection regulation

One year after the GDPR came into effect, there was no major wave of warnings, but more than 59,000 violations were reported throughout Europe. A study by the Digital Association Bitkom e.V. also shows that so far only 24% of all German companies have fully implemented the GDPR. This leads to the conclusion that many companies still have difficulties in fully implementing and complying with the Data Protection Regulation.

The successful implementation of the GDPR remains a major challenge.

The hurdles that companies still face today are more or less the same as they were a year ago:

  • Numerous data silos: Companies often store personal customer data across multiple systems. This makes it very difficult to gain a holistic view of personal data and the corresponding processing of data.
  • Incomplete Self-Services: The GDPR stipulates that the personal data of people should always be up to date – preferably by leveraging the function of self-service. Due to the data silos that companies have, this becomes an impractical challenge.
  • Insufficient data governance: Access to data must be mapped in all applications via centralized data access policies. In most cases, these role-based access privileges, which should be built according to the “need to know” principle, are not comprehensively implemented across the operational file system.
  • Lack of data security: The GDPR requires the implementation of technical and organisational measures (TOM) to protect data. Many companies have not yet fully complied with these security requirements, which include data encryption.

Customer Identity and Access Management helps you become GDPR-compliant

For companies that have not yet completed their GDPR homework, the implementation of customer identity and access management software such as cidaas is the optimal solution for managing digital identities on a single unified platform.

CIAM makes you GDPR compliant at one go:

blog image de
Figure 1: cidaas centralizes the management of your digital identities on one platform

  1. Management of consents
    Informational self-determination of every single individual provides the basis of the GDPR. As soon as the data subject gives his unambiguous consent, or a legal allowance is granted the data processing is permitted (principle of prohibition).

    • Companies should collect the consent of the data subject at the start of data collection e.g. during the registration process or if a change of the purpose of use occurs (art. 6 (1) point (a) GDPR)
    • The data subject can withdraw his or her consent. The withdrawal shall be as easy as giving consent (art. 7 (3) GDPR)
    • The company must provide a proof of consent on request (formal requirement, mandatory record) (art. 7 para. 1 EU-GDPR)

    cidaas fully supports you in the management of consent preferences and offers you the possibility to send stored personal data (PII= personally identifiable information) to your customers at the push of a button.

  2. User Self-Services
    According to Art. 5 para. 1 d), personal data must be factually correct and, if necessary, up to date. Furthermore, all reasonable measures must be taken to ensure that personal data which are inaccurate with regard to the purposes of their processing are deleted or rectified without delay (“accuracy”).
    So why not give the customer himself the control over it? After all, he knows best about his personal data.

    With cidaas, you return control over data management to the user and
    thus ensure that the data is up to date.

  3. Data Security
    Art. 32 of the GDPR requires the implementation of technical and organisational measures (TOM) to protect data. However, what this means exactly and what actions must be taken to ensure data security is not specified in more detail.

    A CIAM solution such as cidaas guards personal data and protects it from unauthorized access through procedures such as two-factor authentication (2FA) and biometric registration procedures. Furthermore, the integrated role and group management of cidaas makes it possible to trace exactly who accessed which data and which changes were made. Thus every data entry, change and deletion can be traced, as required by Art. 5 para. 1 EU-GDPR.

  4. One identity across multiple channels
    In order to comply with the stricter regulations of the Data Protection Regulation, companies must abandon stand-alone applications.

    Customer Identity and Access Management consolidates the existing data silos and enables the management of all user data on one platform.

Data protection can only be achieved through targeted identity management.

In the past, data protection was a fringe issue, but today violations are penalized with heavy fines. As current studies show, the implementation of the GDPR still has gaps in many companies today.

By using a Customer Identity and Access Management solution, you can master the technical requirements of the Data Protection Regulation.

Have you still not completely fulfilled the requirements of the GDPR and still need support in its implementation? Contact us or start today with our free cidaas Freeplan

CIAM Guide: What need to be considered when choosing a Customer Identity and Access Management solution?

Find out in our guide which criteria you should consider when making your decision.

Please follow and like us:
Smart medical things - implants and devices
Blog EN

Data protection and process optimization – how do they go hand in hand?

Implementation of Identity and access management in the Healthcare industry

The EU-GDPR is already live in action and no industry would be spared. The healthcare sector is hence forced to strictly adhere to the regulations, failing which, a huge penalty could be imposed. Companies that have a digital presence are wary of it – up to 4% of the annual turnover of the organization could be levied in the event of non-compliance.

It is claimed that medical records are worth more than credit card information in the black market– and the strict enforcement of such data protection regulations that come in the wake of data breaches is not surprising. In the light of digitalization, the best way to remain compliant and protect digital assets is to adopt the right digital strategy – to be precise, the best option is to embrace a CIAM (Customer Identity and Access management) product that offers the highest standards of security and facilitates regulatory compliance through a robust consent management system.

The Healthcare industry involves a diverse group of stakeholders that includes doctors, pharmaceutical companies, medical insurance companies, medical engineering companies, medial diagnostics providers etc. and most importantly, the patients. By implementing an Identity and access management solution, the cumbersome task of managing roles, accesses and privileges of such a varied group of users is simplified, thereby helping organizations focus on their core activities and the same time be compliant to all local and regional data privacy regulations. The use of latest biometric techniques to support authentication and authorization only enhances security further.

One such solution is cidaas, a product from WidasID GmbH that could be easily integrated into any existing software. With cidaas, we are committed to providing data protection in a highly regulatory environment by implementing proven and advanced industry standards in line with exemplary security models without compromising on user convenience. This way, company-specific or industry-specific international regulations can also be covered. The use of state-of-the-art biometric techniques to support authentication and authorization only further increases security – and companies can focus on their core tasks.

In this white paper, we take you through the challenges and intricacies associated with implementing the EU-GDPR guidelines and how a smart CIAM solution can be leveraged not only for ensuring compliance but also to optimize and enhance existing processes and systems – improve authentication, manage accesses and privileges and simplify the various other process workflows.


An intelligent CIAM solution like cidaas can be used in the healthcare industry not only for identity management but also to ensure regulatory compliance and at the same time optimize existing workflows. This white paper shows you how.

Please follow and like us:
cidaas bg2
Blog EN

Arriving at the perfect Identity and Access management solution

Is identity management really required – this question no longer arises for many companies. The use of Identity Management has become a fundamental functional requirement in every organization, that has a digital presence of any form. This realization stems from the fact that customer identities and related personal data are considered the most valuable assets, that help companies take data-driven marketing and other business decisions. Companies have myriads of options when it comes to choosing the perfect identity and access management solution. Organizations have various options to choose from – Either build a proprietary identity solution with available in-house expertise or adopt a commercially available off-the-shelf cloud-based solution that would satisfy all the business requirements.

Many a times, the advantages of opting for a readily available identity management system outweigh those of creating such a solution from scratch. The major benefits include:

  • Technical Expertise
  • Ready for immediate use
  • Significantly shorter implementation time
  • Saves time, costs, effort and human resources
  • Solution remains up-to-date always and without downtimes
  • Bridging personal bottlenecks
  • You can concentrate on your core business.

There are a number of CIAM solutions available in the market today – The key to choosing the product that suits your organization the best is to clearly understand your requirements. In order to outline your exact requirements, it is essential to have a fair idea on the basic functionalities a CIAM solution is expected to deliver, the value-added functionalities it could deliver and how you could leverage the features through customization to suit your individual needs.


The above figure depicts few of the major functionalities that need to be seriously considered while assessing a CIAM solution. To get more insights into all the factors that should be well-thought of, if you plan to go for an identity and access management solution, read through our freely downloadable CIAM Buyer’s Guide that will give you a better picture of the capabilities of a CIAM solution, what to look out for, and will hopefully help you define your individual requirements better.


This white paper sheds light on the potential advantages of adopting a readily available CIAM product various aspects that one should consider while choosing a CIAM solution.

Please follow and like us: