Going Deeper: Agentic AI Security
Why most AI architectures today are insecure and how an identity-first approach can solve the problem in the context of agent-based AI security.
Going Deeper: Agentic AI Security Read More »
cidaas connect 2026: Explore the world of IAM & CIAM | 30.09. - 01.10.2026 | Europa-Park | Get tickets
Why most AI architectures today are insecure and how an identity-first approach can solve the problem in the context of agent-based AI security.
Going Deeper: Agentic AI Security Read More »
Keycloak is one of the best-known open-source projects in the field of Identity & Access Management – and at the same time one of the most widely used Open Source SSO solutions in enterprises that want to operate single sign-on, identity federation, or authentication standards such as OAuth2 and OpenID Connect themselves.
Who actually makes decisions about Keycloak? – Open Source SSO Read More »
Open source has become an integral part of modern software development.
No application, platform, or cloud architecture today can function without open-source components.
Digital sovereignty through open source: cure-all or fallacy? Read More »
Modern applications require more than simple role models.
Microservices, cloud deployments, and distributed systems create new challenges for organizations in authorization, access control, and policy management.
Open Policy Agent (OPA) – Flexible authorization for modern applications Read More »
Policy-based access control (PBAC) describes a modern approach to access control in which access rights are no longer assigned exclusively via fixed role models, but are determined by policy-based rules.
Policy-based access control PBAC – Dynamic access control for modern companies Read More »
Identity provisioning for user accounts in enterprise systems such as SAP S/4HANA has long been a complex, highly customized process.
Automating identity provisioning for SAP S/4HANA with cidaas Read More »
As organizations move deeper into SAP’s cloud ecosystem, especially the SAP Business Technology Platform (BTP), federated identity becomes a foundational requirement.
Federated Identity Management Read More »
How SAP’s IDM End of Life decision opens the door for leaner, modern IAM landscape.
Goodbye, SAP IDM: End of life. Time to rethink Identities Read More »
The DORA EU Regulation raises digital resilience in the financial sector to a uniform EU level.
The new DORA EU Regulation comes into force: What companies need to do now! Read More »
IAM made in Europe is more than a trend – it’s the foundation of digital sovereignty. Discover why European platforms like cidaas make the difference and how they enable full control over digital identities.
IAM made in Europe: Digital Sovereignty Starts with Bold Platforms Read More »