iambanner
iambanner

IAM

IDENTITY & ACCESS MANAGEMENT

With the help of an IAM solution, data security, user comfort and
the administration of digital identities can be combined and
efficiently managed on a uniform platform.

Identity management

The IAM cidaas allows you a fast and secure (de)provisioning for your different applications. The world is moving away from the hierarchical model of an organization towards groups. The people in an organization are working in dynamic teams, so group management is an essential part of access management. As a delegated admin, the team leader can manage its members, release the relevant systems and even add new applications to cidaas if necessary. User Self Service also allows team members to decide for themselves which accesses they need and automatically apply for them. Access security is guaranteed by the standards OAuth2.0, SAML2.0 and OpenID Connect, among others.

ai digital identity
user

Temporary users

sso

Single-sign-on (SSO)

mfa

Multi-factor authentication (MFA)

real-world

Real world identification

Access management

With the help of cidaas, organizations can holistically manage digital identities across all systems. A user has only one identity with which he can authenticate himself to all applications. Through Single-Sign-On, user can access all systems that have been released for him, such as the ERP, the accounting system or the learning platform, after a single login. Based on this unique identity, various mechanisms allow users to be recognised in the real world. Thus, for example, entrances to buildings or other particularly sensitive areas can be protected. In addition to this, temporary users can be created in cidaas, e.g. for trainees or temporary employees. Sensitive resources and suspicious behaviour detected by fraud detection are additionally protected by a further factor.

group

Groups & teams

selfservice

User self service

settings

Delegated admin

security

Access security (oauth2.0,oidc, saml2.0)

Security

Security

api

API Security

cidaas provides understandable and reliable authentication & authorization services based on the standards OAuth2, SAML 2.0 and OpenID Connect. These services protect, manage and monitor your API’s. Optionally, your AD/LDAP system can be integrated as LoginProvider. This creates a smooth transition from legacy systems to the de facto standards.

Multi-factor authentication (MFA)

You can create additional security for your services with multi-factor authentication – not only in suspicious cases. cidaas provides you with integrated fraud detection and a free cidaas Authenticator App. Via SDKs you can also equip your app with additional factors.

api
api

Bye password!

Passwords are not insecure as such; however, for the sake of convenience, simple or even one and the same password is often used several times. Biometric authentication features, on the other hand, are unique and represent one of several modern, password less access options.

User experience

data

Single-sign-on (sso)

cidaas provides understandable and reliable authentication & authorization services based on the standards OAuth2, SAML 2.0 and OpenID Connect. These services protect, manage and monitor your API’s. Optionally, your AD/LDAP system can be integrated as LoginProvider. This creates a smooth transition from legacy systems to the de facto standards.

Context-specific access

cidaas is offering numerous authentication options, which enables secure and easy access to different systems in any context. Decide whether your team can log on to machines using FaceID and on laptops using FIDO or an identity provider: Everything is possible!

social media
api

GDPR-COMPLIANT

cidaas enables users – in accordance with EU GDPR – to view and edit consent preferences, or to revoke or confirm the given consent. Also, other forms, such as safety instructions, can also be administered, versioned regularly and when changes are made via cidaas, and user confirmation can be obtained.

cidaas-icon

Cloud Identity & Access Management (Cloud IAM)

Cloud-based management of all types of users

  • Focus on the management of digital identities of external and internal employees
  • Adaptation of identity and access rules
  • Provides a seamless user experience
  • Simplification of the control of data access

Manage all user groups easily, quickly and securely with cidaas