CIAM

Why SCIM challenges the exchange of user identities?

Why SCIM challenges the exchange of user identities? 

Why SCIM challenges the exchange of user identities? The System for Cross-domain Identity Management (SCIM) standard was originally developed to simplify the management and synchronization of user identities between systems. A sensible goal at first glance – but a closer look reveals that SCIM often encounters problems in practice that result from outdated assumptions and […]

Why SCIM challenges the exchange of user identities?  Read More »

Seamless connectivity - integration of cidaas with cnips (iPaaS)

Seamless connectivity – integration of cidaas with cnips (iPaaS)

Seamless integration of your (customer) identity & access management solution with other systems such as CRM, marketing automation and ERP in the context of a CIAM or, for example, HR systems in the EIAM is crucial for efficient and automated business processes in an integrated IT landscape.

Seamless connectivity – integration of cidaas with cnips (iPaaS) Read More »

Blog 2: Branded User Experience - Login UI in your own design with cidaas Hosted Pages 

Branded User Experience – Login UI in your own design with cidaas Hosted Pages 

A well-designed login experience is not only functional, but also an essential part of your company’s brand identity. With cidaas Hosted Pages, you can perfectly customize the user interfaces and flows from the login to the password forgotten page to the registration and offer a seamless user experience.

Branded User Experience – Login UI in your own design with cidaas Hosted Pages  Read More »

Fine sand - why many CIAM installations require finer authorization

Fine sand – why many CIAM installations require finer authorization

In recent years, many companies have successfully modernized both their internal access management systems (AM) for employees and their access from web applications and SaaS services as well as their customer identity and access management (CIAM) to secure customer access to the eServices and services offered.

Fine sand – why many CIAM installations require finer authorization Read More »

Online Access Act - implementation made easy with a powerful Customer Identity & Access Management

Online Access Act – implementation made easy with a powerful Customer Identity & Access Management

The Online Access Act (OZG) and its ongoing development (OZG Amendment Act) are important milestones in the digitalization of German administration. It obliges federal, state and local authorities to offer their services digitally in the future.

Online Access Act – implementation made easy with a powerful Customer Identity & Access Management Read More »

The shift from on-premise to cloud-based IAM solutions: Trends in Identity & Access Management (IAM)

The shift from on-premise to cloud-based IAM solutions: Trends in Identity & Access Management (IAM) 

In today’s digital world, Identity & Access Management (IAM) is crucial to ensure the security and smooth running of business processes. Companies are faced with the choice between traditional on-premise solutions and innovative cloud-based IAM systems, also known as Identity as a Service (IDaaS).

The shift from on-premise to cloud-based IAM solutions: Trends in Identity & Access Management (IAM)  Read More »