Customer IAM, GDPR & GSMA Mobile Connect Content Library
SAML VS OAuth 2.0 VS OpenID Connect
The world of Identity and Access Management is ruled by two things, acronyms and standards. In our hugely popular blog post on SAML vs OAuth we compared the two most common authorisation protocols – SAML2 and OAuth 2.0. This white paper extends that comparison with the inclusion of a third protocol, OpenID Connect. We also touch on the now obsolete OpenID 2.0 protocol.
API Protection with OAuth 2.0
APIs are now the standard entry point to the majority of newly created ‘back-end’ functionality. These APIs exist to provide not only a standardized, structured way to access the required features or functions, but also to act as ‘gatekeepers’, ensuring appropriate security, auditing, accounting etc. This whitepaper looks at the background to OAuth 2.0 API protection and seeks to dispel some of the complexity myths that still surround this approach.
GDPR Compliance Starter Pack
How Customer Identity and Access Management solution can help implement GDPR compliant services?
The European Union’s General Data Protection Regulation (GDPR) is globally the most substantial privacy legislation. All organisations handling any personal data of EU citizens need to comply with the GDPR, no matter where they are domiciled.
Our Customer IAM and GDPR starter pack will present how Customer IAM solution can help implement GDPR compliant services. Read our “General Data Protection & Customer IAM” whitepaper or watch part I and II of the “What is the role of CIAM in achieving GDPR compliance?” webinar series. You can also download the survey conducted in August, where 39 participants answered claims on strong authentication, customer experience and GDPR.
An Introduction to Authentication for Applications
Online authentication for applications, services, apps or connected devices can be implemented in multitude of ways. This Ubisecure whitepaper will help you understand different authentication categories and methods, their usability in different scenarios, including Payment Services Directive 2, the integration, their benefits, integration and the important role of an Identity Provider (IdP). The paper also includes proposed mappings to the newly published document “NIST Digital Identity Guidelines (SP 800-63-3)”. A must read for anyone developing digital business processes or services.
Ubisecure Survey 2017
On strong authentication, customer experience and GDPR
Download the Ubisecure survey to find out what online service providers and system integrators delivering privacy and security solutions to their own customers said about strong authentication, customer experience and cost, and GDPR.
Whitepaper: Examining the E-Service Digitalisation Maturity Model
Understand the maturity stage of your digitalisation strategy or e-service and how external identity management, or Customer IAM (CIAM), can lead to new business opportunities. From our long experience in the CIAM space we’ve built a maturity model that describes how such services can integrate CIAM features when they evolve.
Whitepaper: Customer IAM vs Employee IAM (Legacy IAM)
Traditional IAM solutions concentrate on provisioning employee identities from internal directories and providing Single Sign-On to internal applications. As the business drivers for Customer IAM grow, its critical that enterprises understand both the technical & business differences between Customer IAM and Employee IAM.
Whitepaper: What is Mobile Connect?
Mobile Connect, a GSMA initiative for global and federated identity services provided by the mobile network operators and utilizing the ubiquitous mobile device as the token. There are already over 3 billion Mobile Connect enabled users and in some market areas Mobile Connect has become the standard for online identity.
Customer Story: Canadian Mobile Connect Commercial Pilot
The service is the first Mobile Connect deployment in the world that uses a Smartphone App Authenticator (SAA) for registration, authentication and account recovery, and has deep integration into mobile operator subscriber verification services.
Whitepaper: Customer IAM & CRM Integration
On a yearly basis 20-30% of customer data becomes outdated in an average CRM system. When you combine Customer Identity and Access Management with your CRM, you will reap multiple benefits, including up-to-date customer data.
Customer Story: DNA Telecom
Learn how DNA created an European Cloud and Identity Award 2015 winning solution and achieved strategic goals, increased customer satisfaction and reduced cost with the help of Ubisecure Identity Server.
Product Datasheet: Customer IAM
Effective identity management is a pre-requisite to a successful digital transformation strategy. Customer IAM will help you increase customer engagement, provide better services, reduce customer care costs and enable new business models.
Product Datasheet: GSMA Mobile Connect Identity Gateway
Powering how Mobile Network Operators & Service Providers benefit from the new GSMA Mobile Connect standard in mobile based consumer authentication.
Presentation: Navigating the Regulation JungleDownload Now
Presentation: Introduction to Mobile ConnectDownload Now
Webinar: Managing Identities and Access When Extending SharePoint to External UsersWatch Webinar
Webinar: How to Utilize the Universal Mobile Phone for AuthenticationWatch Webinar
Webinar: Strong Authentication Best Practices for Your Online Customer-Facing ServicesWatch Webinar
Webinar: Identity and Access Management Drives eCommerce SuccessWatch Webinar
Webinar: Empower Your Customers – IAM and Your CRMWatch Webinar
Webinar: Identity Federation: Use Cases and BenefitsWatch Webinar
Webinar: Lost in Translation: Internal to External IAMWatch Webinar
Webinar: Optimizing Mobile Authentication for Your Mobile Apps and Devices and Using Social Identities to Boost Your BusinessWatch Webinar
Analyst Resources: External IRAM and Your CRM – A Winning Combination (with analysts Kuppering Cole)Download Resources
Webinar: Manage External User Identities and Access to SharePoint PortalsWatch Webinar
Webinar: External Identity and Access Made EasyWatch Webinar