B2B IAM for Partners
& Identity & Access Management for the Supply Chain

The attack surface has extended past the employee and to partners and suppliers. Give the right people from the right organisations the right access to the right resources at the right time.

Build Trust

Reduce attack surface

Utilise proven IAM capabilities optimised for B2B scenarios and supply chain security

Communicate the importance and benefits of Customer IAM

Improved user and administrator experience

Provide an exceptional admin experience and a fully branded user experience

Integrate Customer IAM APIs

Highly flexible B2B IAM platform

Agile solution designed to support extensible schemas and evolving business needs

Subcontractors & Managed Service Providers

Establish & manage user identities

Industry leading delegation capabilities, support for existing IdPs, integration into CRM

Ubisecure B2B IAM allows organisations to avoid the pitfalls of building inhouse B2B identity and access management functionality for your supply chain and partner applications. Establish organisation identity as a foundation of trust. Get to market faster, and safer, with proven, nationally deployed B2B IAM and delegation functionality.

Multi-System Authorisation, Authentication & Identity Proofing

  • Maintain accurate user accounts and entitlements that reflect the actual current users and appropriate access and authorisation roles and rights across multiple applications
  • Provide stronger identification of users without sacrificing a low-friction experience
  • Rely on more than just the basic Username/Password combo. Integration with 3rd party MFA
  • Acceptance of validated third party identity credentials, both those with identity proofing (i.e. BankID) and those without (social, professional)
  • Support for internal enterprise directory identities or CRM based identities
  • Step up Auth – low friction method like social identity to register, step up to other IdPs as needed
  • Built on Standards (OpenID Connect [OIDC], OAuth2, SAML, CIBA [Client-Initiated Backchannel Authentication Flow])

CIAM Capture Proof Convert

CIAM Platform

Governance & Federation

  • Maintain accurate user accounts, attributes, and entitlements that reflect the actual current users and appropriate access rights.
  • Identity Directory – eliminate risky, overlapping identity data silos by using Ubisecure’s proven, highly scalable and secure storage solution for identity data and attributes
  • Enable logins from the partner’s IdP (internal or run by external 3rd party).
  • Technical implementation of federation can match the business terms
  • Outbound federation enables existing identity data pools to be utilised for outbound Single Sign-On to external sites. Gain new ROI on KYC investments and extend use of identities associated with your brand
  • Built on Standards (OpenID Connect [OIDC], OAuth2, SAML, CIBA [Client-Initiated Backchannel Authentication Flow])

Establish trusted B2B relationships through trusted Organisation Identity

Manage and use organisation identity as a primary identity class.

  • Varying organisation identity assurance levels – social groups to verified corporations
  • Benefit from extensible schemas for organisation identity attributes, rights and roles
  • Start with a foundation of trust – utilise G20 endorsed Legal Entity Identifiers as verified organisation attributes
  • Digitally tie an individual identity to a verified organisation identity
  • Right to Represent – utilise registry-based ability to check representation rights/authorisations of individuals

Delegated User Management

delegated administration concept

Delegated ID

The most powerful delegated admin solution for what is the most common way to create user accounts for B2B IAM and supply chain security scenarios.

  • Flexible user account schemas
  • Granular control of user access to applications and resources
  • Support for multiple administrators
  • Well suited to seemingly complex multi-tier hierarchies – org to org, org to individual, individual to org, individual to individual
  • Onward delegation reduces Administrator touch points and management overheads
  • Centralised authorisation server allows electronic power of attorney function and auditability
  • API based solution

>> Learn more about Delegated ID

Registering Accounts & Managing Identities

  • Leading support for large scale numbers of Subtenants / Sub-Organisations to isolate partner data pools and optimise delegation workflows – see Finnish Government case study (422k subtenants)
  • Email invite triggers sent by Admins, from system, bulk upload or CRM. No need to be involved in onward delegation unless workflow dictates. Supports large numbers of users
  • API support to link registration to CRM based ‘contracts’ to better manage triggering and termination of user lifecycle
  • API to connect to 3rd party provisioning services
  • Connect Identity Providers – allows use of existing verified digital identities, including social, professional, verified (BankID, NemID and more) and Europe-wide regional IDs
  • Consent – comply with privacy regulation (GDPR) by giving appropriate visibility and self-management controls for personal data
  • Self-service – improve customer satisfaction and reduce support overheads by allowing customers to self-manage identity credential management.

CIAM Platform

How it works

Customer IAM from Ubisecure

Cloud Managed Service (IDaaS) or On-Premise – your data, your location

Scalability – 100k  average users per instance

Omnichannel – any device, same experience

Integration into world class BI, CRM

API First

API first

Ubisecure Customer IAM solutions are API-first to give you:

  • Total control over interface branding
  • Configurable workflows, definition and management of attributes
  • Enhanced security – identity data is a breach target
  • Reduced time to market for your application – building identity management in-house is time consuming
  • Years of Ubisecure experience implementing identity and consent standards, as well as our experience in the European identity ecosystem, where we specialise in delivering against evolving best practices
  • Interoperability and support for internal and external applications
  • The scalability and reliability needed for large customer-based deployments

>> Read more about Identity APIs and the API economy

Pick the CIAM integration that’s right for you

Ubisecure typically deploys larger scale on-premise and complex IDaaS solutions through our Certified Partner network. Partners have local and vertical specialisation – find the right partner in our directory and contact us to discuss requirements.


Identity-as-a-Service (IDaaS) rapidly embeds Customer IAM (CIAM) capabilities into applications. Create frictionless customer experiences, verify identities, and protect identity data without building, hosting, and managing your own IAM solution and infrastructure.

Identity Server

Full stack, modular Customer Identity & Access Management software configured and deployed locally on-premise at your own data centre(s). Your customer identity data, your location. Connect identity silos, applications, and services for better customer experiences, authentication, and security.

B2B IAM Use Cases


Manage complex networks of brokers and agents.


Manage complex B2B and B2C utility contracts and usage

>> Read Case Study


Manage org to org, org to individual, individual to org delegations required engagement with Gov services

>> Read Case Study

Supply chain / Automotive

Define granular control and auditability of user access to applications and resources

SaaS Applications

Solve the internal Build vs Buy conundrum, focus on developing the application not the identity management infrastructure

>> Read Case Study



B2B & Supply Chain Identity Management

Considerations to better secure B2B and B2B2C users at scale with modern IAM functionality.

> Free Whitepaper


By KuppingerCole

An overview of the Customer Identity and Access Management (CIAM) industry & an impartial high level description and analysis of the Identity Platform.

>> Read More


Build vs Buy: Identity Management

What are the benefits of using existing IAM solutions? And should your organisation build using your existing internal resources, or buy a proven solution?

>> Read More

Ready to get started?