Reduce attack surface
Utilise proven IAM capabilities optimised for B2B scenarios and supply chain security
Improved user and administrator experience
Provide an exceptional admin experience and a fully branded user experience
Highly flexible B2B IAM platform
Agile solution designed to support extensible schemas and evolving business needs
Establish & manage user identities
Industry leading delegation capabilities, support for existing IdPs, integration into CRM
Ubisecure B2B IAM allows organisations to avoid the pitfalls of building inhouse B2B identity management functionality for your supply chain and partner applications. Establish organisation identity as a foundation of trust. Get to market faster, and safer, with proven, nationally deployed B2B IAM and delegation functionality.
Multi-System Authorisation, Authentication & Identity Proofing
- Maintain accurate user accounts and entitlements that reflect the actual current users and appropriate access and authorisation roles and rights across multiple applications
- Provide stronger identification of users without sacrificing a low-friction experience
- Rely on more than just the basic Username/Password combo. Integration with 3rd party MFA
- Acceptance of validated third party identity credentials, both those with identity proofing (i.e. BankID) and those without (social, professional)
- Support for internal enterprise directory identities or CRM based identities
- Step up Auth – low friction method like social identity to register, step up to other IdPs as needed
- Built on Standards (OpenID Connect, OAuth2, SAML, CIBA [Client-Initiated Backchannel Authentication Flow])
Governance & Federation
- Maintain accurate user accounts, attributes, and entitlements that reflect the actual current users and appropriate access rights.
- Identity Directory – eliminate risky, overlapping identity data silos by using Ubisecure’s proven, highly scalable and secure storage solution for identity data and attributes
- Enable logins from the partner’s IdP (internal or run by external 3rd party).
- Technical implementation of federation can match the business terms
- Outbound federation enables existing identity data pools to be utilised for outbound Single Sign-On to external sites. Gain new ROI on KYC investments and extend use of identities associated with your brand
- Supports OpenID Connect, OAuth2, SAML
Establish trusted B2B relationships through trusted Organisation Identity
Manage and use organisation identity as a primary identity class.
- Varying organisation identity assurance levels – social groups to verified corporations
- Benefit from extensible schemas for organisation identity attributes, rights and roles
- Start with a foundation of trust – utilise G20 endorsed Legal Entity Identifiers as verified organisation attributes
- Digitally tie an individual identity to a verified organisation identity
- Right to Represent – utilise registry-based ability to check representation rights/authorisations of individuals
The most powerful delegated admin solution for what is the most common way to create user accounts for B2B IAM and supply chain security scenarios.
- Flexible user account schemas
- Granular control of user access to applications and resources
- Support for multiple administrators
- Well suited to seemingly complex multi-tier hierarchies – org to org, org to individual, individual to org, individual to individual
- Onward delegation reduces Administrator touch points and management overheads
- Centralised authorisation server allows electronic power of attorney function and auditability
- API based solution
Registering Accounts & Managing Identities
- Leading support for large scale numbers of Subtenants / Sub-Organisations to isolate partner data pools and optimise delegation workflows – see Finnish Government case study (422k subtenants)
- Email invite triggers sent by Admins, from system, bulk upload or CRM. No need to be involved in onward delegation unless workflow dictates. Supports large numbers of users
- API support to link registration to CRM based ‘contracts’ to better manage triggering and termination of user lifecycle
- API to connect to 3rd party provisioning services
- IdP Connect allows use of existing verified digital identities, including social, professional, verified and national IDs
- Consent – comply with privacy regulation (GDPR) by giving appropriate visibility and self-management controls for personal data
- Self-service – improve customer satisfaction and reduce support overheads by allowing customers to self-manage identity credential management.
How it works
Cloud or On-Premise – your data, your location
Scalability – 100k average users per instance
Omnichannel – any device, same experience
Integration into world class BI, CRM
Your Identity Data, your choice how Ubisecure is deployed
Ubisecure managed Identity-as-a-Service for simple, fast to market Single Sign-On for Customers, Partners and Suppliers.
Deployed on-premise to at your own location(s).
A Ubisecure certified cloud partner hosts Identity Platform deployment, provides SLA, you choose datacenter location.
Ubisecure almost exclusively deploys larger scale on-premise and cloud Identity Platform solutions through our Certified Partner network. Partners have local and vertical specialisation – find the right partner in our directory and contact us to discuss requirements.
You can get directly started quickly and easily with Ubisecure’s managed Identity-as-a-Service (IDaaS) solution – available for B2B and B2C Single Sign-On (SSO) use cases with additional identity management add-ins as required. Go to IDaaS.
B2B IAM Use Cases
Manage complex networks of brokers and agents.
Supply chain / Automotive
Define granular control and auditability of user access to applications and resources
ANALYST EXECUTIVE SUMMARY
An overview of the Customer Identity and Access Management (CIAM) industry & an impartial high level description and analysis of the Identity Platform.
>> Read More
Build vs Buy: Identity Management
What are the benefits of using existing IAM solutions? And should your organisation build using your existing internal resources, or buy a proven solution?
>> Read More