CIAM – Customer Identity & Access Management

Rapidly build CIAM services into your applications to verify identities, secure access, and better engage with your customers, citizens and partners.

BankID Freja eID Sweden

An Intro to CIAM

Identity is at the beginning of every customer experience

CIAM sits at the intersection of security, user experience and interaction with your external users. The list of external users is long, and includes customers, consumers, citizens, partners, and contractors. Ubisecure CIAM is flexible and supports all CIAM use cases, including B2B, B2C, G2B, G2C, B2B2C, G2B2B and more.

Reduce signup and login friction

Use Registration-as-a-Service and offer a standardised privacy-enhanced login experience & SSO across all devices

Improved security posture

Protect against breaches with passwordless, simplified access management, authentication and authorisation. Reduce the number of risky identity data silos

Reduce Operations Costs

Reduce fraud by verifying customer identities, and automate customer credential management workflows for your helpdesk

Get applications to market faster

Let developers focus on your core business. Get control of customer data and plug in proven identity management – IDaaS, on-premises or hybrid IAM

Proof, capture & convert

Registration – provide frictionless registration via CIAM registration-as-a-service for new users by using existing reusable identities (social, professional, enterprise, verified eID or Bank ID, or federated), of varying levels of assurance strength, from one or more of the dozens of supported Identity Providers. Enhanced your privacy posture and delight customers with easier recurring login.

Anchor users to both digital and real world identities – as well as wide support for the many verified digital ID schemes, Ubisecure also supports real-time verification of real world identities using government-issued documents from 180+ countries worldwide. Reduce fraud without the usual friction.

Profiling and Personalisation – link identity and customer data sources, identity proofing levels, and attribute information for a centralised view of users, to build a progressively rich profile to power personalised experiences.

Outbound Federation – enable existing identity data pools to be utilised for outbound SSO to external sites. Gain new ROI on Know-Your-Customer (KYC) investments and extend use of digital identities associated with your brand.

CIAM Platform

Ubisecure IDaaS

Customer experience

One identity – Single Sign-On (SSO) lets customers and partners use a single identity to log in and engage with all your services.

Simplified recurring login – connect a user to a reusable identity (such as a strong verified eID or Bank ID, or even a simple social identity) and recurring login combined with SSO gives seamless, but secure, recurring login across large pools of users

Multi-channel – provide customers with the same user experience regardless of the device they use to engage with your services.

Consent – comply with privacy regulation (GDPR, CCPA) by giving appropriate visibility and self-management consent controls for personal data and respect data privacy.

Self-service – improve customer satisfaction and reduce helpdesk overheads by allowing customers to self-manage identity credentials.

Security & Privacy – reduce risk of breach

SSO (Single Sign-On) – Give customers one digital identity for simplified SSO login to all your connected digital services and applications. Improve the customer experience and reduce credential management support costs, and make recurring login much easier for existing users.

Authentication – enforce best practice around username/password policy, or move away from the password with hassle-free passwordless options, and step-up to multi-factor authentication (MFA) at the right time. Use Ubisecure’s registration-as-a-service and login using any number of existing Identity Providers (social, professional, enterprise, verified or federated), and link to existing accounts to progressively enrich customer profiles.

Authorisation – out-of-the-box identity management workflows manage how applications authenticate customers, organisations, things & APIs and grant access only to the right resources. Centralise identity data access governance to provide granular control over which customer identity attributes can be accessed by internal and external applications.

Delegated Authority – deploy multi-tier delegated authority to automate manual workflows and achieve significant cost savings. Allow external users to manage their own organisation’s (or family’s) user identities and delegate roles with ease at a national scale.

Identity Directory – eliminate risky, overlapping customer identity data silos by using Ubisecure’s proven, highly scalable and secure storage solution for identity data and attributes.

CIAM Authenticator

Identity Federation Standards

Interoperability & Technology Alliances

Standards-based – built on the identity standards including OpenID Connect (OIDC), CIBA (Client Initiated Backchannel Authentication Flow), OAuth 2, SAML, WS-Federation.

Technology Alliances – partnerships give access to best of class specialised solutions for biometric and passwordless authentication, identity verification, identity data governance, blockchain support and more.

External services and sites – aggregate data attributes from internal and external sources, such as user databases, CRM, Identity Providers and federate identities to external sites and applications.

Enterprise BI and Provisioning – connect to enterprise grade business intelligence tools and provisioning tools for complex customer lifecycle management.

How CIAM works

Ubisecure Identity Platform

Checkmark Choice of geographical data residency and deployment method
Checkmark Scalability – designed for high volume B2B, B2C, G2C use cases

Checkmark Omnichannel – any device, same experience
Checkmark Integration into BI, CRM, HR systems

Your identity data, your choice how Ubisecure is deployed

Ubisecure Identity Cloud

IDaaS (Cloud IAM)

Identity-as-a-Service (IDaaS) rapidly embeds IAM capabilities into applications without building, hosting, and managing your own IAM solution and infrastructure.

Identity Platform

Identity Server

Highly flexible Identity & Access Management (IAM) software configured and deployed locally on-premises at your own data centre(s).

Identity Cloud

Hybrid IAM

SaaS & On-Premises Hybrid Approach – maintain the core user directory on-premises, but run IAM capabilities from a SaaS infrastructure.

API First

Accelerate Application Time to Market

Building identity management inhouse is risky and expensive. Ubisecure CIAM solutions are API-first to allow developers to rapidly embed secure customer identity management capabilities:

  • Enhanced security, authentication and authorisation – identity data is a breach target, protect it effectively
  • Plug-in several years of Ubisecure experience implementing complex identity and consent standards
  • Meet the stringent security requirements of security and compliance teams
  • Out the box connectors for internal and external applications
  • Scalability and reliability needs for high volume deployments
  • Total control over interface branding
  • Configurable workflows, definition and management of attributes

Read more about Identity APIs and the API economy

S Group Case Study Ubisecure

Retail giant S Group uses the Ubisecure CIAM Identity Platform to achieve a wide range of Customer IAM functionality designed around providing customers with a single identity for all S Group company applications and services, including step-up authentication.

> Read Case Study

Resources

BLOG

What is Customer IAM?

If you’re unsure of what exactly Customer IAM (CIAM) is, or wondering if it’s the same as Consumer IAM, read this clear and simple explanation. 

>> Read More

ANALYST EXECUTIVE SUMMARY

By KuppingerCole

An overview of the Customer Identity and Access Management (CIAM) industry & an impartial high level description and analysis of the Identity Platform.

>> Read More

WHITE PAPER

Build vs Buy: CIAM

What are the benefits of CIAM? And should your organisation build a solution using your existing internal resources, or buy a CIAM solution?

>> Read More

Ready to get started?