Identity is at the beginning of every customer experience
CIAM sits at the intersection of security, user experience and interaction with your external users. The list of external users is long, and includes customers, consumers, citizens, partners, and contractors. Ubisecure CIAM is flexible and supports all CIAM use cases, including B2B, B2C, G2B, G2C, B2B2C, G2B2B and more.
Reduce signup and login friction
Use Registration-as-a-Service and offer a standardised privacy-enhanced login experience & SSO across all devices
Improved security posture
Protect against breaches with passwordless, simplified access management, authentication and authorisation. Reduce the number of risky identity data silos
Reduce Operations Costs
Reduce fraud by verifying customer identities, and automate customer credential management workflows for your helpdesk
Get applications to market faster
Let developers focus on your core business. Get control of customer data and plug in proven identity management – IDaaS, on-premises or hybrid IAM
Proof, capture & convert
Registration – provide frictionless registration via CIAM registration-as-a-service for new users by using existing reusable identities (social, professional, enterprise, verified eID or Bank ID, or federated), of varying levels of assurance strength, from one or more of the dozens of supported Identity Providers. Enhanced your privacy posture and delight customers with easier recurring login.
Anchor users to both digital and real world identities – as well as wide support for the many verified digital ID schemes, Ubisecure also supports real-time verification of real world identities using government-issued documents from 180+ countries worldwide. Reduce fraud without the usual friction.
Profiling and Personalisation – link identity and customer data sources, identity proofing levels, and attribute information for a centralised view of users, to build a progressively rich profile to power personalised experiences.
Outbound Federation – enable existing identity data pools to be utilised for outbound SSO to external sites. Gain new ROI on Know-Your-Customer (KYC) investments and extend use of digital identities associated with your brand.
One identity – Single Sign-On (SSO) lets customers and partners use a single identity to log in and engage with all your services.
Simplified recurring login – connect a user to a reusable identity (such as a strong verified eID or Bank ID, or even a simple social identity) and recurring login combined with SSO gives seamless, but secure, recurring login across large pools of users
Multi-channel – provide customers with the same user experience regardless of the device they use to engage with your services.
Consent – comply with privacy regulation (GDPR, CCPA) by giving appropriate visibility and self-management consent controls for personal data and respect data privacy.
Self-service – improve customer satisfaction and reduce helpdesk overheads by allowing customers to self-manage identity credentials.
Security & Privacy – reduce risk of breach
SSO (Single Sign-On) – Give customers one digital identity for simplified SSO login to all your connected digital services and applications. Improve the customer experience and reduce credential management support costs, and make recurring login much easier for existing users.
Authentication – enforce best practice around username/password policy, or move away from the password with hassle-free passwordless options, and step-up to multi-factor authentication (MFA) at the right time. Use Ubisecure’s registration-as-a-service and login using any number of existing Identity Providers (social, professional, enterprise, verified or federated), and link to existing accounts to progressively enrich customer profiles.
Authorisation – out-of-the-box identity management workflows manage how applications authenticate customers, organisations, things & APIs and grant access only to the right resources. Centralise identity data access governance to provide granular control over which customer identity attributes can be accessed by internal and external applications.
Delegated Authority – deploy multi-tier delegated authority to automate manual workflows and achieve significant cost savings. Allow external users to manage their own organisation’s (or family’s) user identities and delegate roles with ease at a national scale.
Identity Directory – eliminate risky, overlapping customer identity data silos by using Ubisecure’s proven, highly scalable and secure storage solution for identity data and attributes.
Interoperability & Technology Alliances
Standards-based – built on the identity standards including OpenID Connect (OIDC), CIBA (Client Initiated Backchannel Authentication Flow), OAuth 2, SAML, WS-Federation.
Technology Alliances – partnerships give access to best of class specialised solutions for biometric and passwordless authentication, identity verification, identity data governance, blockchain support and more.
External services and sites – aggregate data attributes from internal and external sources, such as user databases, CRM, Identity Providers and federate identities to external sites and applications.
Enterprise BI and Provisioning – connect to enterprise grade business intelligence tools and provisioning tools for complex customer lifecycle management.
How CIAM works
Choice of geographical data residency and deployment method
Scalability – designed for high volume B2B, B2C, G2C use cases
Omnichannel – any device, same experience
Integration into BI, CRM, HR systems
Your identity data, your choice how Ubisecure is deployed
SaaS & On-Premises Hybrid Approach – maintain the core user directory on-premises, but run IAM capabilities from a SaaS infrastructure.
Retail giant S Group uses the Ubisecure CIAM Identity Platform to achieve a wide range of Customer IAM functionality designed around providing customers with a single identity for all S Group company applications and services, including step-up authentication.
ANALYST EXECUTIVE SUMMARY
An overview of the Customer Identity and Access Management (CIAM) industry & an impartial high level description and analysis of the Identity Platform.
>> Read More