{"componentChunkName":"component---src-templates-tag-js","path":"/tags/iam/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":3,"edges":[{"node":{"fields":{"slug":"/identity/iam-or-ciam-right-call-business-growth/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Off late, identity and access management have changed the way organizations manage heaps of customer and workforce identities securely and efficiently. </p>\n<p>Whether we talk about organizations utilizing IAMs internally for managing employees’ identities or using the same solution for handling a limited number of customers, the identity management has been an integral part of business growth. </p>\n<p>However, the conventional IAMs aren’t potent enough to handle peak loads, especially when taking millions or billions of customer identities in real time. </p>\n<p>Here’s where the critical role of CIAM (<a href=\"https://blog.loginradius.com/identity/customer-identity-and-access-management/\">customer identity and access management</a>) in customer management comes into play! </p>\n<p>A CIAM can be scaled in real-time depending on the load and number of users accessing the services from a single platform. On the other hand, the traditional IAM can’t deliver results for large-scale deployments. </p>\n<p>Let’s understand why organizations should switch to customer IAM and how it’s helping businesses stay ahead of the curve. </p>\n<h2 id=\"iam-is-it-worth-for-your-businesses-in-2022-and-beyond\" style=\"position:relative;\"><a href=\"#iam-is-it-worth-for-your-businesses-in-2022-and-beyond\" aria-label=\"iam is it worth for your businesses in 2022 and beyond permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IAM: Is it Worth for Your Businesses in 2022 and Beyond?</h2>\n<p>We’re in a digital-first era where we interact with numerous online platforms daily. Or we can say that multiple applications and media have become integral to our modern lifestyle. </p>\n<p>And hence, we’re always expecting great user experiences reinforced by stringent security since no one would ever wish to sacrifice their identity and personal details. </p>\n<p>The conventional IAM was initially designed to handle a limited number of accounts and users working within an organization. It helped provide secure and restricted access to specific resources based on several parameters. </p>\n<p>However, these services were entirely secure and worked flawlessly within an organization with limited users but needed a great user experience. </p>\n<p>Hence, the exact mechanism for managing many users typically on an online platform won’t work since everyone expects a great user experience, robust security, and accessibility. </p>\n<p>CIAM, on the other hand, delivers exceptional user experience and great accessibility with robust security. Businesses can easily rely on a CIAM when scaling growth by offering a seamless and secure <a href=\"https://blog.loginradius.com/growth/smooth-onboarding-positive-user-impression/\">onboarding experience</a>. </p>\n<p>Let’s understand how a CIAM helps businesses stay ahead of the curve in 2022 and beyond. </p>\n<h3 id=\"1-strengthened-security\" style=\"position:relative;\"><a href=\"#1-strengthened-security\" aria-label=\"1 strengthened security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Strengthened security</h3>\n<p>In an age where sensational hacking and malicious attacks have become the order of the day, enhanced safeguard against ever-looming threats is indispensable.</p>\n<p>By adding multiple layers of shields, new-age CIAM brings into effect strengthened security. Thus, the entire cluster of data remains protected from the prying eyes or, for that matter falling prey to data trackers.</p>\n<h3 id=\"2-strong-privacy-management\" style=\"position:relative;\"><a href=\"#2-strong-privacy-management\" aria-label=\"2 strong privacy management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Strong privacy management</h3>\n<p>Compliance with local data protection laws can be a chore, especially given their constant evolution. A good customer identity platform should enable you to keep up with local laws anywhere in the world where you do business.</p>\n<p>With country-specific or regional control over storing and managing personal data, you’ll always meet legal requirements, saving you compliance management costs each year.</p>\n<p>These aren’t the only potential costs you can save—legal fees can run high when privacy management fails. </p>\n<p>Presenting customers with easily self-managed privacy choices and a solid privacy policy also shows them that their data is safe and shows your company is competent and professional in handling these issues. This reputation will encourage customer loyalty in the long run.</p>\n<p><a href=\"https://www.loginradius.com/resource/privacy-policy-management-datasheet\"><img src=\"/b800d4cbc0e7b6c53c2b2d6c495dc445/DS-Priv-Pol-Mgnmnt.webp\" alt=\"DS-Priv-Pol-Mgnmnt\"></a></p>\n<h3 id=\"3-scalability-and-uptime\" style=\"position:relative;\"><a href=\"#3-scalability-and-uptime\" aria-label=\"3 scalability and uptime permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Scalability and uptime</h3>\n<p>With just one customer identity management system fully managed for you, reliability is maximized, and the need for resources is kept to a minimum. A centralized login system for all of your apps and services makes it easy to add new services as they come online. </p>\n<p>A cloud implementation can <a href=\"https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/\">quickly scale up</a> or down depending on your usage, and automated failover can cut downtime to virtually zero.</p>\n<h3 id=\"4-better-customer-experience\" style=\"position:relative;\"><a href=\"#4-better-customer-experience\" aria-label=\"4 better customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Better customer experience</h3>\n<p>All told, your CIAM platform needs to boost customer experience in every possible way. A reduced initial entry threshold that leverages social login or passwordless login is just the start.</p>\n<p>Advanced analytics, effective self-service options, and integration with all of your customer-facing functions should all work to improve the way customers access your systems. </p>\n<p>And storing everything about one customer in the same place—data, analytics, preferences, and browsing/purchase history—will make it much easier for employees to manage customer accounts. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>With increasing customer expectations, businesses need to think out of the box and ensure they offer a great customer experience without compromising security. </p>\n<p>The conventional IAM isn’t the right choice for handling many customers, especially when the peak load changes in real time. </p>\n<p>The aspects mentioned above of leveraging a CIAM shouldn’t be ignored by businesses thinking to accelerate overall growth. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=iam-or-ciam-right-call-business-growth\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 03, 2022","updated_date":null,"title":"IAM vs. Customer IAM: Understanding the Role of CIAM in Accelerating Business Growth","tags":["iam","ciam","data security","compliance"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.5,"src":"/static/d447f7a011e772f6cd2058ee4204de3a/7f8e9/iam-ciam.webp","srcSet":"/static/d447f7a011e772f6cd2058ee4204de3a/61e93/iam-ciam.webp 200w,\n/static/d447f7a011e772f6cd2058ee4204de3a/1f5c5/iam-ciam.webp 400w,\n/static/d447f7a011e772f6cd2058ee4204de3a/7f8e9/iam-ciam.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/engineering/difference-between-iam-ciam-and-idaas/"},"html":"<p>Digital Identity and IAM Domain have been the talk of the technology town for decades. There has been plenty of research, innovation, and information around these two, which led to many terminologies for the platforms providing the relevant features. Some of these terminologies are specific to the characteristics of the platform, while others are used interchangeably.</p>\n<p>In this article, let’s discuss the following commonly used terminologies for the platforms providing the relevant features:</p>\n<ul>\n<li>Identity and Access Management (IAM)</li>\n<li>Consumer Identity and Access Management (CIAM)</li>\n<li>Customer Identity and Access Management (CIAM)</li>\n<li>Identity Platform</li>\n<li>Identity Management (IdM)</li>\n<li>Identity as a Service (IDaaS)</li>\n<li>SaaS-delivered IAM</li>\n</ul>\n<p>These terminologies revolve around the IAM, CIAM, and IDaaS platforms. The infographic below categorizes these terminologies within these platforms:</p>\n<p><img src=\"/69f5d8fc6960a5d3d104150136659437/iam_ciam_idaas.webp\" alt=\"IAM CIAM and IDAAS Comparison\"></p>\n<h2 id=\"know-the-definition\" style=\"position:relative;\"><a href=\"#know-the-definition\" aria-label=\"know the definition permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Know the definition</h2>\n<p><strong>IAM</strong> defines and manages the roles and access privileges of network users and the cases in which users are granted or denied them. The primary purpose of IAM systems is one digital identity per individual. The established digital identity is then maintained, modified, and monitored throughout users' access lifecycles. </p>\n<p><strong>CIAM</strong> is a subset of the broader concept of identity access management (IAM). It explicitly focuses on managing customers' identities who need access to websites, web portals, and mobile apps.</p>\n<p><strong>IDaaS</strong> is an authentication infrastructure that is built, hosted, and managed by a third-party service provider. IDaaS companies supply cloud-based authentication or identity management to enterprises who subscribe. It allows enterprises to use single sign-on, authentication, and access controls to provide secure access to their growing number of software and SaaS applications.</p>\n<h2 id=\"iam-features-and-use-case\" style=\"position:relative;\"><a href=\"#iam-features-and-use-case\" aria-label=\"iam features and use case permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IAM Features and Use Case</h2>\n<p>IAM is used for employee/internal-facing identity and access management solutions. The following explains a typical example of the IAM implementation within an organization:</p>\n<p>John, a new employee, joins the organization, and the application allows provisioning of his organizational identity. John can then login to his organization's portal, and based on the access configuration, he is either authorized or denied access to information or a resource.</p>\n<p>Besides, the organization has multiple portals, and John is allowed to access these portals using the same credentials. Throughout the job tenure, John's profile is maintained or updated from time to time. Eventually, when John decides to move on, deleting John's account from one portal revokes his access to all other portals.</p>\n<p><strong>IAM</strong> has the following four components:</p>\n<ul>\n<li><strong>Authentication</strong>:  A user provides credentials to gain initial access to an application or a particular resource. Upon user authentication, a session is created and referred during the interaction between user and application until the user logs off or session terminates.</li>\n<li><strong>Authorization</strong>: It is performed by checking the resource access request against authorization policies that are stored in an IAM policy store. It is the core area that implements the access controls based on data, including user attributes, user roles, business rules, etc.</li>\n<li><strong>User Management</strong>: It comprises Role Management, User Profile Management, User Activity Monitoring, User Provisioning, and deprovisioning.</li>\n<li><strong>Central User Repository</strong>: It stores and delivers identity information to other services. It usually comes with a data synchronization service to keep the data in synchronization with other identity sources.</li>\n</ul>\n<blockquote>\n<p>Organizations earlier used on-premises IAM software for identity and access management. Now the identity management process is getting more complicated as organizations add more cloud services to their environments. Thus, as a logical step, the organizations adopt cloud-based Identity-as-a-Service (IDaaS) and cloud IAM solutions.</p>\n</blockquote>\n<h2 id=\"ciam-features-and-use-case\" style=\"position:relative;\"><a href=\"#ciam-features-and-use-case\" aria-label=\"ciam features and use case permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CIAM Features and Use Case</h2>\n<p>CIAM is used for customer-facing solutions. The capabilities of IAM are followed in the CIAM solutions; however, the use cases and requirements vary. Common features of CIAM include: </p>\n<ul>\n<li>Self-registration for customers, usually via social network registration </li>\n<li>Consent mechanisms for users to control the use of their data </li>\n<li>Single Sign-On (SSO) across all digital properties </li>\n<li>Multiple authentications options for customers, depending on risks and policies </li>\n<li>Customer profile storage </li>\n<li>SaaS application integration </li>\n<li>Fine-grained access control to resources and data</li>\n</ul>\n<p> The following explains a typical example of the CIAM implementation in a customer-facing application:</p>\n<p> Sarah, a new customer registers on the application. If applicable, the application should request for Sarah’s consent on business privacy policies and get her social profile data. The application must ensure the security and privacy of the captured data during registration, social login, or activities performed during her life cycle. Besides, Sarah should be allowed to manage access to her profile data and delete her account from the application. On the other hand, the business should be allowed to get insights on their customer to understand and deliver their needs.</p>\n<p> The core components of IAM remain the same across areas like authentication, authorization, user management, and central user repository. Thus, the need for Single Sign-On, Authentication Protocols, Access Management, Centralized and Universal Directories, User Lifecycle Management and Authorization, etc remains the same.</p>\n<blockquote>\n<p>It is a common misconception that the technology required for CIAM is the same for IAM. CIAM is far more challenging irrespective of the similarities with the IAM, and it is recommended to have a CIAM solution in place for your customers.</p>\n</blockquote>\n<h2 id=\"idaas-features-and-use-case\" style=\"position:relative;\"><a href=\"#idaas-features-and-use-case\" aria-label=\"idaas features and use case permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IDaaS Features and Use Case</h2>\n<p>The enterprises typically use IDaaS to extend their existing IAM infrastructure. Thus, enterprise IDaaS providers must deploy solutions that can:</p>\n<ul>\n<li>Connect with existing user directories (like AD) for authentication.</li>\n<li>Provide role management to grant permissions and resource access to users.</li>\n<li>Enhance security by providing ways of defining security for critical applications.</li>\n</ul>\n<p>The following are the critical features of IDaaS:</p>\n<ul>\n<li><strong>Cloud-Based and Multitenant Architecture</strong>: To support the immediate issuing of updates, security fixes, and performance improvements to every enterprise customer.</li>\n<li><strong>Provisioning</strong>: To sync user data with web and enterprise applications through SCIM (system for cross-domain identity management) support and integration with on-premises provisioning.</li>\n<li><strong>Authentication</strong>: To incorporate necessary means of authentication such as multi-factor authentication via passwords, digital access cards, or biometrics.</li>\n<li>\n<p><strong>Single Sign-On (SSO) and Federation</strong>: SSO capability to allow users to authenticate themselves across multiple applications using the same credentials.</p>\n<p>Similarly, the federation capability allows the organizations to manage secure authentication for third-party cloud services accessed beyond the control of internal IT departments.</p>\n</li>\n<li><strong>Directory Service</strong>: To integrate IDaaS with enterprise existing user stores or a cloud directory.</li>\n<li><strong>Intelligence</strong>: To facilitate identity access log monitoring and reporting.</li>\n</ul>\n<blockquote>\n<p>The enterprises use several applications, mostly cloud-based services, while some of the applications hosted on-premise. Managing the credentials and access to each of those applications has become hectic.</p>\n</blockquote>\n<blockquote>\n<p>Since IDaaS provides a single point of user and access management for all the applications, granting or revoking access to users becomes very easy. Besides, it enables SSO to avoid managing separate login credentials for different service providers.</p>\n</blockquote>\n<p>If you are looking for information on more terminology around the platforms mentioned in this article, add your request in the comments below. I will either address them here or write another article dedicated to your requests and questions!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 24, 2020","updated_date":null,"title":"IAM, CIAM, and IDaaS - know the difference and terms used for them","tags":["iam","ciam","idaas","identity"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/a5130bd86b66f92b9a0458e359a10100/58556/triplets.webp","srcSet":"/static/a5130bd86b66f92b9a0458e359a10100/61e93/triplets.webp 200w,\n/static/a5130bd86b66f92b9a0458e359a10100/1f5c5/triplets.webp 400w,\n/static/a5130bd86b66f92b9a0458e359a10100/58556/triplets.webp 800w,\n/static/a5130bd86b66f92b9a0458e359a10100/99238/triplets.webp 1200w,\n/static/a5130bd86b66f92b9a0458e359a10100/7c22d/triplets.webp 1600w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Archna Yadav","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/iam-vs-ciam/"},"html":"<p>The conventional employee identity and access management (IAM) systems were initially designed to manage employee identities. And they aren’t potent enough to cater to customers' diverse needs pertaining to user experience and security. </p>\n<p>Apart from this, employee IAM also doesn’t help when the needs of consumers are growing with every passing year, and internal identity management systems are not built to keep up.</p>\n<p>Users now expect a seamless and secure customer experience across multiple platforms, devices, and touchpoints. And the conventional IAM will always struggle to meet these requirements. </p>\n<p><a href=\"https://blog.loginradius.com/identity/customer-identity-and-access-management/\">Customer Identity and Access Management</a> (CIAM) solutions help to improve the customer experience, reduce security risks, shrink costs, and increase the availability of applications.</p>\n<p>CIAM solutions are becoming more commonly used in organizations today because they provide several benefits. For example, a customer identity and access management (CIAM) solution can improve the customer experience by increasing the flexibility and customization of applications. </p>\n<p>CIAM solutions can also reduce security risks by allowing users to access only those applications they need for their work tasks. </p>\n<p>Finally, these solutions can be very cost-effective because they allow companies to scale their technology needs by providing an easy way to manage all users with one set of tools.</p>\n<p>This is where customer IAM solutions come in. These solutions have been built to handle customer <a href=\"https://www.loginradius.com/authentication/\">authentication requirements</a>, scalability, privacy and data regulations, user experience, and integration.</p>\n<p>Compared to employee IAM, a customer identity and access management (CIAM) solution improves the customer experience, reduces security risks, shrinks costs, and increases the availability of applications.</p>\n<p>In this infographic, we compare the following features of both an IAM and CIAM solution:</p>\n<ul>\n<li>Functional Difference</li>\n<li>Authentication</li>\n<li>Authentication Methods</li>\n<li>User Experience</li>\n<li>Performance </li>\n<li>Security</li>\n<li>Privacy &#x26; Data Regulation</li>\n<li>Platform Scalability</li>\n<li>Real-Life Examples</li>\n</ul>\n<p><img src=\"/8e86b315e60149546acd59f33480c9c7/employee-iam-vs-ciam.webp\" alt=\"employee-iam-vs-ciam\"></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 21, 2019","updated_date":null,"title":"IAM vs. CIAM: Which Solution is Right For You?","tags":["iam","ciam","identity management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/f909e78a8e943a991b586181c7eca5b0/7f8e9/IAM-vs-CIAM-V01.01-01-1.webp","srcSet":"/static/f909e78a8e943a991b586181c7eca5b0/61e93/IAM-vs-CIAM-V01.01-01-1.webp 200w,\n/static/f909e78a8e943a991b586181c7eca5b0/1f5c5/IAM-vs-CIAM-V01.01-01-1.webp 400w,\n/static/f909e78a8e943a991b586181c7eca5b0/7f8e9/IAM-vs-CIAM-V01.01-01-1.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]}},"pageContext":{"tag":"iam"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}