Customer IAM (CIAM) is a thriving field, and it is increasingly seen as the center of the digital transformation process. The ability to manage digital identities of customers from the point of registration, through login, through checkout, and during the paying process, and then to record, analyze, and act on the data garnered is a
Taking Identity Out of the Corner and Into the Light Part One: CIAM 2.0 Over the wall. Drilling down. Synergize. Drill the ocean. What do all these phrases have in common? You hear them in business all the time, and everyone has their own interpretation of what they mean. For many years, the same could
Customer identity and access management lets your company manage and capture customer ID and profile data. It lets you control how your customers access applications and services. A good CIAM solution will offer a variety of features, including: Self-service account management Preface and consent management Single sign-on Multifactor authentication Access management Data access governance Directory
The most dangerous questions are usually those that go unasked. This is true in connection to personal or business matters. Questions allow you to learn something new. They can inspire you to look at a familiar situation from a different standpoint or to spark fresh ideas. Questions lead to conversations, and conversations lead to relationships.
In my previous blog, I highlighted the use of the Preempt platform with PingID for agentless multi-factor authentication (MFA) for secure login and policy enforcement. Similarly, it is critical to check and detect anomalous activity when accessing secure applications via federated access. The Preempt platform, since it sits and monitors all login activity, gathers ‘normal’
Problem We were working on a proof of concept and came across a scenario where Active Directory create user scenario was failing from IIQ 8.0+ with the following error: “Errors returned from IQService. An error occurred while setting a password for the account. The exception has been thrown by the target of an invocation. One
When you are working on user provisioning projects or PoCs, in many instances you will find that you need to integrate your product with Active Directory. In a production environment, the Active Directory infrastructure is already setup. But in some cases, you need to install Active Directory from scratch or make an existing Active Directory