Content of Figures
Commissioned by Ping Identity
1 Executive Summary
Customer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last f ...Login Get full Access
- Creating new ways to engage customers online is a mandatory business strategy.
- Customers want a pleasant, consistent digital experience when inter ...
3 Consumer Identity Management Business Drivers
Digital transformation is an objective that many organizations have on their agendas today. Businesses are finding that they need to learn more about ...Login Get full Access
3.1 “One IAM” / SSO
Let’s use a hypothetical scenario to illustrate the need for a coherent identity management solution for customers. Acme is a financial institution ...Login Get full Access
3.2 Know Your Customer (KYC)
Knowing your customer is an e-commerce imperative. Companies that gather and utilize information about their customers are able to offer discounts, t ...Login Get full Access
3.3 Revised Directive on Payment Services (PSD2)
Within 2 years of 25 November 2015, the Revised Directive on Payment Services (PSD2) comes into effect across the EU1. PSD2 defines the business ent ...Login Get full Access
3.4 Consent Management
Through registration to CIAM systems and subsequent usage of sites, customers create a lot of data. While the information processed by these systems i ...Login Get full Access
4 Consumer Identity Management Challenges
Customer identity management solutions can help solve real business problems. However, there can also be challenges associated with procuring, archite ...Login Get full Access
4.1 IAM and CIAM: When both are needed
Traditional IAM systems are designed to provision, authenticate, authorize, and store information about workforce users. User accounts are defined; us ...Login Get full Access
4.2 IT Modernization
During the planning stage, or even as late as the implementation stage, some organizations find that their current on-premise IT infrastructure is in ...Login Get full Access
There are two major entry points to consider from an architectural perspective: on-premise or cloud. Your organization may favor an on-premise install ...Login Get full Access
5 The Ping Identity approach to Consumer Identity and Access Management
Ping Identity offers a rich and robust set of services to corporate tenants and encompasses all the necessary features of a CIAM solution, such as sel ...Login Get full Access
5.1 PingFederate for SSO
PingFederate was Ping Identity’s original flagship product for SSO. For identity federation, it supports all the relevant protocols, including SAML, ...Login Get full Access
5.2 PingID for Multi-Factor Authentication
PingID provides a large number of MFA options. Administrators can choose to implement the following authenticators:
- Mobile apps for Android and iO ...
5.3 PingDirectory for customer profile management
PingDirectory is the identity repository, and can scale to handle millions of identities, billions of attributes associated with those identities, and ...Login Get full Access
5.4 PingDataGovernance for administering policy-based access control to resources
PingDataGovernance works with PingDirectory to manage customer profiles, secure access to customer profiles, enforce customer preferences, and enforce ...Login Get full Access
5.5 PingAccess for enforcing policy-based access control to resources
PingAccess can work in conjunction with WAM systems, as a policy-based access control gateway (proxy or agent architecture) within or between federate ...Login Get full Access
Customer Identity management has become a fast-growing market segment. It has evolved to meet specific requirements that businesses are encountering i ...Login Get full Access
6.1 Recommendations for those contemplating a CIAM technology insertion
- IT teams should welcome the opportunity to work with Sales and Marketing to transform IT into a revenue producing service.
- Inventory existing IAM ...
6.2 Recommendations for current CIAM tenants and operators
- Utilize APIs and 3rd party tools to extend functionality where needed.
- For financial services businesses, use CIAM tools to KYC, comply with AM ...