KuppingerCole Report
Whitepaper
By Richard Hill

Modern B2B Identity Management

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Management (IAM) becomes a crucial consideration. IAM shares standard features that can be used in B2E or B2C use cases as well, but IAM in the B2B context has specific requirements that need to be addressed. B2B IAM services need to support customers, suppliers, and other partner organizations by providing capabilities such as support for multiple identity types, user delegation at different levels, strong authentication, self-service, and automation, to name a few. Ubisecure Identity Platform solution offers the right B2B capabilities to meet the challenge.

1 Executive Summary

Identity and Access Management (IAM) solutions have continually evolved to meet the changing IT requirements. At first, IAM took root in business-to-e ...

Login Free 30-day Select Access Get full Access

2 Highlights

  • There are multiple types of identities that must be managed in a standardized way.
  • B2B user onboarding processes can be complicated if manual, or ...
Login Free 30-day Select Access Get full Access

3 The Business-to-Business (B2B) Challenge

Identities are converging, IAM is converging. It is about enabling everyone to access every service in a controlled manner.

Changes in how businesse ...

Login Free 30-day Select Access Get full Access

3.1 Different Types of Identities

In order to succeed, the business will need to provide a robust digital identity backend that can deliver all the identity services required to suppor ...

Digital identities associate information about a person or entity that can be used when interacting with digital services, systems or applications. Th ...

Login Free 30-day Select Access Get full Access

3.2 B2B User Onboarding

A B2B customer onboarding process involves multiple steps on both the part of the organization allowing access to their resources or services and anot ...

Login Free 30-day Select Access Get full Access

3.3 B2B User Lifecycle

Organizations need well thought-out processes for Identity and Access Management that ensure that identities are managed correctly and all the challen ...

Login Free 30-day Select Access Get full Access

3.4 B2B System Integrations

Regardless of the organization size, B2B interactions often requires some kind of integration between business systems. This linking of systems and se ...

Login Free 30-day Select Access Get full Access

3.5 B2B Supply Chain

An organization's supply chain depends on its network of people, organizations, resources, activities, and all the technologies required to make this ...

Login Free 30-day Select Access Get full Access

4 Core B2B Capabilities

Partner onboarding is easier than offboarding. Have a well-defined process at both the organization and the individual level to ensure that there are ...

Login Free 30-day Select Access Get full Access

4.1 Identity Management

Identity is at the core of any information security system and Identity and Access Management (IAM) gives the capabilities to manage these identities, ...

Login Free 30-day Select Access Get full Access

4.2 User Self-Service

In the context of B2B interactions, it is helpful to reduce costs and user friction by providing customers the tools that they need in an easy to use ...

Login Free 30-day Select Access Get full Access

4.3 User Management and Delegation

Having the ability to perform user management is a key capability of IAM. This can be accomplished through account management in which you can create, ...

Login Free 30-day Select Access Get full Access

4.4 APIs

Many different factors are driving Digital Transformation in the market today. One factor is the change in how businesses interact with their consumer ...

The need for APIs is driven by the need to meet emerging IT requirements such as hybrid environments that span across on-premises, the cloud, even mul ...

Login Free 30-day Select Access Get full Access

5 The Ubisecure Approach to Solving B2B Challenges

In order to build a solid foundation in which B2B partners, suppliers, and customers can interact, identity as the basis of trust must first be establ ...

Login Free 30-day Select Access Get full Access

5.1 Ubisecure Overview

In a B2B context, Ubisecure provides strong federation capabilities, innovative standards support, as well as flexibility through workflow automation ...

Login Free 30-day Select Access Get full Access

5.2 Ubisecure Capabilities

Ubisecure Identity Server allows for the storage of identities within Redis, LDAP, and SQL clusters. For high utilization deployments, the Redis datab ...

To help with reducing the overhead cost and security risks, Ubisecure supports user self-service through configurable workflows that facilitates the s ...

Ubisecure takes the ability to delegate even further by combining both Delegated ID and LEI to provide a new offering called Right to Represent. By us ...

Login Free 30-day Select Access Get full Access

6 Summary and Recommendations

Traditional IAM is no longer enough for fulfilling the demands of the business-to-business scenarios of today. Shift the focus from using IAM for just ...

Login Free 30-day Select Access Get full Access

6.1 Recommendations for architectural analysis

  • Inventory existing IAM infrastructure and document architectural gaps.
  • Consider how a modernization strategy will impact existing legacy IAM.
  • Co ...
Login Free 30-day Select Access Get full Access

6.2 Recommendations for B2B IAM modernization

  • Consider the advantages and disadvantages of IDaaS solutions.
  • Plan for identity diversity that supports the digital services and the use of device ...
Login Free 30-day Select Access Get full Access

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top