Things worth knowing about the essentials
The latest information dealing with all areas of Identity & Access Management.
Read interesting articles on innovations as well as changes in Login-Master and the open source technology Keycloak. At our events, you can ask questions purposefully either personally or online. Find out more about our intelligent software and how you can derive added value from it for your company.
News
CIAM versus IAM
The term CIAM – Customer Identity & Access Management – describes the identification and assignment of access permissions to “external” users of an organisation such as, for example, customers, partners, members of associations and federations, or citizens who deal with public agencies over the Internet.
Use of Keycloak .NET adapter in Microsoft® Visual Studio
We explain how you easily use Keycloak functions in Microsoft® Visual Studio and .NET environments. Get started with our guidance for the Keycloak .NET adapter.
Keycloak as identity broker
How Keycloak, as identity broker, simplifies the online world for companies and customers. As an intermediary service, an identity broker is responsible for establishing a trust relationship with an external identity provider in order to use its identities to access internal services that are offered by service providers.
Events
Webinar KuppingerCole January 2021
Cloud, Digitalisierung and Zero Trust require new approaches for the management of identities and their permissions. Learn how you design your administration of roles and legitimations more agile and simpler. The free webinar with KuppingerCole shows you an agile method to leave RBAC and provisioning behind. Integrate it into existing systems and work from now on just in time.
EIC – European Identity & Cloud Conference 2017
The European Identity & Cloud Conference 2017 takes place May 9 – 12, 2017 at the Dolce Ballhaus Forum Unterschleissheim, Munich/Germany. It is Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. For the 11th time the EIC will offer best practices and discussions […]