CIAM solution for B2B delivers highest performance for web application users
Read our project story helps you to understand login-master. The modular Customer Identity & Access Management solution was born to meet fundamental needs in a web portal project.
Login-Master offers the users’ authentication and access control requirements of a B2B Portal. We had the choice between two Open Source offers: ForgeRock, one of the oldest platforms for CIAM with expensive subscription fees or the young CIAM rocket Keycloak with no subscription fees. We selected Keycloak.
What makes the difference: identity platform offering only authentication or Open Source SSO with flexible and complete user life Cycle?
With Keycloak we chose one of the best Open Source SSO solutions. It delivers all necessary authentication features. It works perfectly for the storage of up to 500 user accounts. But our customer challenge was: His web portals supported more than 500 users. And there was an important part missing: the User-Life-Cycle management. Therefore, we combined the access management with all necessary identity features to build an holistic CIAM solution. For B2B tasks we add intelligent building blocks to meet complex roles and rights requirements.
Login-master is one of the smartest innovations. Because it combines the most modern SSO software with flexible access and identity modules. A full blown User Life Cycle, offering Process Automation, Delegated Administration, Workflows, Audit and much more, to ensure quick and controlled access to sensitive information. The modules guarantee fast and highly reliable functions thanks to the very powerful Java backend engine iDOME. Intension developed this framework to easily script and automate IAM workflows. Small and medium businesses use it as well as enterprise organisations like Deutsche Telekom.
Modular solution helps to extend IAM functionalities for B2B on demand
Back to login-master and its formation. These illustrations in the following help you to understand the IAM solution much better. It consists of two parts:
1. Access Management and Access Control
Everything you need to master user’s access to secured resources. As Single-Sign-On or Single-Sign-Out. With an Identity Broker and different Identity Providers. Add SecuRole® and you manage access rights by token based authorisations. This is fast, secure and helps you to overcome digital hurdles, like cloud access for different entities.
The role shop allows your users to pick and apply for certain roles in an automated way. The Admin tool offers the same benefit: reducing workload of support. It enables companies to do e-business with different parties seamlessly. No matter if partner or supplier, the delegated admin functionality cares about external identity changes.
2. Identity Management
This is your working horse for the digital management of your user’s identities. It supports you to manage identities right according to GDPR rules. Fast and automated – thanks to its Workflow Engine. Comprehensible because of history collection, Audit functions and the Mail Engine for recurring processes. It facilitates the work of your support dramatically.
Login-Master’s modular approach
No matter if you are a beginner or an expert. And no matter how small or big is your project. You will find the right IAM modules according to your needs.
Acess Management
The Access Management uses Keycloak for the Single-Sign-On. The SSO Module provides the Authentication functionality for all integrated applications which supports OIDC or SAML.
Java developers, governmental institutions or companies of all sizes and branches are using the Red Hat Open Source project, which is now belonging to IBM. If you search for Keycloak consulting, start with our experts now.
Keycloak is not your favorite? It does not matter; we also integrate other SSO solutions for you. Like Okta or ForgeRock.
The Authentication of users is the first step in a complete User Management. You are already in the right direction.
Bring your web application on a higher level. Extend your isolated access solution. Why? To manage a huge number of accounts. Or to address complex authorizations within or around your internet portal. Our Identity Management lifts you up on the next level.
Identity Management
The Identity Suite or User Life Cycle (ULC) Management uses the well proven realtime data synchronisation framework iDome of intension. You would like to understand why to switch to such a central identity management? Predominant in the user management actually is, that the application itself manages the users. This is unsafe and inefficient. It costs you a plenty of time to integrate. Every new application brings you a further development, a higher complexity and more incompatibilities with GDPR.
The right Management of Users allows you to relieve your support. It saves a lot of time and money.
The authorisation of an identified user to certain applications or protected areas is the last step to assure a working system – important for security, efficiency and user’s satisfaction.
Access Control
In Access Control, the SecuRole® Legitimation Framework is something quite new, but already proven. It addresses the actual complexity of access rights and its fluctuations in the internet world. Especially for B2B web portals and cloud access, SecuRole® offers you new pathways to an unexpected scope. Group memberships, like in Microsoft Azure, are unnecessary. Token based authorisations perform now the task of handling access rights and roles in a digital way. Laborious pre-provisioning is now needless. Read more about the smart framework here.
On top of this, users shall easily request for certain roles. With an automated logic, a role shop allows fast allocation of roles. The system locks securely leaving web portal members. Especially important is this for delegated admins. No matter if basic user or local admin: different permissions with different functions from different legal parties in a cloud world are no longer a question mark, nor a black hole for your security. The modern way to handle permissions and the processes around, gives you the right starting position for the future.
High user numbers or complex B2B access rights are no hurdles anymore to more business.
As provider of an internet application you have to answer many technological challenges and keep the costs low. Nowadays you can choose comprehensively ready made services from the cloud. But not every application is ready to embrace this enormous potential. We designed Login-Master to answer this dilemma: this solution provides everything needed to bring you legacy applications into the cloud future.
Safeguarding web applications, especially in the cloud shall not anymore be your nightmare:
- Get faster through digitalisation, centralisation and automation by diligent IAM helpers
- Provide your users enhanced security by Open Source, GDPR compliance and intelligent modules adapted to your individual requirements
- Trust us by working with IT security experts and their best solutions
- Get the freedom to concentrate on your core business
Get in touch and let’s find out, which parts of Login-Master will bring you the highest benefit:
Access Management, Identity Management or Access Control?