August 31, 2020 By Martijn Loderus 2 min read

Consumer identity and access management (CIAM) is the connective technology between consumers and brands. CIAM is an important consideration when navigating routes to market for your products and services. A consumer’s journey navigating solutions to problems is where you can leverage the CIAM building blocks — capture, engage, manage and administration — for more personalized campaigns and direct consumer engagement. Read on to learn the meaning and drivers of these building blocks.

Explore CIAM for your organization

CIAM vs IAM

CIAM has a different objective compared to traditional workforce identity and access management (IAM) solutions. It aims to bring in as many consumers as possible while authenticating them in an engaging and personal manner.

Where traditional IAM is all about access control, CIAM is geared toward consumer data capture and engagement. CIAM opens the door to more personalized offers through progressive profiling and secure interactions with consumers — from discovery to online shopping to brand advocacy. That leads us to the building blocks of CIAM.

The Building Blocks of CIAM

Capture: Every business will need to capture users’ identities and profiles to engage with them in a personal manner. This is an important step in enticing unknown users to provide information and helps the organization establish a relationship with the consumer.

Engage: At this stage, the organization must balance security and experience to connect with consumers on a deeper level. Your stakeholders will want to look at improving the user experience through social login and single sign-on and employ multifactor authentication (MFA) to protect personally identifiable information (PII).

Manage: This building block is an important consideration as it relates to managing PII and sensitive data for consumers. CIAM solutions can help the enterprise deliver self-serviced profile and consent management.

Administration: Finally, administration, or admin, is an important aspect of the operations and maintenance of a CIAM platform. IT managers are most concerned with this area as it relates to provisioning new web applications and user accounts. In other words, IT managers will be most concerned with this building block because it deals with how consumer profiles are migrated, imported or exported throughout the business environment. The IT team will need to put relevant policy and regulatory controls in place.

Different Uses for Different People

Each of these building blocks is a key element for many different stakeholders within the company. A chief marketing officer may be primarily concerned with how to capture and engage the consumer to shift toward a brand loyalist. A security leader may be more concerned with the security management and administration of the data and where the identity profiles are stored.

Each of the building blocks above provides a framework in which to think about the use cases and entry points into CIAM. These entry points can provide an organization with the right lens and perspective to drive toward success.

More from Identity & Access

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today