Identity Management (IDM)
...secure authentication is a measure in risk management and a key factor of every identity management system.
Problems of Identity Management (IDM)
«Please enter your username and password ...». A familiar scenario? Which user is not often encounter on this challenge on the Internet?
Countless personalized Internet services require a user profile and password. But who can remember all these? Therefore the temptation is great to use the same password for each subsequent registration. That in turn will bring you big risks for your personal privacy!
With the increasing shift of business to the Internet the requirements will raise for a trusted and efficient user identification. With this context, cyber crime increases rapidly in correlation with rigged and stolen identities! Why?
• Countless personalised Internet services results to a huge number of identities for the user (username/password)
• Passwords are forgotten or are often used in low strengths and same combinations
• Identity data is transmitted unencrypted (no https:// )
• Use of different authentication methods, such as proprietary tokens, smart cards, code generators, etc.
• Technological excessive demand of the user
>> Increasing the IT security usually results to a reduction in user-friendliness
Customers - Users - Clavid AG
Our know how and expertise of globally deployed authentication and authorization systems applied in big Swiss financial institutions in combination of identity management systems allow us to apply similar solutions and services for small and medium-sized businesses (SMB), without digression from the high security standards.
In order to exchange digital identities between enterprises and online services, the identity provider platform of clavid ag is especially interesting for SMB's. It provides secure authentication and authorization services, supports many authentication methods and minimizes the costs for such services in comparison of integrating business internal, cost extensive solutions such as public key infrastructures (PKI).
Of course, our products and services are also of interest for large enterprises with own PKI solutions. As soon as enterprises want to provide Internet based services, that stay outside of the business's Intranet, to its users, our services may be of interest. Using external services of an independent identity provider like clavid ag simplifies integration of authentication and identity federation protocols.
Clavid AG provides products and services in the following communication areas of IT security:
• Business to Internet
• Business to OpenID
• Business to Business (B2B)
• Business to Customer (B2C)
• Identity Mapping (with and without user anonymization)
• Single Sign-On (SSO)
• Identity-/SSO Federation