Author name: Leo Sorokin

Access Control, Authorization

Access Control Paradigms

Application access control determines what actions a user (or other non-human identity) can or cannot perform with a given resource. Authorization is a critical part of access control and can be accomplished using the following options: Interestingly, authorization is in many ways even more complex than authentication. While authentication determines who the entity is, authorization […]

Access Control Paradigms Read Post »

, , ,
Artificial Intelligence, Generative AI

AI Agents and Digital Identity in the Enterprise

There is a lot of hype these days about AI agents within the broader category of AI applications. All the big tech vendors are building platforms (i.e. tech stacks) both for enterprises to develop their own AI agents as well as for Independent Software Vendors (ISVs) who design AI agents and then sell them to

AI Agents and Digital Identity in the Enterprise Read Post »

,
Customer Identity and Access Management

Customer Identity and Access Management for Education

If you are an Independent Software Vendor (ISV) that is developing applications for the education sector, you may have started your identity journey by owning the authentication experience for your end users in each application separately. This means that, in essence, you may have unknowingly created identity silos, whereby each application in your application portfolio

Customer Identity and Access Management for Education Read Post »

, , ,
Customer Identity and Access Management

B2B CIAM Capabilities in Transmit Security

The Mosaic Platform by Transmit Security enables advanced Business-to-Business (B2B) Customer Identity and Access Management (CIAM) experiences, which is now known in the industry as B2B CIAM. While Business-to-Consumer (B2C) access has been around for a long time, CIAM has generally focused on B2C rather than on B2B use cases. However, B2B scenarios introduce more

B2B CIAM Capabilities in Transmit Security Read Post »

,
Decentralized Identity

The Future of Digital Identity in the European Union

The European Union (EU) is currently undergoing a substantial update to the eIDAS (electronic IDentification, Authentication, and trust Services) regulation to establish a European digital identity framework. The proposed regulation will help drive adoption of digital wallets for both citizens and businesses. Its main objective is to enable EU member states to issue certified digital

The Future of Digital Identity in the European Union Read Post »

,
Customer Identity and Access Management

Powering Multi-Tenant B2B SaaS Applications with CIAM

Organizations that offer applications via Software-as-a-Service (SaaS) to their business customers often have a need for Customer Identity and Access Management (CIAM) capability. In this article, multi-tenancy means that our business-to-business (B2B) SaaS application can support multiple tenants, where each tenant is simply a grouping of users. Therefore, each business customer organization is a distinct

Powering Multi-Tenant B2B SaaS Applications with CIAM Read Post »

, ,
Microsoft Entra External ID

Demystifying Microsoft Entra External ID

Microsoft Entra External ID is part of Microsoft Entra and is designed to address scenarios that involve external access to an organization’s applications and services. So, what constitutes external access? External access is access by end users that are outside of your organization, that is, typically by end users that are not employees of the

Demystifying Microsoft Entra External ID Read Post »

,
Scroll to Top