When you extend the use of identity management to access control, you want to enable your customers to take care of their credentials and offer additional security measures.
B2B access control is typically implemented using techniques that require back office operations to administer the users individually. Learn more about self-administration.
The average size of user populations, the adoption of local technology and the sensitivity relative to data privacy, make IAM in Europe different.
Our existing access control was grown with ad hoc decisions about who should have access. Moreover, the decisions made in one system/environment were not consistent with those implemented in another one.
The miaa team and their solutions brought clarity in this landscape. Now we have a single place where all access is governed across all our web content. We no longer store user details in our web server, nor in the mobile app.
We have a modern IT organisation, deploying quite some SaaS platforms. But the miaa guys came with an interesting model: they go beyuond SaaS and make the entire solution a managed service with a subscription fee. This makes the total cost of ownership very predictable and allows me to finance it off-balance.