Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.
Business to Consumer (B2C) is an incredibly common kind of identity and access management implementation. This implementation allows consumers to self-register and self-manage their digital identities for a given retailer or service provider. The provider does this so that they can streamline subsequent interactions with consumers and to provide a seamless user experience while providing a level of security appropriate with the provided services.The following series of Blog entries show an approach on how to modernize an existing CIAM solution, leveraging the cloud.Introduction and Challenges:
https://www.ibm.com/blogs/security-identity-access/modernizing-your-b2c-portal-security-introduction-and-challenges/Desired End State:
https://www.ibm.com/blogs/security-identity-access/modernizing-your-b2c-portal-security-desired-end-state/
A thoughtful approach:
https://www.ibm.com/blogs/security-identity-access/modernizing-your-b2c-portal-security-a-thoughtful-approach/LDAP Proxy for Cloud Identity:
https://www.ibm.com/blogs/security-identity-access/modernizing-your-b2c-portal-security-ldap-proxy-for-cloud-identity/
LDAP Proxy Deep Dive:
https://www.ibm.com/blogs/security-identity-access/modernizing-your-b2c-portal-security-ldap-proxy-deep-dive/
Copy