These Materials Are 2021 John Wiley & Sons, Ltd. Any .

Transcription

These materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Customer Identity &AccessManagement (CIAM)Okta Special Editionby Lawrence C. Millerand Jeremie CertesThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Customer Identity & Access Management (CIAM) For Dummies ,Okta Special EditionPublished by: John Wiley & Sons, Ltd., The Atrium, Southern Gate Chichester, West Sussex,www.wiley.com 2021 by John Wiley & Sons, Ltd., Chichester, West SussexRegistered OfficeJohn Wiley & Sons, Ltd., The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UnitedKingdomAll rights reserved No part of this publication may be reproduced, stored in a retrieval system ortransmitted in any form or by any means, electronic, mechanical, photocopying, recording,scanning or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988,without the prior written permission of the Publisher. For information about how to apply forpermission to reuse the copyright material in this book, please see our website http://www.wiley.com/go/permissions.Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,Making Everything Easier, and related trade dress are trademarks or registered trademarks ofJohn Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and maynot be used without written permission. Okta and the Okta logo and trademarks or registeredtrademarks of Okta, Inc. All other trademarks are the property of their respective owners. JohnWiley & Sons, Ltd., is not associated with any product or vendor mentioned in this book.LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: WHILE THE PUBLISHER AND AUTHOR HAVEUSED THEIR BEST EFFORTS IN PREPARING THIS BOOK, THEY MAKE NO REPRESENTATIONS ORWARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OFTHIS BOOK AND SPECIFICALLY DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITYOR FITNESS FOR A PARTICULAR PURPOSE. IT IS SOLD ON THE UNDERSTANDING THAT THEPUBLISHER IS NOT ENGAGED IN RENDERING PROFESSIONAL SERVICES AND NEITHER THEPUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. IFPROFESSIONAL ADVICE OR OTHER EXPERT ASSISTANCE IS REQUIRED, THE SERVICES OF ACOMPETENT PROFESSIONAL SHOULD BE SOUGHT.For general information on our other products and services, or how to create a custom ForDummies book for your business or organization, please contact info@dummies.biz, or visit www.wiley.com/go/custompub. For information about licensing the For Dummies brand for productsor services, contact BrandedRights&Licenses@Wiley.com.ISBN 978-1-119-76763-3 (pbk); ISBN 978-1-119-76764-0 (ebk)Printed in Great Britain10 9 8 7 6 5 4 3 2 1Publisher’s AcknowledgmentsContributing Writer: Jack HymanProject Manager: Martin V. MinnerAcquisitions Editor: Ashley CoffeySenior Managing Editor:Rev MengleBusiness DevelopmentRepresentative: Molly DaughertyProduction Editor:Mohammed Zafar AliThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Table of ContentsINTRODUCTION. 1About This Book. 1Foolish Assumptions. 2Icons Used in This Book. 2Beyond the Book. 2CHAPTER 1:What Is CIAM?. 3What Is CIAM?. 3What Is Bad CIAM?. 4Customer, Business Model, and Application Types. 5Key Capabilities. 6CHAPTER 2:Discovering Why CIAM Matters Now(More Than Ever). 7Addressing the Demand for Modern Customer Experience. 8Cultivating Customer Trust. 9Digital Transformation. 11CHAPTER 3:Building CIAM Is Hard. 13A Delicate Balancing Act: Customer Experience VersusSecurity and Compliance. 13Attracting and Retaining Skilled Developers. 16Looking at Additional Considerations. 17A Classic Build-Versus-Buy Business Decision. 18CHAPTER 4:Understanding How a Modern CIAMSolution Can Help You. 19What Is a Modern CIAM Solution?. 19Frictionless user experiences. 20Speed-to-market. 20Centralized management. 21Internet-scale security. 21Taking a Platform Approach. 22Built on Secure, Reliable, and Scalable Infrastructure. 22Exploring Use Cases. 23Protecting against account takeover. 23Building highly scalable applications. 24Table of ContentsiiiThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Unifying customer identities across applications. 24Integrating enterprise identities. 25Securing access to APIs. 25CHAPTER 5:Knowing What to Look for in a ModernCIAM Solution. 27Product. 27Platform. 29Infrastructure. 31Industry Leadership. 32CHAPTER 6:Unlocking CIAM Potential Based onYour Business Needs. 33The Path to CIAM Maturity. 33Basic: Build Versus Buy. 34Automated: Centralize and Scale. 35Intelligent: Optimize Without Compromise. 37Continuous: Lead and Set the New Standard. 38CHAPTER 7:Envisioning the Future of CIAM. 39Increase Customer Engagement. 39Drive Better Security Outcomes. 40Safeguard Privacy. 41Manage Complexity. 42CHAPTER 8:ivTen Considerations for CIAM. 43Customer Identity & Access Management (CIAM) For Dummies, Okta Special EditionThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

IntroductionYou’ve no doubt used customer identity and access management (CIAM) in your personal life as a customer of otherbusinesses — whether you realized it or not. Perhaps you’velogged into a website to purchase concert tickets. Or maybe you’veused your social media account to log into a new e-commerce site.You may have used your mobile phone to do some online bankingand received a one-time passcode via text message to login toyour account. These are some everyday examples of how customers are already using CIAM with their favorite applications, websites, and portals.In this book, you’ll discover how modern CIAM can help yourorganization deliver secure, seamless digital experiences for yourcustomers and partners.About This BookCustomer Identity & Access Management (CIAM) For Dummies, OktaSpecial Edition, consists of eight chapters that explore:»» The basics of CIAM (Chapter 1)»» Why CIAM is more important than ever (Chapter 2)»» Why you shouldn’t try to build CIAM yourself (Chapter 3)»» What a modern CIAM solution is and how it can help yourorganization (Chapter 4)»» What to look for in a modern CIAM solution for yourorganization (Chapter 5)»» Thriving thanks to a CIAM solution tailored to your businessneeds (Chapter 6)»» The future of CIAM (Chapter 7)»» Ten important things to consider in a CIAM solution to helpyour organization thrive (Chapter 8)Each chapter is written to stand on its own, so if you see a topicthat piques your interest, feel free to jump ahead to that chapter.You can read this book in any order that suits you (though wedon’t recommend upside down or backward).Introduction1These materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Foolish AssumptionsIt’s been said that most assumptions have outlived their uselessness, but we assume a few things nonetheless!Mainly, we assume that you work in a role that is responsible forbuilding, scaling, modernizing, integrating, architecting and/orsecuring a customer/partner application, website, or portal. Youmay be an application developer or architect, a product manager,an engineering manager, a digital manager, a chief technologyofficer (CTO), a chief information officer (CIO), a chief productofficer (CPO), a chief information security officer (CISO), a chiefmarketing officer (CMO), or someone who specializes in or isfamiliar with identity and access management.Icons Used in This BookThroughout this book, we occasionally use special icons to callattention to important information. Here’s what to expect:This icon points out important information you should commit toyour nonvolatile memory, your gray matter, or your noggin.If you seek to attain the seventh level of NERD-vana, perk up!This icon explains the jargon beneath the jargon.Tips are appreciated, but never expected — and we sure hopeyou’ll appreciate these useful nuggets of information.These alerts point out the stuff your mother warned you about(well, probably not), but they do offer practical advice.Beyond the BookThere’s only so much we can cover in this short book, so if you wantto learn more, check out https://okta.com/customer-identity.2Customer Identity & Access Management (CIAM) For Dummies, Okta Special EditionThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

IN THIS CHAPTER»» Defining customer identity and accessmanagement»» Recognizing how a bad CIAM experienceaffects customers»» Improving the CIAM user experience inmobile apps, websites, and portals»» Understanding key CIAM capabilitiesChapter1What Is CIAM?Usernames and passwords have become a part of everydaylife. Consumers manage different accounts for onlineshopping, bank accounts, and mobile apps. This is customer identity and access management (CIAM), and you no doubtrecognize some of the differences between good CIAM and badCIAM in many of your digital experiences. For example, yourmobile banking app may give you a strong sense of security andease of use by simply authenticating you with a fingerprint or facescan. On the other hand, you’ve likely abandoned more than oneonline shopping cart when a retailer wants you to complete alengthy registration process. Registration can take more timethan finding the products you were looking for!In this chapter, we cover the basics of CIAM including what itis, how a bad CIAM experience negatively affects customers, whyyou need CIAM for your customers and applications, and the corecapabilities that every CIAM solution must have.What Is CIAM?You may not be familiar with the CIAM acronym, but CIAM ispart of your life every day, whenever you access an app on yourmobile phone, sign up for a new online service, or sign in to yourCHAPTER 1 What Is CIAM?3These materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

favorite website. CIAM provides a digital identity layer that canbe embedded into your customer-facing apps, websites, and portals. CIAM helps you identify who your customers are and whatthey have access to when they use their favorite devices to accessyour customer-facing services, including your apps, portals, andwebsites, from anywhere in the world. CIAM includes not only thesign-in/login experience, but also the registration and sign-upprocess throughout the entire customer journey.A bad CIAM experience can drive your customers to a competitorthat offers a more frictionless and intuitive customer experience.So, what exactly defines a bad CIAM experience?What Is Bad CIAM?Critical to the experiences you provide to your customers is theability to secure their access and data. But having secure access isworthless if the experience is so difficult and frustrating that yourcustomers decide it’s too much work to engage with you. You’veno doubt had a bad CIAM experience yourself in some of yourpersonal and business transactions. Some examples of typicalcustomer pain points when it comes to CIAM include having to:»» Create an account and password just to browse a website»» Create more accounts and passwords for different apps,websites, and portals of the same company»» Log in with different accounts and passwords to accessdifferent services of the same company»» Provide your life story (well, it may seem like it) in a lengthyregistration process just to create your account»» Navigate different login experiences and functionalitiesacross devices»» Call customer service to reset a forgotten or incorrectpassword»» Enter an SMS passcode, in addition to your password, everytime you log in — even if you are always logging in from thesame location and device4Customer Identity & Access Management (CIAM) For Dummies, Okta Special EditionThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

By comparison, a good CIAM experience might provide:»» Easy registration and account creation that requires theminimum amount of information necessary to get started»» Face recognition on your smart device (look Mom, nopassword!)»» A text message or email verification for a sensitive financialtransaction to make you feel more secure»» Access to all the services of a business from the sameaccountBad CIAM introduces needless friction throughout the customerjourney such as lengthy and intrusive registration processesand manual password resets that require call center interaction.Bad CIAM requires your developers to build custom integrationsand connections for new apps, thereby slowing your speed-tomarket. Bad CIAM requires customers to create separate useraccounts for different apps, websites, and portals across a company’s digital estate — and requires your administrators tomanage these accounts in separate directories. Finally, bad CIAMdoes not provide the reliability and scale that agile businessesrequire in the digital economy.Don’t let your CIAM touch points become pain points for yourcustomers. Make CIAM the start of a delightful customer experience that continues throughout the customer journey.Customer, Business Model,and Application TypesYou need a modern CIAM solution to ensure a seamless,omnichannel customer experience across all your products andservices, 24x7x365, wherever your customers are interactingwith you. CIAM is the first step in the customer journey for manyapps, websites, and portals, so it is critical to the overall customerexperience.CHAPTER 1 What Is CIAM?5These materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Your business may sell directly to individual consumers, to otherbusinesses, or to both. A CIAM solution needs to support thesedifferent types of customers and a variety of business modelsincluding business-to-consumer (B2C), business-to-business(B2B), and business-to-business-to-consumer (B2B2C).Your different customers may also have a preferred channel fordoing business with your company. For example, individual consumers may prefer using your mobile app while business partnersmay prefer engaging your business from their work computers.CIAM must support your different customer types on their preferred channels and devices.Additionally, to support B2B and B2B2C business models, youmay need to provide secure connections and integrations toyour partners’ apps and portals. You may also need to federateidentities for your partners using enterprise directory services such as Active Directory and Lightweight Directory Access Protocol (LDAP).Finally, your customers can access your services across all yourmobile apps, websites, and portals. The customer experienceneeds to be consistent across all application types with like functionality delivered in a frictionless manner.Key CapabilitiesThe three main capabilities of an effective CIAM solution areauthentication, authorization, and user management. In CIAM,your users are your customers and partners.Proper authentication ensures that the people logging into theiraccounts are who they say they are, preventing bad actors fromaccessing sensitive user data (such as payment details, addresses,and Social Security numbers) or making fraudulent transactions(such as transferring money from a bank account).Effective authorization helps businesses confirm that a user hasthe right level of access to an application and/or resources.Clear user management allows administrators to update user accesspermissions and implement security policies, better enablingseamless and secure experiences.6Customer Identity & Access Management (CIAM) For Dummies, Okta Special EditionThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

IN THIS CHAPTER»» Delivering a superior customerexperience»» Establishing trust as a cornerstone ofcustomer relationships»» Enabling and driving digitaltransformationChapter2Discovering Why CIAMMatters Now (MoreThan Ever)Customers today expect and demand a modern, seamless,personalized, customer experience at every touchpoint.Organizations that fail to deliver such an experience will beunable to attract and retain new and existing customers.Trust is also non-negotiable. Organizations that fail to protectthe security and privacy of their customers’ personal informationwill lose customers — including customers who aren’t directlyaffected by a data breach but have lost confidence in the organization because of a breach.Finally, digital transformation is no longer an initiative — it hasbecome a mandate. Every company, regardless of industry, mustbecome a technology company to survive and thrive in the modern digital economy.This chapter shows how customer experience, security andprivacy, and digital transformation are not only driving butalso accelerating the need for a modern CIAM solution in yourorganization — now more than ever.CHAPTER 2 Discovering Why CIAM Matters Now (More Than Ever)7These materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Addressing the Demand for ModernCustomer ExperienceThe modern customer experience is seamless, personalized,and omnichannel. It provides your customers with frictionless24x7x365 access to products, services, information, and otherresources at their fingertips on their preferred device — whetherit’s a smart device, computer, tablet, or smartphone.Not so long ago, people shopped almost entirely at bricks-andmortar stores and watched movies in theaters or when they airedon television at a specific day and time. As people started interacting with businesses from their computers at home, it becameincreasingly important to deliver a friendly user experience onwebsites. Today, people use their smartphones to order groceries to be delivered to their doorsteps while they are at work, andcan watch their favorite shows anytime, anywhere, on any device.Companies like Amazon and Netflix are setting the standard forseamless customer experiences across all channels, and consumers expect the same from every company they do businesswith — including yours. Thus, it is now more critical than everfor organizations to offer such modern access experiences to theircustomers.An Entrepreneur.com article (“Vroom! Why Website SpeedMatters,” May 19, 2017) reported that, according to analytics byKissmetrics, “47 percent of consumers expect a page to load intwo seconds or less” and “40 percent of consumers will abandona website that takes more than three seconds to load.” So, whatmakes you think your customers will tolerate a slow, clunky loginexperience that takes forever?Organizations need a modern CIAM solution that helps deliver asuperior customer experience to:»» Unify digital experiences across devices: Customers don’tenjoy registering or logging in multiple times for differentservices from the same company. Instead, they want aconsistent and fully functional experience whether they arevisiting your website on their computers or mobile devicesor using the different mobile apps in your digital estate.That experience includes a seamless, secure, and brandedlogin on any device, anywhere in the world, 24x7x365.8Customer Identity & Access Management (CIAM) For Dummies, Okta Special EditionThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

»» Personalize customer journeys: Collecting first person,authoritative preference information — including consent —across channels helps you build a 360-degree view of yourcustomers. You can then consolidate customer identities andprofiles in one place and tailor the customer journey basedon individual preferences. The more consumers feel youunderstand them, the more likely they are to do businesswith you and share their positive experiences with others.»» Enable new and modern experiences: Technology evolvesat a breakneck speed and helps shape customer expectations and trends. Ten years ago, smartphone customerswere calling people and checking their personal emails.Today, your customers can order a critical part on yourcompany’s app installed on their smartphone while commuting to work on a bus or train — and they expect it to bedelivered overnight. A modern CIAM solution can help youdeliver a seamless experience for your customers withinnovations like passwordless authentication (such as facialrecognition and fingerprint identification) across devices.Both workforce identity and customer identity solutions are crucialtechnologies in an organization’s tech stack. However, althoughyour employees likely won’t leave your company because of apoor login experience; your customers won’t think twice aboutgoing to your competitors if you fail to deliver a superior end-toend customer experience that includes a seamless, personalized,omnichannel login experience.Cultivating Customer TrustBuilding and preserving customer trust is crucial to every organization’s success, but the personal data and account informationwith which organizations are entrusted is under constant threat.Far too often, it is compromised. Protecting customer accountsand information is imperative. If your customers don’t trust you,they will quickly become your competitors’ customers.When customers have a bad experience doing business with yourorganization or lose trust in your organization, they don’t keep itto themselves. You can thank social media for that!CHAPTER 2 Discovering Why CIAM Matters Now (More Than Ever)9These materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Modern cyber threats and attacks are more sophisticated, destructive, frequent, and massive in scale than ever before. The recentglobal pandemic offers no reprieve from the bane of cybercriminalsas nearly 16 billion records were compromised in the first half of2020 — a 273 percent increase compared to the first half of 2019,according to Security Boulevard (https://securityboulevard.com).For consumers, the financial and personal devastation of a databreach is undeniable. It can take years for an individual to recoverfrom financial and/or identity theft — and many may neverrecover.For organizations, the financial damage can easily exceed tens orhundreds of millions of dollars. In 2018, Marriott Internationalreported that attackers had stolen data on more than 380 millionguests. The breach cost Marriott more than 44 million in thefirst quarter alone after the breach was disclosed, and the company has since been fined 25 million by the U.K. InformationCommissioner’s Office (ICO). But the revenue cost due to brandreputation damage and loss of customer trust is inestimable.Many organizations never recover from — and will not survive —the loss of customer trust when personal data and accounts arecompromised.Organizations need a modern CIAM solution that helps build andpreserve customer trust to:»» Secure customer accounts: Cyberattacks are becomingever more sophisticated and destructive. Passwords aren’tenough to secure your customer’s accounts — and no onelikes dealing with passwords anyway. Secure the customeridentity lifecycle for all your apps by protecting customers atregistration, authentication, and during in-app activity withinnovations like multi-factor authentication (MFA) andpasswordless authentication.»» Manage privacy and consent: Customers demand securityand privacy for their personal information. The fundamentalright to privacy has now been codified in many new lawsincluding the General Data Protection Regulation (GDPR) andCalifornia Consumer Privacy Act (CCPA), among others. YourCIAM solution must enable a seamless and intuitive customer experience that empowers your customers to managewhat personal information they are willing to allow your10Customer Identity & Access Management (CIAM) For Dummies, Okta Special EditionThese materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

organization to use, share, and store. If your identityplatform can’t support the latest regulations, you’re puttingyour organization in legal jeopardy.»» Comply with regulatory mandates: GDPR and CCPA arejust two examples of the dozens of stringent security andprivacy regulations that have been enacted by governmentsaround the world in the past five years. This trend willinevitably continue for the foreseeable future. For example,CCPA hadn’t even been enacted for a full year before theCalifornia Privacy Rights Act (CPRA) was passed in November2020. Organizations that fail to comply with applicableregulations risk financial loss due to audit failure and/orbeing forced to cease operations.Digital TransformationToday, every company must become a technology companyto survive and thrive. Every industry is being affected by digital transformation and this trend is accelerating now more thanever. For example, video rental stores (and even movie theaters)have disappeared in the wake of streaming media services andtaxi companies are struggling to compete against ridesharingservices. However, many organizations face significant technicaldebt as they attempt to migrate away from burdensome legacysystems. Digital transformation requires companies to modernizetheir technical infrastructure and can enable a transition into theapplication programming interface (API) economy.Technical debt is the implied cost of rework caused by a previousdecision to implement an easier solution, rather than the rightsolution.Organizations need a modern CIAM solution that helps drive andaccelerate digital transformation including:»» Moving to the cloud: For most companies, the cloud is anintegral part of their digital transformation strategies. Legacyinfrastructure hinders an organization’s flexibility and abilityto provide a modern customer experience. However, it cantake many years for a company to move to the cloud. Asingle identity layer for modern web and mobile apps, asCHAPTER 2 Discovering Why CIAM Matters Now (More Than Ever)11These materials are 2021 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.

well as legacy on-premises apps, simplifies the managementof these hybrid cloud environments composed of publiccloud, private cloud, and on-premises resources. Benefits ofthe cloud include: Improving application development and deployment agilitywhile reducing costs: Organizations can d

websites, and portals. In this book, you’ll discover how modern CIAM can help your organization deliver secure, seamless digital experiences for your customers and partners. About This Book Customer Identity & Access Management (CIAM) For Dummies, Okta Special Edition, consists of eigh