Authorization Basics

2 mins read

ConnectId Security Profile Basics

Get familiar with ConnectId Security Profile: what it is and why it is important. Learn when it should be used and when you have to comply to its rules.

ConnectID Overview

ConnectId serves as a comprehensive digital identity platform, simplifying the complex process of identity verification. ConnectId allows individuals to securely store and manage their personal information, ensuring that their identity remains protected while granting them control over its usage. The platform employs cutting-edge encryption and data protection measures, ensuring that sensitive information is safeguarded from unauthorized access.

One of the key benefits of ConnectID is its ability to streamline online transactions. By leveraging ConnectID’s services, businesses can verify the identity of their customers quickly and reliably, reducing the risks associated with fraud and identity theft. The platform integrates seamlessly with various online services, eliminating the need for repetitive identity checks and enhancing the overall user experience.

ConnectId is based on the latest FAPI 2.0 for protection of APIs exposing highly sensitive data. For more information, be sure to take a look at our more in-depth blog about FAPI 2.0

ConnectID Requirements for Authorization Servers

ConnectID requires from the authorization servers to:

Cloudentity is a certified early adopter of the ConnectId implementer’s draft.

Cloudentity allows third parties to participate in the ConnectID ecosystem by providing the crucial consent piece of the ecosystem.

Cloudentity’s authorization servers (workspaces) can be configured to be fully compliant with ConnectID’s guidelines for authorization servers. Additionally, while creating a workspace you can choose the already compliant ConnectId workspace profile.

Updated: Aug 29, 2023