CIAM MicroPerimeter™

API SECURITY INTEGRATION

Identity Access Management is informed by a range of attributes, entitlements, scopes and custom details about an individual. Integrating these different data points into a security enforcement model is sometimes complicated by different protocols and technologies.

CIAM MicroPerimeter™

API SECURITY INTEGRATION

Identity Access Management is informed by a range of attributes, entitlements, scopes and custom details about an individual. Integrating these different data points into a security enforcement model is sometimes complicated by different protocols and technologies.

EXTENDED
ATTRIBUTES

A JWT token provides a lot of verifiable information in OIDC flows, but sometimes you need more information than is available in the token. Integrating MicroPerimeter™ Security with Cloudentity’s CIAM allows you to add validation for a broader set of data including Entitlements, Consent based permissions, and real-time risk score based on things like location, time of day or device.

EXTENDED
ATTRIBUTES

A JWT token provides a lot of verifiable information in OIDC flows, but sometimes you need more information than is available in the token. Integrating MicroPerimeter™ Security with Cloudentity’s CIAM allows you to add validation for a broader set of data including Entitlements, Consent based permissions, and real-time risk score based on things like location, time of day or device.

MFA
TRIGGERS

Logging in once isn’t enough — sometimes you need to make sure the person executing a transaction is still the same person who logged in. Requiring a second factor authentication to get that proof requires two things – first you need an authorization engine that supports MFA. Cloudentity supports Time-based One-Time Password (TOTP), One-Time Password (OTP) and Knowledge-Based Authentication (KBA) out of the box. Then your security enforcement needs to know when an individual last used an MFA validator; by integrating MicroPerimeter™ Security with Cloudentity’s Identity Access Management it becomes a simple matter of creating a policy and applying it to a service to force MFA on transactions where you need it.

LEARN MORE
Discover Cloudentity’s Identity Management

CONSENT BASED
PERMISSION

SERVICE

Authorization now includes consent-based privacy under HIPAA, GDPR and CPAA. By “consent-based” we mean the compound rules around who owns what data, and who (or what) has permission to access that data.

  • Is the Service allowed to access the record?

  • Is the User allowed to grant access to the record?

  • Has that access been granted?

By integrating MicroPerimeter™ Security with Cloudentity’s CIAM solution, the complexity of the security policies, the enforcement of the policies and the consent itself is greatly reduced from a traditional RBAC or ABAC security model.