Use Cases
The specific use cases that an organization chooses to implement depending on its business requirements, security needs, industry regulations, and technology landscape.
Typical IAM Use Cases
Customer Identity & Access Management (CIAM)
- Seamless & Simplified Self-Service
- Single Sign-On (SSO)
- Unified & enhanced customer experience
- Manage user consent and preferences
- Highly scalable deployment to support large userbase
Digital Identity and Zero-Trust
- Federated Login using third-party identity provider (Government or other Verified Identity Provider)
- Passwordless Authentication
- Adaptive Risk Management & Multifactor Authentication (MFA)
- Remote and Mobile Workforce
- BYOD (Bring Your Own Device)
- Third-Party Partners and Contractors
Credential Theft Prevention
Identity Governance & Administration (IGA)
- Identity Governance
- Role-Based Access Control (RBAC)
- Identity Self-Service Portal
- Identity Risk
- Certification & Attestation
- Segregation of Duties (SOD)
- Audit and Compliance
Privileged Access Management (PAM)
- Privileged Access Control
- Password Management
- Session Monitoring and Control
- Just in Time Access
- Live recording, event management and notifications
Single Sign-On and Multifactor Authentication
- Federation (OAuth 2.0 and SAML)
- MFA
- Push notification
- One-Time Password (OTP) via app, email, or SMS
- FIDO2 security keys
- Biometrics (facial, fingerprint, and more)
- OATH: For use with OATH-based hardware devices (Yubikey, RSA)
- Risk-based authentication (location, device and environmental factors)
- X.509 certificates