Technology Insight for Customer Identity and Access Management

By 2022, CIAM will be a key component of a competitive UX strategy by 85% of organizations.

Avoid wasting additional resources in developing CIAM capabilities that vendors can offer out of the box by choosing CIAM solutions that provide strong core capabilities to address most of their business requirements.

Choose commercially available CIAM technologies that provide easy integration extensibility by giving preference to vendors with native interfaces with important adjacent technologies like consent and preference management, fraud detection and SCA.

Expand evaluation criteria by including broader UX flows and evaluate the ability of vendors to deliver adaptive controls, identity proofing and UX-enhancing features.

Download the full report to gain a broader understanding of CIAM and how to choose the best tools and integrations available.

Get the Gartner Report

Any personal data you provide is collected and processed by Scaled Access, as a controller, in order to service your submission.
Read more in our Privacy Policy.

Main Takeaways:

  • CIAM systems must support authorization and authentication to APIs
  • Strong registration capabilities include prebuilt delegated administration options
  • CIAM technologies must support self-service administration & delegated administration
  • Consider externalized authorization architectures to enforce policies
  • The vast majority of modern CIAM technologies are SaaS delivered, and this is a special requirement for faster time to market and simplified rollout and integration of their capabilities

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Scaled Access.

Gartner, Technology Insight for Customer Identity and Access Management, 4 February 2020, Henrique Teixeira, Michael Kelley, Ant Allan, Jonathan Care

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.