Throw the book out. Why CIAM deviates from a conventional authentication security paradigm
It’s 2022. The last few years forced the identity industry to reach next-level efficiency practically overnight, and tools for securing and observing solutions are excellent… at protecting workforce identity scenarios.
As it turns out, CIAM scenarios are radically different. It’s far from being just a matter of scale: CIAM solutions have their own attack patterns, authentication experience needs, extensibility and development requirements, security/acquisition & retention tradeoffs.
After years spent running one of the most successful CIAM services in the industry, Auth0 is ready to share some of the key lessons and patterns discovered in detecting and repelling attacks, handling observability and above all using authentication as a tool to bring it all together- at CIAM scale.