Customer Identity Access Management (CIAM) for Business-to-Consumer (B2C): CIAM for Business-to-Consumer (B2C) captures end-user information seamlessly and securely to turn visitors into loyal customers.
The CIAM for B2C has three main features:
- Customer Identity: Contains out-of-the-box, scalable, responsive forms called "screen sets" and customizable workflows. It is also a set of APIs exposed through REST and SDKs for platforms such as Web or JavaScript, Android, iOS, Python, PHP, or Java. The SAP Customer Data Cloud has 100% of its capabilities via REST APIs in various namespaces.
- Authentication Options: Built-in user registration to authenticate users quickly through the out-of-the-box identity flows. Additional features are Social Log-in, Single Sign-On (SSO), Global Access, Open-ID Connect (OIDC), Phone Number Log-in, Push Authentication, FIDO Authentication, Email OTP and Magic Link, Two-Factor Authentication (TFA).
- Risk-Based Authentication: Risk-based authentication prevents unauthorized users from accessing customer account information by setting predefined rules and evaluating them during customer authentication.
Enterprise Consent and Preference Management: Retains customer consent and can grant or withdraw each customer consent. This allows the customer to choose how their profile information is used according to the terms of service and data privacy regulations.
You can manage customer consent, preference settings, and data from one central platform. This solution includes self-service screen sets or out-of-the-box workflows for web and mobile apps. Customers can leverage them to check, accept, or reject consents configured in the service or product. The consent vault is a read-only database that records every customer consent action to replicate in destination systems. It can also serve as a consent actions database for customer data privacy. This allows you to confirm services are compliant with local data privacy regulations.
CIAM for B2B: Builds upon the structures created in CIAM for B2C. It is highly adaptable and configurable to support your B2B workflows and experiences. Lastly, it simplifies customers' and partners' end-to-end life-cycle management and accelerates the time-to-market.
Partner On-boarding: Allows customers, suppliers, or partner companies to on-board themselves through a self-service screen set that will go through an approval process. The data schema can be set or customized at the organization or customer level.
Life-cycle Management: Administrators can manage customers, suppliers, or partner accounts connected to the system to allow or approve B2B customers and assign them permission levels corresponding to their department and role.
Policy-Based Access Control: Provides customers the ability to set up attribute (ABAC, or Attribute Based Access Control) and/or role-based access (RBAC, or Role Based Access Control). Examples are budget control and approval access, among other permission setup scenarios. Partners are assigned roles and provided specific access to the appropriate applications, platforms, products, and data. This streamlines access and prevents data leaks across the entire digital ecosystem.
Self-Service Delegation: A partner organization admin can use delegated administrative access to invite other members of their organization, manage their access to applications and their assets, and assign roles to their colleagues, thus reducing internal IT efforts.