Exploring SAP Customer Data Cloud Solutions

Objective

After completing this lesson, you will be able to describe the three main solutions offered by SAP Customer Data Cloud, its key features, capabilities, including AI and how it can support a client’s unique business goals.

SAP Customer Data Cloud Solutions Overview

Customer Data Cloud Solutions can connect information from across your enterprise to inform business decisions, build trust, and strengthen loyalty while respecting your customers’ data privacy and reducing your compliance risks.

SAP Customer Data Cloud consists of three out-of-the-box solutions an SAP client can customize to meet their business requirements. Each solution has unique capabilities that help clients turn anonymous visitors into loyal customers in a seamless and personalized digital experience.

Lists in a diagram the three SAP Customer Data Cloud solutions. Customer Identity Access Management (CIAM) for B2C, Enterprise Consent and Preference Management (ECPM) and Customer Identity Access Management (CIAM) for B2B.

Builds Relationships and Trust

SAP Customer Data Cloud builds relationships and trust through its:

Personalized Omni-Channel Experience: The SAP Customer Data Cloud is a powerful B2C and B2B Customer Identity and Access Management (CIAM) solution. It’s built to integrate seamlessly with other SAP Customer Experience solutions and many third-party solutions.

Transparency and Control: SAP Customer Data Cloud provides all-around functionality for customer identification, registration, and customer profile data management. It allows customers to register and be identified, as well as hold, protect, update, download, and erase themselves. It empowers users to control their consent preferences, such as terms of service, data privacy, and marketing communications.

Consumer Privacy: SAP Customer Data Cloud delivers market-leader CIAM capabilities, performance, and data protection regulation frameworks related to customer data privacy rights and regulations. This includes General Data Protection Regulations, or GDPR, as well as local state and country law compliance.

Three SAP Customer Data Cloud Solutions

Computer to represent Customer Identity, Person to represent Authentication Options, and Shield to represent Risk-Based Authentication features of CIAM for B2C.

Customer Identity Access Management (CIAM) for Business-to-Consumer (B2C): CIAM for Business-to-Consumer (B2C) captures end-user information seamlessly and securely to turn visitors into loyal customers.

The CIAM for B2C has three main features:

  • Customer Identity: Contains out-of-the-box, scalable, responsive forms called "screen sets" and customizable workflows. It is also a set of APIs exposed through REST and SDKs for platforms such as Web or JavaScript, Android, iOS, Python, PHP, or Java. The SAP Customer Data Cloud has 100% of its capabilities via REST APIs in various namespaces.

  • Authentication Options: Built-in user registration to authenticate users quickly through the out-of-the-box identity flows. Additional features are Social Log-in, Single Sign-On (SSO), Global Access, Open-ID Connect (OIDC), Phone Number Log-in, Push Authentication, FIDO Authentication, Email OTP and Magic Link, Two-Factor Authentication (TFA).

  • Risk-Based Authentication: Risk-based authentication prevents unauthorized users from accessing customer account information by setting predefined rules and evaluating them during customer authentication.
File image to represent Retain customer consent and lock to represent Customer Grant or Withdrawal Profile Access.

Enterprise Consent and Preference Management: Retains customer consent and can grant or withdraw each customer consent. This allows the customer to choose how their profile information is used according to the terms of service and data privacy regulations.

You can manage customer consent, preference settings, and data from one central platform. This solution includes self-service screen sets or out-of-the-box workflows for web and mobile apps. Customers can leverage them to check, accept, or reject consents configured in the service or product. The consent vault is a read-only database that records every customer consent action to replicate in destination systems. It can also serve as a consent actions database for customer data privacy. This allows you to confirm services are compliant with local data privacy regulations.

Images represent Partner On-boarding (handshake pictogram), Life-cycle Management (person with a circle around it pictogram), Policy Based Access Control (lock and cloud pictogram), Self-Service Delegation (pressing buttong pictogram).

CIAM for B2B: Builds upon the structures created in CIAM for B2C. It is highly adaptable and configurable to support your B2B workflows and experiences. Lastly, it simplifies customers' and partners' end-to-end life-cycle management and accelerates the time-to-market.

Partner On-boarding: Allows customers, suppliers, or partner companies to on-board themselves through a self-service screen set that will go through an approval process. The data schema can be set or customized at the organization or customer level.

Life-cycle Management: Administrators can manage customers, suppliers, or partner accounts connected to the system to allow or approve B2B customers and assign them permission levels corresponding to their department and role.

Policy-Based Access Control: Provides customers the ability to set up attribute (ABAC, or Attribute Based Access Control) and/or role-based access (RBAC, or Role Based Access Control). Examples are budget control and approval access, among other permission setup scenarios. Partners are assigned roles and provided specific access to the appropriate applications, platforms, products, and data. This streamlines access and prevents data leaks across the entire digital ecosystem.

Self-Service Delegation: A partner organization admin can use delegated administrative access to invite other members of their organization, manage their access to applications and their assets, and assign roles to their colleagues, thus reducing internal IT efforts.

SAP Customer Data Cloud and AI

Data and cloud with lock pictogram to represent SAP Customer Data Cloud and AI.

Account Takeover Protection (ATO) leverages the power of AI and Machine Learning to protect accounts and their identities from being targeted during authentication by malicious activity or bad actors while leaving a frictionless user experience for legitimate users.

ATO is a key feature of Risk-Based Authentication (RBA) and can be easily enabled inside the console.

Note

To learn more about SAP Customer Data Cloud and ATO please check out these resources:

Introducing the SAP Customer Data Cloud Solution and Configuring Account Takeover Protection in SAP Customer Data Cloud

Log in to track your progress & complete quizzes