GenAuth DocsDocuments
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Old version
Concepts
  • What is GenAuth
  • What is User Pool
  • What is Application
  • What is Authentication
  • What is Federation Authentication
  • What is Zero Trust Network
  • Single Sign-On and Single Sign-Out
  • What is Authorization
  • Authentication vs Authorization
  • What is JWT Token
  • What is ID Token
  • What is Access Token
  • What is Refresh Token
  • Access Token vs Id Token
  • Understanding OIDC and OAuth2.0 Protocol

  • Understanding SAML2 Protocol

  • What is Multi-Factor Authentication
  • Account Lifecycle Management
  • Hosted Login Page vs Embeddable Login Component
  • CIAM and EIAM
  • What is LDAP
  • How QR Code Login Works
  • Basic Concepts of Cryptography
  1. Concepts
  2. /
  3. CIAM and EIAM

¶ CIAM and EIAM

Update time: 2025-04-11 11:21:15
Edit

¶ Let's first talk about what IAM, EIAM and CIAM are

IAM: Identity and Access Managetment, or simply identity management.

In fact, looking back over the past twenty years, when we discussed IAM, most people thought of internal products (Enterprise Identity & Access Management or EIAM) that provide unified identity authentication and permission management capabilities for internal employees, partners, temporary staff, etc. However, this is unimaginative. We cannot simply talk about and develop EIAM just because of the tradition of EIAM.

As the boundaries of software expand to all aspects of our lives, the demand for unified identity management is also expanding. With the enterprise as the core, from the inside out, enterprises have also begun to accommodate a large number of external customer identities, thus giving birth to customer identity management (Customer Identity & Access Management or CIAM) for Internet users. For example, the identity management of engineers and couriers within JD.com belongs to EIAM, while the identity management of sellers and buyers on the e-commerce platform belongs to CIAM.

¶ What is IDaaS today?

Since 2015, foreign service providers such as Accenture and AWS have taken the lead in treating CIAM as an independent and necessary product. Completely different from EIAM products that focus on internal efficiency, CIAM aims to assist enterprises in completing the overall information transformation, unify the identity of users in all external services, and provide end users with complete identity self-service in the user competition centered on experience, and provide users of different platforms with a unified and smooth use and registration experience, so as to improve user retention and stickiness, further create value, and gain an advantage in industry competition.

"The unique requirements of customer identity management, especially the requirements for scale, performance, availability, and seamless use across platforms, make CIAM an independent market, completely different from EIAM for employee identity management. —— Forrester"

So, what is IDaaS today? It is not just about moving EIAM from 20 years ago to the cloud, but about moving EIAM & CIAM to the cloud, so that Chinese enterprises can move towards global digital transformation with perfect IDaaS.

¶ Why do Chinese enterprises start using EIAM & CIAM IDaaS?

Today, leading IDaaS service providers are committed to providing enterprises with ready-to-use, secure and scalable user management and authentication services. With IDaaS, the enterprise's IT R&D and operation and maintenance personnel can quickly manage the connection of any application, personnel or device. Whether it is a customer, member or partner, whether it is on the cloud, locally or on a mobile device, IDaaS service providers can help government and enterprise IT services become more secure, increase the speed of external core business launch, and improve the productivity of internal personnel and maintain compliance.

Previous article: Hosted Login Page vs Embeddable Login Component Next article: What is LDAP
  • Let's first talk about what IAM, EIAM and CIAM are
  • What is IDaaS today?
  • Why do Chinese enterprises start using EIAM & CIAM IDaaS?

User identity management

Integrated third-party login
Customized authentication process

Enterprise internal management

Single sign-on
Multi-factor authentication
Permission management

Developer

Development Documentation
GitHub (opens new window)

Company

official@genauth.ai
16th Floor, Building B, Beichen Century Center, Chaoyang District, Beijing (Total)
Room 406, 4th Floor, Block B, No. 200, Tianfu Fifth Street, High-tech Zone, Chengdu (Branch)

© Beijing Steamory Technology Co., Ltd.