
Customer Identity and Access Management, a.k.a. CIAM, focuses on the safety, reliability and dependability of identities that access consumer SaaS solutions.
When it comes to the software your customers use, the expectation of a secure yet convenient, fast and agile experience from your solution is today’s accepted norm.

Hi, I’m Peter Fernandez, and I want to share my expertise in satisfying customer expectations by integrating modern CIAM into modern consumer-oriented software solutions.
Consumer-oriented Software (as a Service) solutions usually comprise one or more applications that, together, surface the feature functionality those software applications provide.
What those features are is largely irrelevant. However, the identities used to access them and the associated safety, security, reliability and dependability are almost always a common denominator.

Users
Users represent the consumers of a (SaaS) solution and are the lifeblood of your commercial success. User identity ensures that the right access is provided to the right person at the right place and time, as well as used to describe habits, preferences and how they subscribe.
Services

Services, on the other hand, are typically automated operations performed by a machine rather than a user. Service identity is used to determine the right level of access, ensuring that data is only made available to trusted parties authorized to use it.

Web Applications
A Web Application, also known as a Web App, Website, or regular web application, is confidential client software created using web-oriented technologies and commonly distributed via a web server. Web applications typically comprise a user-oriented web front-end together with a corresponding web server backend.
SPAs

A Single-Page Application, commonly referred to as a SPA, is a public client web application that interacts with a user by dynamically rewriting a single web page. Unlike regular web applications, SPAs don’t have a dedicated web backend typically leveraging resources statically and/or dynamically using a BFF or an API.

Mobile Apps
Mobile Apps run natively on platforms such as Android or Apple (i.e. iOS, WatchOS, VisionOS, etc). They are public clients typically built using native platform languages such as Swift, Kotlin, or Java, and can also leverage web technologies and frameworks — such as React — both natively and within an (embedded) browser context. Mobile Apps typically use BFFs or APIs for user-oriented data access and management, and can also have specific UI challenges that require less conventional methods for Authentication and Authorization.
Desktop Apps

Desktop Apps, a.k.a. Desktop Applications, run natively on platforms such as Windows, MacOS and Linux. They incorporate command-line and/or graphical user interfaces (a.k.a. GUIs) and are public clients built using native platform languages and technologies. Like Mobile Apps, Desktop Applications can optionally leverage web technologies and frameworks — both natively and within an (embedded) browser context — and similarly, BFFs or APIs are used for user-oriented data access/management, et al.

Backends
A Backend — also referred to as an Application Backend, Backend Server, or just Server — provides a secure confidential client context in which application software can execute. Backends come in various shapes and sizes (such as web servers, database servers, etc), all with the common attribute that they are protected from direct user access and typically implemented with the highest level of trust.

BFFs
A Backend-For-Frontend, otherwise referred to as a BFF, is a pattern whereby a dedicated backend is explicitly created for a specific set of frontend functionality — typically associated with security-sensitive, critical operations. BFFs are normally used with SPA and/or Mobile/Desktop Apps, however, they can easily be utilized in other situations too.
APIs

An API, otherwise known as an Application Program Interface, refers to backend implementation allowing systems to communicate in a consistent manner over an HTTP interface. The term Resource Server is often used to refer to an API used to provide access to (protected) resources associated with a user, and the term API-First Design is often used to refer to software architectural design that centres around the API.
Whether you’re building web-based applications, native applications, backends, (embedded IoT) services, BFFs, APIs or some combination of any of these, effective CIAM will help you take your B2C or B2B SaaS to the next level.






Customer Identity and Access Management (CIAM) has become an essential component of a secure, efficient, and personalised customer experience. By providing safe, seamless and secure access to your digital services, you can feel confident in the knowledge that your B2C and B2B SaaS solutions offer your customers the peace of mind they deserve. Read the article to discover more about what CIAM can do for you!
Buy vs DIY
You could build an in-house custom solution yourself…it’s certainly an option. Particularly if you have a team with the time, capacity, knowledge, and expertise to develop SSO; deploy and maintain Attack Protection; leverage OIDC and/or SAML for Authentication, Social and/or (Enterprise) Federation; implement Passwordless, Passkeys and/or MFA, and/or optionally OAuth 2.0 for API Authorization.
The alternative is to integrate with a SaaS solution provided by one of the popular vendors, and the cost of subscribing to one of these typically depends on the features you use and the number of active consumer identities you have.
With vendor-based CIAM the cost is typically associated with the platform hosting the backend service(s) that deliver Authentication, Authorization, Management and Protection from attack. With consumer-oriented software, much of this infrastructure is already in place: cloud-based “compute”, database, network resources, etc. could be a necessity for your solution, and delivering these at scale may be something you also need to do.
Deploying a standards-based open-source DIY solution within your existing infrastructure might provide a more cost-effective approach — delivering secure and robust CIAM without the need to build everything yourself and with the added benefit of more flexibility and control.
Got questions?
Feel free to reach out!