-

Driving Progress Towards The CommonGood
Matching charitable organisations and community groups with local businesses, as part of the journey towards…

Matching charitable organisations and community groups with local businesses, as part of the journey towards…
Software-As-A-Service — more commonly known as SaaS — is a software delivery and licensing method in which software is accessed online via subscription, rather than bought and installed on individual computers. SaaS solutions commonly come in two forms, namely B2C and B2B, representing the consumer audience to which they are targeted. Derivative cases such as B2B2C, B2B2B, and B2C/B2B hybrids are also not uncommon.
Discover more about SaaS CIAM in the article entitled: B2C and B2B SaaS Authentication Architectures
Login — a.k.a. Sign-in — is the most commonly recognised mechanism for identifying a user to your application, and typically uses a process of interactive authentication initiated via a user interface referred to as the Login Box. Login will often support multiple first-factor authentication mechanisms such as UserID & Password, Social and/or (Enterprise) Federation, as well as SSO.
Learn more about Login at: Discover/CIAM/Login
Social Authentication — a.k.a Social Login or just Social for short — allows the use of identity providers such as Google, Microsoft, Facebook, LinkedIn, X, etc., to validate users, whilst also providing consented access to the profile information they store about that user.
Read more about Social authentication and the value it provides at: Discover/CIAM/Social
Customer Identity and Access Management, or CIAM for short, is a form of IAM that focuses on the consumer identities that typically access applications and SaaS solutions.
Find out more about our CIAM expertise by visiting Cevolution/IAM.
Access Control is the term used to describe the various methods — such as RBAC, ReBAC and ABAC — that restrict access to features and functionality, based on the relationships established between users and other entities.
Discover more about the range of Access Control mechanisms in the article entitled: Access In A Controlled Manner
Short for Single Sign On, SSO is the term typically used for the mechanism whereby an authenticated user — such as a logged-in employee — can bypass interactive first-factor authentication (a.k.a interactive Login). SSO can also refer to situations where a user has more than one identity, and not only provides ease of use but also facilitates consistency when it comes to user profile management.
You can read more about SSO and the value it provides at: Discover/CIAM/SSO

A Large Language Model — typically abbreviated as LLM — is an AI model trained on massive datasets and is used to comprehend, summarise, translate, and generate human-like text. LLMs are used to power chatbots and coding assistance, perform sentiment analysis and content creation, as well as complex digital analysis on data such as DNA sequences and the like.

As an Innovator, Architect, Advocate, Consultant, Engineer, Identity specialist and Cevolution’s Chief Technologist, Peter has over 30 years of experience designing and developing secure and robust software solutions. When not helping folks with the complexities of software development, you can usually find him involved in the world of Theatre, working behind the scenes, acting in or directing a show at a local venue.