Companies are increasingly focused on offering their customers frictionless experiences. The customer registration process is vital herein as it can either be a facilitator or a bottleneck for customers to proceed. The paradigm here is that it should be as easy as possible, yet highly secure.
iWelcome unburdens organisations by offering three types of registration each of which offered via APIs or customer-branded UI:
- Standard Registration with a set of mandatory and optional fields; validation is done via email (and optionally SMS);
- Social Registration reduces the registration effort by removing the need for consumers to use usernames and passwords allowing them to engage more easily and quickly, using their existing social media identity. iWelcome is the only provider to offer this in a GDPR-compliant manner;
- Flexible Registration and Activation allows clients to configure workflows with certain software components supporting a wide set of registration use cases.
- Identity matching via RESTful API / Web service;
- Multiple registration and login options;
- Support for all standard federation protocols;
- Customised registration process using BPMN 2.0;
- Account linkage with smart matching.
In order to be successful in business nowadays, companies need to focus on building trust relationships with their consumers. And trust in relationships starts with honest interaction.
Under GDPR it is no longer possible to collect personal data in without explicit and unambiguous consent from the consumer for the use of each type of data. On top of that, consumers need to be granted access to their data and should be able to easily edit data and withdraw their consent as easy as it was given.
Getting a customer’s consent is one thing; to manage it through its entire lifecycle is something else. With iWelcome’s Consent Lifecycle Management (CLM) functionality, organisations are supported for all stages of consent:
- Gather consent;
- Gather parental consent;
- View and edit data & consent;
- Restrict & freeze processing;
- Delete inactive data;
- Port data.
CLM is offered as separate service and can be integrated with third-party authentication systems.
iWelcome is chairing the Kantara workgroup for CLM aimed to create guidelines and set market standards regarding this topic.
- Proper CLM is foundational for GDPR compliancy;
- Less complexity for back-end infrastructure;
- Allows organisations to put consumers back in control;
- Offered via RESTful Consent API.
The best way for companies to deeply engage with their end-users – while being compliant to GDPR – is to set up a self-service domain where consumers can view and change their own personal data settings themselves.
iWelcome’s user-service functionality enables consumers and employees to access and change profile information and data attributes, add social login connects, request additional access, do password resets, give or withdraw consent, and much more. All 24/7.
User Self Service empowers the end-users to manage everything around their Identity, full stop. It will give them trust and control. GDPR itself also dictates the Right of Information and Access for the consumer.
User Self Service is, with consent management,
necessary for User Managed Access (UMA).
- Fully in line with GDPR;
- Available through branded UI and APIs;
- User access to all functions and attributes;
- Enable Consent, Profile, Preference management;
- User control for DIY.
The key to being successful is to offer frictionless user experiences with the right levels of authentication.
iWelcome offers the following capabilities:
- Single Sign-On allowing (end-)users to log in only once for access to multiple applications and/or services;
- Multi-factor authentication based on the best industry standards Included push & swipe option for optimal customer experience or OTP via SMS or email;
- Risk-based authentication allowing for real-time risk assessments based on certain parameters, to be configured per client;
- Step-up authentication allowing for different levels of authentication required for different parts of your offering.
- One Log-in for frictionless customer experience;
- Customer-friendly yet strong MFA;
- Add real-time ‘context’ to user profile;
- Strongest authentication applied only when required;
- Authentication is decoupled from actual service.
iWelcome’s identity validation allows companies to make sure a digital identity can be associated with a real person. Validated Identities enable high value and high-risk transactions on data to take place over the web. It is key for full digital transformation. iWelcomes can integrate with providers of identity validation (e.g. WebID) and digital alternatives (e.g. IDIN in NL or GOV.UK in UK).
Identity Proofing is about assessing the probability an identity claim is legitimate, as there is no such thing as absolute certainty.
- Increase trustworthiness of an identity;
- Decreased risk on fraud;
- Multiple identification means available;
- Support for STORK levels of assurance.
iWelcome offers multi-level user management functionality that can be used to add users and groups and to assign users to groups. Delegation of user management is supported on several levels, where at every level a user manager can be assigned the role of delegated admin.
Among others, the following scenarios are supported:
- User registration by delegated admin via a simple web-portal for (temporary) accounts;
- Administration (e.g. disable, delete, etc.) by delegated admin of temporary accounts;
- Delegated users/Guests can set and activate their own password via the self-service portal;
- Delegated users/Guests can reset or change their password via the self-service portal in case the password has been lost.
- Delegated users can (re)set/activate/change passwords;
- Available via customer-branded UI or RESTful API.
To facilitate its clients’ customer care management, iWelcome offers a Service Desk application that is tailor-made for customer care and service desk operating teams. It provides these teams with all of the functionality needed to effectively help (end-)users with any access-related issues that may arise. The application is highly scalable as it is designed for serving large enterprises serving millions of users.
- Ability to quickly search users;
- Full view of all identity-related information;
- User timeline showing all relevant identity-related events;
- Password reset initiation;
- Overview of service disruptions to troubleshoot issues;
- Can easily be integrated into other customer care system(s)
Provisioning refers to the creation, maintenance and deactivation of user objects and user attributes over multiple systems and applications allowing these to interact with business logic.
The iWelcome platform provisions and de-provisions’ user accounts and attributes from multiple source systems (e.g. CRM, HR or any other identity stores like Active Directory, Windows Azure Active Directory, Identity Management Systems, and/or Master Data Management) and/or LDAP directories to business applications (relying parties). Provisioning of groups can be arranged via both push and pull mechanisms.
- Automated & efficient provisioning processes;
- Group provisioning on pull- and push basis;
- Supports open source frameworks as ConnID;
- Standard connectors or API- and SCIM-based.
An interesting case within Identity & Access Management is when (mainly large) companies own different brands (and thus: market identities). With its multi-branding functionality, iWelcome is perfectly able to support these companies with one single identity infrastructure over multiple brands, while maintaining each brand’s own identity (and thus look&feel). This typically results in consistent corporate management and lower TCO.
- Segmentation options over brands;
- Multi-branding with single 360 view of the (end-)user;
- Omni-channel by design & principle;
- Delegation within brands
Today’s user experience is driven by user’s characteristics, also known as data attributes. As no business is the same, there is a strong need for valuable identity-related attribute information (ranging from relationship number till for instance the consumer’s shoe size). Attribute-Based Access Control (ABAC) and UMA are the future, with attributes as the fundament.
iWelcome offers organisations flexibility when it comes to gathering data attributes.
- Metadata for every attribute (like validation level, data classification, expiration date);
- Federation protocol and/or Rest API data exchange with customer environment;
- Bi-directional data exchange;
- Admin-UI to set UI attributes and/or disclosed by API.
KYC is the process of identifying and verifying the identity of its consumers and business partners. This functionality is to ensure that company resources are not misused for criminal activities as money laundering.
iWelcome’s progressive profiling helps organisations build profile information over time as the consumer’s trust increases. This unified profile of the consumer is important for any marketing or segmentation toward consumers, creating value.
Identity Data is the heart of a CIAM program!
- Increased trustworthiness of an identity
- Decreased risk of fraud
- Multiple identification means available
Customer identity information is more than interesting for every company’s marketing and sales organisation as it provides clear insights into your user population.
Via iWelcome, companies can easily extract complete and correct user intelligence. The following (and more) types of intelligence can be extracted:
- Number of accounts, per attribute and / or preference;
- Number of authentications, per geo / device/ browser / time;
- Accounts with latest login and number of dormitory accounts;
- Number of new account per period / category / geo;
- Failed authentication attempts.
- Integrated with main CRM and MA providers
- Logs are stored in secure locations
- Possibility to run reports at all times
- Multiple formats available for extracting
- ELK (ElasticSearch, Logstash, Kibana) stack is supported