<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>David Martinache, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/david-martinache/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/david-martinache/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 10 Nov 2021 17:51:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>David Martinache, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/david-martinache/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The evolution of the NIST password complexity rules: a mandatory step before a passwordless world?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/#respond</comments>
		
		<dc:creator><![CDATA[David Martinache]]></dc:creator>
		<pubDate>Mon, 08 Nov 2021 08:30:06 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17317</guid>

					<description><![CDATA[<p>Using passwords introduces both a large attack surface (phishing, brute force, password spreading, rainbow table, etc.) and a poor user experience. As a result, passwords have been denounced in favour of passwordless technologies for several years. However, passwords remain commonly...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/">The evolution of the NIST password complexity rules: a mandatory step before a passwordless world?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Using passwords introduces both a large attack surface (phishing, brute force, password spreading, rainbow table, etc.) and a poor user experience. As a result, passwords have been denounced in favour of passwordless technologies for several years. However, passwords remain commonly used due to both technical and human factors and are likely to remain so for the next few years.</p>
<p style="text-align: justify;">What should we do with passwords until they are no longer in use? How can we minimise the impact of what is the main sticking point in the user experience, whilst improving the security posture of our organisation?</p>
<p style="text-align: center;"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-17323 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-2.png" alt="" width="624" height="616" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-2.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-2-193x191.png 193w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-2-40x39.png 40w" sizes="(max-width: 624px) 100vw, 624px" /></p>
<h2> </h2>
<h2 style="text-align: justify;">Why are passwords so common?</h2>
<p style="text-align: justify;">Since ancient times, passwords have been used as the means of entry to secret clubs and underground factions. The historical access management system of “if I have the secret, then I have the right to entry” has since transformed into a way of proving one’s identity – “if I have the secret then I am who I say I am”. Inserting characters in a certain order known only to the user with right of access, thus has become the solution to allow them to prove their identity.</p>
<p style="text-align: justify;">Although the weaknesses of this system were quickly realised, if the computer systems were not connected and therefore, they required physical access, the attack surface remained limited in comparison. The password has therefore become a pillar of IT security and is used in almost all services requiring user management.</p>
<p style="text-align: justify;">However, the arrival of networks (the Internet, in particular) and the resulting growth in exposure has turned password-related security weaknesses into real vulnerabilities.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">How did we come to burden the user with such complexity?</h2>
<p style="text-align: center;"><img decoding="async" class="aligncenter wp-image-17325 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-2-1.png" alt="" width="534" height="556" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-2-1.png 534w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-2-1-183x191.png 183w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-2-1-37x39.png 37w" sizes="(max-width: 534px) 100vw, 534px" /></p>
<p style="text-align: justify;">The number of possible attacks on passwords has gradually led security experts to increase the number of safeguards designed to protect passwords.<br />As a result, a certain number of measures are now taken to secure passwords and their associated processes, making the user experience even more complex. For instance:</p>
<ul style="text-align: justify;">
<li>Minimum number of characters</li>
<li>Complexity (1 number, a letter, a special character, etc.)</li>
<li>List of forbidden words</li>
<li>Recommendation of password uniqueness between services</li>
<li>Periodic renewal &amp; history</li>
</ul>
<p style="text-align: justify;">These rules, largely based on past National Institute of Standards and Technology (NIST) recommendations, NIST.SP.800-63-2, 2015, and that could be found in most of framework (UK, French, etc.) negatively impact the user experience. Often unintuitive and different from one service to another, users sometimes find it challenging to understand them: lack of clear explanations on the expected complexity, no display of incorrect attempts remaining before the account is locked, or variations in access channels resulting in differing experiences (accessibility of some special characters different from one terminal to another, for example: the &#8220;§&#8221; character on an iPhone or an iPad).</p>
<p style="text-align: center;"><img decoding="async" class="aligncenter wp-image-17327 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1.png" alt="" width="2052" height="1051" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1.png 2052w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-373x191.png 373w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-768x393.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-1536x787.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-3-1-2048x1049.png 2048w" sizes="(max-width: 2052px) 100vw, 2052px" /></p>
<p> </p>
<h2 style="text-align: justify;">And is it effective?</h2>
<p style="text-align: justify;">Despite all these measures, the password is still criticized for its low level of security, because it is based on two principles that are not compatible with a high level of security.</p>
<p style="text-align: justify;">The very principle on which the password is based, the shared secret, leads to two attack vectors:</p>
<ul style="text-align: justify;">
<li>Data in transit – transmit the secret regularly: the password can then be leaked or stolen via a proxy that is too informative in its logs, caching in the shared memory of a smartphone, or keylogger-type malware, etc.</li>
<li>Data at rest – storing the enterprise password to verify it: the use of storage methods with low security levels is still too common (reversible encryption instead of non-reversible hash, old sha-1 type protocol, no salting, or worse, plain text storage).</li>
</ul>
<p style="text-align: justify;">And even more recent hash protocols remain potentially fallible in the face of current computing power. Thus, even with a recent hash protocol like sha256, retrieving an 8-character password from its hash will take&#8230; less than a day.</p>
<p style="text-align: justify;">Attackers can then directly retrieve the password, ignoring its complexity (except for the length for brute force and storage if using a recent, robust, and regularly updated hash protocol).</p>
<p style="text-align: justify;">The volume of human beings in the system and their capacity to make mistakes has an even greater impact:</p>
<ul style="text-align: justify;">
<li>We are bad generators of randomness: this explains the lists of the most common passwords that appear every year. And, with strong constraints on creation, the possibilities of variations are lower, making the level of entropy decrease. The imposed complexity is counterproductive.</li>
<li>We have a bad memory: encouraging practices that lower the level of security (use of a derivative or even the same password &#8211; 63% of users admit to this practice &#8211; post-it notes on the desktop, unencrypted .txt files, etc.)</li>
<li>We are easy to trick: phishing, spearphishing and social engineering are widespread attack vectors.</li>
</ul>
<p style="text-align: justify;">If the user provides his password to the attacker, it does not matter if it is 60 characters long or consists of letters from different alphabets.</p>
<p style="text-align: justify;">The complexity of the password has no influence on the most common types of attacks, and therefore only causes inconvenience to the user.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-17329 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1.png" alt="" width="938" height="705" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1.png 938w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1-254x191.png 254w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1-52x39.png 52w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1-768x577.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-4-1-600x450.png 600w" sizes="auto, (max-width: 938px) 100vw, 938px" /></p>
<p> </p>
<h2 style="text-align: justify;">What to do?</h2>
<p style="text-align: justify;">As password issues are not new, there are several possible solutions that can be used in conjunction to reduce the problems and their impacts. The delegation of authentication to third-party services (social login, enterprise IAM, etc.), and the implementation of Single Sign-On have facilitated user experience and limited password replay/transitions and places where the password is stored at rest.</p>
<p style="text-align: justify;">The development of second authentication factors (OTP SMS or mail, push notification, hard tokens, etc.), the most recent ones being less intrusive and less disruptive, ensures better security.</p>
<p style="text-align: justify;">In addition to these solutions, which are already proven and widely deployed, and in anticipation of being ready to enter the passwordless world, which alone is a huge project, NIST and other frameworks recently revised their recommendations regarding the required complexity around passwords (NIST.SP.800-63b, 2017, NCSC UK, Password policy: updating your approach, 2018 for example).</p>
<p style="text-align: justify;">So, from a user point of view, the constraints on passwords have been reduced to a minimum number of characters (8) and the rejection of common/compromised passwords. In exchange, user-facing measures offering more freedom to the user are often recommended:</p>
<ul style="text-align: justify;">
<li>All Unicode characters, including space, must be allowed, without being forced</li>
<li>The maximum size limit must be at least 64 characters</li>
<li>Rotations should no longer be time-based, but only in case of compromise</li>
<li>The user must have at least 10 attempts before being blocked</li>
<li>Different user experience improvers are to be considered (clear information on the expected complexity, ability to display the password during input, ability to paste values, etc.)</li>
</ul>
<p style="text-align: justify;">These new recommendations aim to guide users towards the use of longer and more random passwords by reducing constraints. They can be accompanied by the raised awareness and usage of safe passwords, preventing the user having to remember too many passwords.</p>
<p style="text-align: justify;">The remaining recommendations, mandatory to ensure security levels are not reduced, reinforce some of the aspects mentioned above. Those measures also aim to strengthen transmission (encryption, etc.) and storage (hashing, salting) to increase the level of security of the company’s activities and to prevent the use of certain practices that lower security (use of secret questions for password reset, etc.).</p>
<p><img loading="lazy" decoding="async" class="wp-image-17365 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3.png" alt="" width="1043" height="434" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3.png 1043w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3-437x182.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/11/Image-1-3-768x320.png 768w" sizes="auto, (max-width: 1043px) 100vw, 1043px" /></p>
<h2> </h2>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">If the elimination of the password is a goal, its eradication is far from complete. It is necessary, before reaching this goal, to implement measures that aim to secure user data (for example by implementing multi-factor authentication on sensitive services) while facilitating the process and users to protect themselves. This includes the implementation of elements that prevent the user from logging in too often or creating too many passwords, but also by redesigning the complexity of passwords in order to increase the randomness, and by upgrading the technical means of transmission and storage.</p>
<p style="text-align: justify;">Using existing processes to prepare for future changes is also essential. For example, redesigning the password recovery path to move the user toward passwordless authentication can help make a smooth transition to greater security while improving the user experience.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/">The evolution of the NIST password complexity rules: a mandatory step before a passwordless world?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/11/the-evolution-of-the-nist-password-complexity-rules-a-mandatory-step-before-a-passwordless-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FAPI-CIBA: How to authenticate my user without an interface?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/</link>
		
		<dc:creator><![CDATA[David Martinache]]></dc:creator>
		<pubDate>Wed, 24 Feb 2021 09:30:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[CIBA]]></category>
		<category><![CDATA[FAPI]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[OIDC]]></category>
		<category><![CDATA[Open ID Connect]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15224</guid>

					<description><![CDATA[<p>Nowadays, access management and security concept of APIs are inherent to federation protocols OAuth2 and OpenID Connect. Both protocols natively cover a great deal of use cases, but regularly evolve and come with complements to address more innovative subjects. In...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/">FAPI-CIBA: How to authenticate my user without an interface?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Nowadays, access management and security concept of APIs are inherent to federation protocols OAuth2 and OpenID Connect. Both protocols natively cover a great deal of use cases, but regularly evolve and come with complements to address more innovative subjects.</p>
<p style="text-align: justify;">In particular, with the explosion of the IoT and regulations such as DSP2, the need to trigger uncorrelated authentications from the  user’s medium access become more pressing: indeed, the later may not have the necessary interfaces, or may not be recognized as a sufficiently secured support.</p>
<p style="text-align: justify;">The additional cinematic CIBA, <a href="https://openid.net/specs/openid-financial-api-ciba-ID1.html">Client Initiated Backchannel Authentication Flow</a> aims to define the exchanges and calls allowing to trigger such authentications. This first article aims to briefly describe the high-level operation of this cinematic, and to present the contributions and additional use cases that it can cover.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">What is CIBA?</h2>
<p style="text-align: justify;">CIBA is a new authentication flow and authorization of the OpenID Connect standard, defined by the Open ID foundation.</p>
<p style="text-align: justify;">The CIBA flow is the first OpenID flow qualified as ‘’decoupled’’, because it introduces the notions of Consumption Device (CD) and Authentication Device (AD). The CD is the device on which the access to a service (Relying Party, RP) is requested, whereas the AD is the device on which the user authenticates  themselves  with the OpenID Provider (OP) and authorizes the CD-requested access, by giving its consent.</p>
<p style="text-align: justify;">
<figure id="post-15225 media-15225" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15225 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11.png" alt="" width="1180" height="832" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11.png 1180w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-271x191.png 271w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/11-768x542.png 768w" sizes="auto, (max-width: 1180px) 100vw, 1180px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">Contrary to the other flows of the OIDC standard, CIBA considers that the user can authenticate on a device different from the one on which he wants to access the service. For example, a user is looking to access his bank account from his computer and authenticate themselves to authorize the access from his smartphone.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">What contributions?</h2>
<p style="text-align: justify;">The CIBA flow presents several significant interests for users’ authentication.</p>
<p style="text-align: justify;">Today’s OIDC authentications flows are relying on web redirection between the accessed service (Relying Party) and the identity provider. These redirections are not very user-friendly and might be disturbing for the users, who see their browser, or their application go from a page to another without really understanding this behaviour. With CIBA, the device that the user employs to access the service stays on said service’s page, waiting for user authentications to be executed on the AD. The redirections’ disappearance also improves the Relying Party’s acceptance, which does not lose control and visibility of the user’s action when the latter must authenticate themself to the OP anymore.</p>
<p>&nbsp;</p>
<figure id="post-15227 media-15227" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15227 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12.png" alt="" width="1472" height="664" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12.png 1472w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-423x191.png 423w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-768x346.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/12-730x330.png 730w" sizes="auto, (max-width: 1472px) 100vw, 1472px" /></figure>
<p style="text-align: center;">Gains by population</p>
<p>&nbsp;</p>
<p style="text-align: justify;">The multi-factor authentication (MFA) is more and more common and recommended to access internet services. Texts, soft-tokens or Out-Of-Band push notifications are several examples of additional authentication factors, used today in addition to a password. With CIBA, this factor’s presence is a natural part of the authentication, since it is carried out on a registered device like AD. Asking the users to authenticate themself on the AD with a password, a PIN, a biometric factor, etc… allows a centralization of the authentication actions on a single device, while allowing to do some  MFA.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Use case examples</h2>
<p style="text-align: justify;"><strong>The call centre</strong></p>
<p style="text-align: justify;">Nowadays, when a client rings a call centre, the operator often verifies the client’s identity with several personal inquiries (date and place of birth, social security number) or with security inquiries. This authentication method is particularly vulnerable to attacks, such as social engineering.</p>
<p style="text-align: justify;">Thanks to CIBA, it is possible for the operator to trigger an authentication request for callers on their Authentication Device, and thus ascertain the client’s identity in a more secure fashion.<img loading="lazy" decoding="async" class="aligncenter wp-image-15231 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14.png" alt="" width="1258" height="855" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14.png 1258w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-281x191.png 281w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/14-768x522.png 768w" sizes="auto, (max-width: 1258px) 100vw, 1258px" /></p>
<p style="text-align: justify;">
<p style="text-align: justify;"><strong>Virtual assistants</strong></p>
<p style="text-align: justify;">DSP2 imposes banking organisations to ascertain the identity of the person carrying out an operation over a certain threshold, which mandatorily passes through an authentication phase (2 factors) during a transfer, for example. However, IoT such as the voice assistants do not have an interface allowing the user to input their identifiers, and force the customer to validate a transfer request on a web portal via his smartphone or his PC, which is not the ideal user experience. CIBA is used to free oneself from this constraint, because the customer’s bank is then able to send an authentication request on the adequate terminal (AD), limiting the impression of a break in course for the customer.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-15229 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13.png" alt="" width="1267" height="851" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13.png 1267w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/13-768x516.png 768w" sizes="auto, (max-width: 1267px) 100vw, 1267px" /></p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">The authentications cinematic CIBA fills real weaknesses of the OpenID Connect protocol, both in terms of functional coverage and customer experience. It’s implementation in the real world should happen quickly, and numerous market players are already looking to implement it.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/fapi-ciba-how-to-authenticate-my-user-without-an-interface/">FAPI-CIBA: How to authenticate my user without an interface?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the right recipe to secure your APIs?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/</link>
		
		<dc:creator><![CDATA[David Martinache]]></dc:creator>
		<pubDate>Thu, 22 Mar 2018 19:07:26 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[decentralized IS]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10448/</guid>

					<description><![CDATA[<p>TOWARD INCREASINGLY DECENTRALIZED iss… In recent years, companies have faced an expansion in the scope of Identity and Access Management (IAM) activities. They no longer concentrate solely on user provisioning and authentication; focus has shifted toward both account review and...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/">What&#8217;s the right recipe to secure your APIs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>TOWARD INCREASINGLY DECENTRALIZED iss…</h2>
<p>In recent years, companies have faced an<a href="https://www.riskinsight-wavestone.com/en/2016/12/quel-iam-pour-demain/"> expansion in the scope of <em>Identity and Access Management (IAM) activities</em></a>. They <strong>no longer concentrate solely on user provisioning and authentication</strong>; focus has shifted toward both <strong>account review and certification</strong> and the <strong>use of identity federation mechanisms</strong> (for example, SAML). The changes affect both SaaS and those that remain in-house. These two developments mean that ISs have an ever-broader scope—and it&#8217;s vital that they are implemented properly to minimize security vulnerabilities.</p>
<p>These developments in IAM are running in parallel with more widespread use of cloud services, which are continually being used in new ways to increase the scope and flexibility of IS access and use. Internal users accessing an IS are increasingly doing so from outside the corporate network—and from an increasingly diverse range of devices.</p>
<p>In addition, new Agile and DevOps technologies are forcing ISs to evolve in a different direction: integrating new technologies (IoT, etc.) and new uses, much more rapidly.</p>
<figure id="post-10466 media-10466" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10466" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2.png" alt="" width="1093" height="652" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2.png 1093w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-768x458.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/1-2-65x39.png 65w" sizes="auto, (max-width: 1093px) 100vw, 1093px" /></figure>
<figure id="post-10452 media-10452" class="align-none"></figure>
<p>Today, all these developments make an IS one “bubble” among others, interacting with its environment and <strong>remotely controlling interactions between decentralized components</strong>.</p>
<figure id="post-10472 media-10472" class="align-none">
<figure id="post-10485 media-10485" class="align-none">
<figure id="post-10487 media-10487" class="align-none"></figure>
</figure>
</figure>
<h2></h2>
<figure id="post-10489 media-10489" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10489" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4.png" alt="" width="1665" height="861" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4.png 1665w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-369x191.png 369w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-768x397.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/2-4-71x37.png 71w" sizes="auto, (max-width: 1665px) 100vw, 1665px" /></figure>
<h2>&#8230;MAKING APIs ESSENTIAL</h2>
<p>This new, decentralized IS model raises the problem of the interconnection of services and applications: <strong>How can you ensure a controlled access to data at all times—and in all places</strong>?</p>
<p>Today, <strong>APIs </strong>are already a <strong>predominant and essential communication mechanism</strong> for any company embracing digital transformation. They are used to process not only <strong>public data</strong> (branch addresses, transport timetables, etc.) but also <strong>personal data</strong> (for example, fitness tracker, health insurance, and government benefits apps) and <strong>sensitive data</strong> (online payments, e-commerce, mobile industrial information, etc.).</p>
<figure id="post-10458 media-10458" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10458" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3.png" alt="" width="419" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3.png 419w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3-134x191.png 134w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/3-27x39.png 27w" sizes="auto, (max-width: 419px) 100vw, 419px" /></figure>
<p>And, given their importance to ISs, the challenge of securing APIs becomes more important than ever.</p>
<h2></h2>
<h2>WHAT’S THE RIGHT RECIPE TO SECURE YOUR APIs?</h2>
<p>Securing APIs requires a recipe based on four ingredients, all of which must be carefully measured out.</p>
<h3>THE SECURITY <em>AS USUAL</em> BASELINE</h3>
<p>In a <a href="https://www.wavestone.com/app/uploads/2016/10/Benchmark-Securite-Web-1.pdf">Wavestone benchmarking exercise on web application security</a>, of the 128 applications we audited, <strong>serious flaws were observed in 60%.</strong> In this respect, and since APIs are just a kind of web applications, the <strong>standard web-security recommendations</strong> – for example those for <a href="https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series">OWASP &#8211; Open Web Application Security Project</a>, must be taken into account in just the same way.</p>
<p>Essentially, this ensures that a web application&#8217;s main areas of risk are covered, and the appropriate security measures determined.</p>
<figure id="post-10460 media-10460" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10460" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4.png" alt="" width="1153" height="552" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4.png 1153w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-399x191.png 399w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-768x368.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/4-71x34.png 71w" sizes="auto, (max-width: 1153px) 100vw, 1153px" /></figure>
<h3>A pinch of OAuth</h3>
<p>OAuth is an <strong>authorization delegation framework</strong> that allows an application to obtain <strong>permission to access a resource on behalf of a user.</strong></p>
<p>OAuth2 is designed to cover a wide range of use cases (web applications, mobile, access [or not] via a browser, server-to-server access, etc.), and, to this end, it offers four main process flows to obtain a token (<a href="https://tools.ietf.org/html/rfc6749">RFC 6749</a>). Together combined with a specification detailing the use of this token (<a href="https://tools.ietf.org/html/rfc6750">RFC 6750</a>), a document detailing the <em>threat model (<a href="https://tools.ietf.org/html/rfc6819">RFC 6819</a>)</em>, and a dedicated authentication overlay (<a href="http://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect</a>), results in a body of documents that runs to some 250 pages, leaving room for a broad range of implementation options and choices.</p>
<p>What&#8217;s more, it&#8217;s this <strong>abundance of options—and lack of constraints—that lead to the security flaws</strong> regularly observed in the implementation of OAuth2.0: the misuse of an application, access to personal data of a third-party user, the theft of Facebook/Google cookies when logging in using social media, or the compromise of a user&#8217;s account.</p>
<p>The following six recommendations are essential in ensuring the framework is securely implemented:</p>
<ul>
<li><strong>Local storage of secret information:</strong> The client application is provided with identifiers enabling it to authenticate itself with the OAuth server; so, don’t put this secret information (the service identifier) in the mobile application; and, if you do, consider it compromised</li>
<li><strong>Redirected URLs: </strong>Validate redirected URLs strictly with the application, without the use of wildcards</li>
<li><strong>Implicit: </strong>Avoid <em>implicit grant</em> as far as possible (and strictly reserve it to client-side javascript applications)</li>
<li><strong>Authorization codes: </strong>Validate <em>authorization codes</em> strictly, as well as the associated clients</li>
<li><strong>State and PKCE: </strong>Use these to ensure the integrity of the entire series of process steps</li>
<li><strong>Authorization ≠ Authentication: </strong>Use OpenID Connect to authenticate, but OAuth to delegate access</li>
</ul>
<h3>LIMIT THE ADDITIVES</h3>
<p>As soon as this first pinch of OAuth has been swallowed, you need to start thinking about the security measures to meet the most frequent needs.</p>
<p><strong>The Single Sign-On mobile&#8230; or, how to enable mobile employees or clients to easily access multiple applications without reauthenticating?</strong></p>
<p>It might be a field agent in a customer-facing role, or making a series of interventions at different sites, all while using a good dozen of applications every day; or it might be a client who&#8217;s installed several applications on the public app store and needs to access them all, without having to reauthenticate on each&#8230; Today, these are all very common scenarios. Although, since 2008, the techniques that make it possible have varied depending on the possibilities offered by the mobile OS (iOS’s KeyChain, URL parameters, Mobile Device Management, etc.), Apple and Google converged toward a common solution in 2015: the use of the browser system as an anchor point for an SSO session. This is now officially good practice, formalized in <a href="https://tools.ietf.org/html/rfc8252">&#8220;Best Current Practice &#8211; OAuth2 for native applications.”</a></p>
<p><strong>Contextual authentication&#8230; or, how to match the access level to the data, according to its criticality</strong></p>
<p>One of the many issues concerning authentication is to simplify, as much as possible, user access to data, while still guaranteeing satisfactory levels of security. Contextual authentication provides an answer to this issue, adapting the level of access to the nature of the transaction: its characteristics, user habits, context, and so on. This is termed LOA (<em>Level of Assurance</em>). A mobile banking application, for example, allows the user to access their bank account, and see account balances, without having to reauthenticate each time these are accessed. However, the application will require authentication when performing a sensitive operation (transferring money between their own accounts, for example), and strong authentication when performing a very sensitive operation (adding an external recipient for a transfer, for example).</p>
<p>The market now offers solutions designed according to a logic where the application client is responsible for initiating the LOA request that corresponds to the data or service it requires. But the real need is to define and apply these data access policies at a single point within the authorization server. This is essential when there&#8217;s a need to apply an authentication proportionate to the level of risk (geolocation, is it a known terminal or not, transaction habits, etc.).</p>
<p><strong>Identity propagation&#8230; or, how to pass an access token between two (or more) applications.</strong></p>
<p>It is increasingly common that a call to an API triggers a cascade of calls to other APIs, in particular within a micro-service-type architecture setting. The transmission of the identity of the user must then be assured while still maintaining security. And the first three solutions that come to mind have limitations:</p>
<ul>
<li>The transmission of the initial token is obviously to be avoided, in view of the very high risk of internal fraud involved.</li>
<li>Caller authentication alone is not enough either, because a compromised link in the chain can result in the theft of any user’s identity, thus compromising the rest of the chain.</li>
<li>The generation of a caller token, transmitted along with the initial user’s token, does not assure the integrity of the user/API combination, and does not validate the chain.</li>
</ul>
<p>However, an advanced initial solution does currently exist, in the form of a new grant type: <a href="https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/">Token Exchange</a>. This mechanism allows the caller to request an intermediate token, which includes the identity of the user, the caller, and the call chain already made. This new series of process steps makes it possible to centralize the calls policy between micro-services, as well as its application, thereby ensuring the traceability of calls.</p>
<p><strong>Protecting against token theft&#8230; or, how to guard against the theft of a token base?</strong></p>
<p>As a rule, the token contains a good deal of information about its holder, entailing significant risks if stolen. More striking still is the fact that, in some contexts (for example, new standards on electronic payments such as those in the modified European Payment Services Directive [PSD2]), a third party (aggregator) may be in possession of many tokens, and the owner of the API is then effectively at the mercy of this third party and its level of security. Because theft is very difficult to detect, there was a need to find other solutions such as <em><a href="https://tools.ietf.org/html/draft-ietf-oauth-token-binding">Token Binding</a></em>: a negotiation mechanism using two or three components to link a token to a pair of cryptographic keys, and where the client must prove that it owns the private key that makes up part of this pair by establishing a mutual TLS connection with the API.</p>
<h3>WRITING THE RECIPE DOWN</h3>
<p>What&#8217;s the last ingredient of the recipe? The need to set out a reference architecture for OAuth in order to adapt it to the context of the company&#8217;s IS. To do this, the API framework must be defined, by:</p>
<ul>
<li><strong>Defining and sharing the security rules: </strong>The authorized process steps and the application framework, the security checklists, and the reference architecture must all be formalized.</li>
<li><strong>Training and equipping developers: </strong>There will be a need to organize training sessions, and presentations on the principles to adopt. Project teams can be made autonomous in terms of their integration with the rest of the IS.</li>
<li><strong>Integrating security resources into Agile sprints: </strong>The resources that act as a “security coach” must be identified in order to support the application design, provide ready-to-use solutions, and serve as an accelerator.</li>
</ul>
<figure id="post-10462 media-10462" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10462" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5.png" alt="" width="1185" height="539" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5.png 1185w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-420x191.png 420w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-768x349.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/5-71x32.png 71w" sizes="auto, (max-width: 1185px) 100vw, 1185px" /></figure>
<h2>IN SUMMARY</h2>
<p>In summary, rather like the recipe for a good soup, securing APIs requires a list of ingredients, ranging from the most basic to the most sophisticated, while keeping the needs and context firmly in mind.</p>
<figure id="post-10464 media-10464" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10464" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6.png" alt="" width="831" height="469" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6.png 831w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-768x433.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/6-69x39.png 69w" sizes="auto, (max-width: 831px) 100vw, 831px" /></figure>
<p>&nbsp;</p>
<figure id="post-10452 media-10452" class="align-none"></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/right-recipe-api/">What&#8217;s the right recipe to secure your APIs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Customer IAM : l’IAM, pilier de la transformation business ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/</link>
		
		<dc:creator><![CDATA[David Martinache]]></dc:creator>
		<pubDate>Sun, 29 Jan 2017 10:19:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[confiance]]></category>
		<category><![CDATA[IAM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9368</guid>

					<description><![CDATA[<p>La transformation numérique et la multiplication des canaux d’accès et des offres pour les clients favorisent la compétition et forcent les métiers à se réinventer pour se différencier. Il est aujourd’hui indispensable pour les entreprises de connaitre au mieux leurs...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/">Customer IAM : l’IAM, pilier de la transformation business ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>La transformation numérique et la multiplication des canaux d’accès et des offres pour les clients favorisent la compétition et forcent les métiers à se réinventer pour se différencier.</p>
<p>Il est aujourd’hui indispensable pour les entreprises de connaitre au mieux leurs clients afin de leur proposer des services toujours plus personnalisés et ainsi augmenter leurs taux de transformation.</p>
<p>En quoi l’arrivée de systèmes centralisés de gestion des identités clients (<em>Customer Identity and Access Management</em> ou CIAM) peut être une première réponse à cette problématique.</p>
<h2>Vers une gestion unifiée des données clients</h2>
<h3>Une organisation historiquement en silos</h3>
<p>De par la spécificité des métiers de l’entreprise, de nombreuses solutions de gestion de la relation client ont émergé ces dernières années : CRM, email et vidéo marketing, e-commerce, mobile et <em>web</em> <em>analytics</em>…</p>
<p>Cette multiplicité des technologies a entraîné un silotage des données des clients ; en d’autres termes, il est aujourd’hui difficile pour une entreprise de disposer d’une vue unique de ses clients. En effet, une entreprise européenne posséderait en moyenne 4,5 solutions marketing<sup>[1]</sup>, soit autant de vues de chaque client.</p>
<figure id="post-9380 media-9380" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-9380" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM.png" alt="" width="509" height="142" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM.png 1104w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-437x122.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-768x214.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-71x20.png 71w" sizes="auto, (max-width: 509px) 100vw, 509px" /></figure>
<p>Avoir une vision unifiée des clients est une première étape indispensable pour les entreprises afin d’être en mesure de leur proposer des offres pertinentes.</p>
<p>Par ailleurs, le taux de transformation depuis les canaux numériques reste faible du fait d’un ciblage incomplet, d’offres en décalage avec les intérêts du client et d’un manque de confiance envers la marque.</p>
<p>Afin d’allier la transformation numérique et <em>business</em>, <strong>positionner l’identité du client au centre de l’organisation est une manière de traiter ces points défaillants</strong>.</p>
<h3>Le client au centre de l’organisation</h3>
<p>Aujourd’hui, le nombre important de solutions marketing tend à multiplier les sources de données : points de vente, canaux numériques (sites web, mobiles), service après-vente…</p>
<p>Le client se retrouve alors dans un modèle en « toile d’araignée » : plusieurs sources, plusieurs systèmes, plusieurs bases de données et donc plusieurs identités.</p>
<p>Afin d’améliorer la connaissance de leurs clients, les entreprises doivent adopter un modèle plus unifié, combinant facilité d’accès et partage des données clients : le modèle « centralisé ».</p>
<figure id="post-9383 media-9383" class="align-center">
<figure id="post-9385 media-9385" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9385" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2.png" alt="" width="1026" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2.png 1026w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2-431x191.png 431w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2-768x341.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-2-71x31.png 71w" sizes="auto, (max-width: 1026px) 100vw, 1026px" /></figure>
</figure>
<p>Ce modèle vise à mettre une interface unique (CIAM) entre les sources de données et les solutions marketing qui aura pour objectifs de <strong>centraliser les données clients</strong>, <strong>améliorer leur qualité</strong> et <strong>créer de la valeur <em>business</em></strong> en les agrégeant dans une même identité.</p>
<p>Une solution CIAM couvre 3 briques technologiques :</p>
<ul>
<li><strong>Enregistrement et accès</strong>: fournit des services d’enregistrement et de connexion, indépendamment du moyen d’accès (site web, mobile…) : API/SDK, fédération d’identité, social login…</li>
<li><strong>Stockage et traitement</strong>: fournit des services de stockage et de traitement des données : <em>profiling</em>, mise en qualité, agrégation…</li>
<li><strong>Intégration</strong>: fournit des connecteurs permettant au CIAM d’échanger des données avec les différentes solutions marketing de l’entreprise.</li>
</ul>
<p>Un tel modèle permettra à l’entreprise de <strong>mieux connaitre ses clients et les fidéliser</strong> (<em>Know Your Customers</em>, ou KYC).</p>
<h2>Mieux connaitre ses clients grâce au CIAM</h2>
<p>Globalement, l’ensemble des services offerts par le CIAM répond à des besoins <em>business</em> importants : mieux connaitre les clients, simplifier leur parcours et créer une relation de confiance.</p>
<h3>Un CIAM pour… mieux connaitre les clients</h3>
<p>Un client satisfait est un client fidèle, mais pour le satisfaire, encore faut-il le connaitre et anticiper ses attentes. Pour cela, le CIAM vise à contribuer à l’amélioration de la connaissance des clients que nous découpons en 4 grandes étapes :</p>
<figure id="post-9386 media-9386" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9386" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4.png" alt="" width="948" height="315" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4.png 948w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4-437x145.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4-768x255.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-4-71x24.png 71w" sizes="auto, (max-width: 948px) 100vw, 948px" /></figure>
<p><strong>Étape 1 : client anonyme</strong></p>
<p>L’entreprise ne connait pas le client mais uniquement un utilisateur qui accède à ses services. Elle ne peut donc récupérer des informations restreintes (cookie).</p>
<p>L’objectif est alors de proposer un moyen simple d’identifier l’utilisateur (ex : inscription à une <em>newsletter</em>).</p>
<p><strong>Étape 2 : client identifié</strong></p>
<p>Le client crée un compte utilisateur par le biais d’un compte d’un réseau social ou en remplissant un formulaire. À cette étape, l’entreprise présente les conditions d’utilisation de ses données pour consentement, récupère des informations de contact (nom, prénom, date de naissance, e-mail, téléphone) et rattache les informations récupérées en étape 1 à l’identité du client.</p>
<p>L’objectif est alors de le faire revenir via une <em>newsletter</em> ou l’envoi d’offres en lien avec son historique de navigation pour établir son profil.</p>
<p><strong>Étape 3 : client connu</strong></p>
<p>Au fur et à mesure des échanges avec le client, le CIAM va récupérer ses préférences (via les produits consultés, l’affichage d’un bouton « J’aime » à l’instar des réseaux sociaux qui permet au client d’indiquer simplement son intérêt pour le produit, etc.). Le profil du client commence à se dessiner et des actions de marketing plus ciblées peuvent commencer.</p>
<p>L’objectif est maintenant de connaitre au mieux le client et faire vivre ses données.</p>
<p><strong>Étape 4 : client fidélisé</strong></p>
<p>La mise à jour des préférences du client va permettre de cibler davantage les actions marketing et de le fidéliser en proposant des offres personnalisées et attractives.</p>
<p>Cette étape se réalise sur le long-terme, dans une approche de construction dynamique du profil du client.</p>
<h3>Un CIAM pour… simplifier le parcours client</h3>
<p>Un des principaux intérêts du CIAM est de simplifier le parcours client, élément fondamental à la transformation numérique.</p>
<p><strong>À l’enregistrement : faire simple, faire vite !</strong></p>
<p>La première raison de perte de clients potentiels est un processus d’enregistrement compliqué (trop d’informations demandées, CAPTCHA à saisir…).</p>
<p>Afin de simplifier ce processus, les solutions de CIAM proposent des fonctionnalités d’enregistrement en 3 clics basés sur les comptes des réseaux sociaux (ex : Facebook, Twitter, LinkedIn, Google…).</p>
<p>Les réseaux sociaux seront privilégiés comme source d’information du client.</p>
<p><strong>À l’usage : éviter l’effet RELOU !</strong></p>
<p>S’il y a une chose à ne pas retenir dans la mise en place d’un CIAM, c’est d’imposer un nouveau mot de passe au client.</p>
<p>Les solutions CIAM facilitent l’accès aux services en proposant des méthodes de connexion également basées sur les réseaux sociaux. Mais attention, les clients ne doivent pas avoir à se rappeler du réseau social qu’ils ont utilisé lors de l’enregistrement.</p>
<p>C’est à ce moment-là que les solutions CIAM permettent de rendre le plus transparent possible l’accès des clients en apportant la capacité de rattacher tous comptes de réseaux sociaux d’un client à son identité (ex : si le client s’enregistre avec Facebook, il devra pouvoir se connecter plus tard avec Twitter).</p>
<p>Se connecter en 1 clic pour éviter l’effet RELOU (« Réellement, Encore un Login à OUblier ! »), voilà de quoi retenir vos clients.</p>
<h3>Un CIAM pour… créer une relation de confiance</h3>
<p>La fidélisation d’un client passe par l’instauration d’une relation de confiance avec ce dernier en respectant le bon usage de ses données.</p>
<p>Aujourd’hui, le cadre légal est en pleine évolution, particulièrement en Europe avec l’arrivée de la GDPR (<em>General Data Protection Reglementation</em>).</p>
<p>L’un des points important de la GDPR est <strong>l’obligation faite d’obtenir le consentement de l’utilisateur pour tout usage de ses données</strong>.</p>
<p>En conséquence, le client doit à tout moment pouvoir :</p>
<ul>
<li>Être tenu informé des termes d’utilisation de ses données</li>
<li>Accéder à ses données et pouvoir les rectifier</li>
<li>Restreindre l’accès d’un service à tout ou partie de ses donnée</li>
<li>Être oublié</li>
</ul>
<figure id="post-9388 media-9388" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-9388" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-5.png" alt="" width="408" height="183" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-5.png 572w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-5-425x191.png 425w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-5-71x32.png 71w" sizes="auto, (max-width: 408px) 100vw, 408px" /></figure>
<p>Le respect de ces réglementations est donc primordial pour augmenter la confiance des clients qui, <em>in fine</em>, sont devenus la source de données principale des solutions CIAM. Cette confiance permet à l’entreprise de recueillir le maximum d’informations sur le client et d’ainsi augmenter ses taux de transformation.</p>
<h2>CIAM et IAM traditionnel : est-ce différent ?</h2>
<p>Bien que les solutions IAM traditionnelles et CIAM proposent des briques fonctionnelles proches (gestion des identités, authentification, publication de données…), elles présentent néanmoins des différences technologiques et d’usages significatives :</p>
<figure id="post-9389 media-9389" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9389" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-6.png" alt="" width="696" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-6.png 696w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-6-292x191.png 292w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/01/CIAM-6-60x39.png 60w" sizes="auto, (max-width: 696px) 100vw, 696px" /></figure>
<p>En conséquence, l’extension d’un IAM traditionnel pour gérer les identités des clients n’est évidemment pas judicieuse et induirait immanquablement un projet coûteux, la mise en place d’un système hybride non agile et ne garantirait pas l’atteinte des besoins couverts nativement par un CIAM.</p>
<h1>En synthèse</h1>
<p>Fidéliser un client nécessite de le connaitre. Les solutions de CIAM apportent des moyens technologiques pour centraliser et unifier la vision d’un client au sein d’une organisation, tout en respectant les évolutions des réglementations actuelles et en simplifiant le parcours client.</p>
<p>Malgré leurs bases communes à l’IAM traditionnel, les solutions CIAM restent des outils à enjeux marketing. Leur mise en place nécessite de sortir du cercle IT pour inclure les métiers (marketing, communication, services supports) ainsi que le juridique.</p>
<p>&nbsp;</p>
<p><em>[1] PAC, No more Silos &#8211; Towards a Holistic Customer Experience Strategy, 2016</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/">Customer IAM : l’IAM, pilier de la transformation business ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
