What is CIAM?

CIAM stands for Customer Identity & Access Management. It’s the IAM flavor aimed at end-users of your product, as opposed to Workforce IAM, which is aimed at your employees.

Same protocols underneath (OIDC, OAuth2, JWT). Wildly different problems on top.

CIAM vs Workforce IAM

Workforce IAMCIAM
Who logs inEmployeesCustomers / end-users
User countThousandsMillions
Account creationProvisioned by ITSelf-service signup
Look & feelInternal, functionalBranded, on-brand
Login methodsCorporate SSO, MFASocial, email-link, passkeys, MFA
Org structureDepartments, teamsTenants, organizations, B2B groups
Audit needsCompliance with internal policyCompliance + user-visible audit
Onboarding goalGet to workDon’t lose the signup

The technical kernel is the same; the experience and scale are not.

What CIAM actually adds

The pieces a CIAM system has to do well, on top of plain IAM:

Branded experiences

Each tenant (or product) should look like itself. The login page for acme.example.com should be Acme’s, not yours. That means customizable themes, logos, copy, and email templates per realm / per organization.

Self-service everything

Customers cannot wait for IT. They expect to sign up, reset passwords, link social accounts, enable MFA, delete their account, and export their data, all without a human in the loop.

Many login methods

Email + password is the floor. Above it: passkeys (WebAuthn), magic links, social login (Google, GitHub, Apple), enterprise SSO for B2B customers, phone OTP.

Organizations / B2B

A single customer is often a company, not a person. CIAM needs to model:

  • Users belonging to multiple organizations
  • Per-organization policies (this org requires MFA, that one allows only enterprise SSO)
  • Org-level admins who manage their own users
  • Invite flows, domain claiming, JIT provisioning

Scale and abuse resistance

A million users means a constant trickle of bot signups, credential-stuffing attempts, fraudulent password resets. CIAM systems need rate limiting, bot detection, risk-based MFA, and the ability to globally invalidate sessions during incidents.

GDPR, CCPA, and similar laws demand explicit consent, data portability, and the ability to delete. CIAM owns the consent record: what the user agreed to, when, and for which scope.

Why not just use Workforce IAM tools?

You can. Rough edges show up fast:

  • Workforce tools assume IT controls the user lifecycle. CIAM customers self-onboard.
  • Workforce tools sell per-seat licenses. CIAM scale (millions of users) breaks that pricing model and the vendor relationship along with it.
  • Workforce login pages are functional, not branded. Customers notice immediately.

The protocols don’t change. The operational shape does.

A useful mental model

Workforce IAM is your office security: badge readers, controlled access, employees only.

CIAM is your storefront: anyone can walk in, you need to recognize regulars, the entrance is part of your brand, and the door is open 24/7 globally.

In FerrisKey

FerrisKey was designed CIAM-first. Realms isolate tenants. Each realm has its own branding, login methods, MFA policies, and identity providers.