SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Hello!
Asanka Abeysinghe
Chief Technology Evangelist
asankaa AT wso2.com
Creating a Seamless Access Experience
with the Digital Double
May, 2022
Digital Experience Economy
3
ECONOMY
MOBILE APPS
IoT APPS
WEARABLE APPS
METAVERSE APPS
WEB 3.0
DISTRIBUTED APPS
COMMODITIES
PRODUCTS
SERVICES
EXPERIENCES
DIGITALIZATION
Integrating Digital Systems
DIGITIZATION
Analog to Digital
DIGITAL
TRANSFORMATION
Building Digital Experiences
ORGANIZATIONS
API
API
API API
API
API
API
API
API
MESH
API
API
API
API
API
API
API
MESH
API
API
MAINFRAME/
GREEN SCREEN
DESKTOP/
DISTRIBUTED APPS
WEB APPS EDGE APPS …..
APPLICATIONS
PERSONALIZATION
Getting Personal with Customers is the DNA of the Experience Economy
Personalization for Better Digital Experiences
4
● Identity verification establishes that it is you (using the system)
● But the system knows nothing about you, other than a few identity attributes
● To get to know you, the system needs to know your personality
● Till the system gets to know you, it can't offer a personalized experience.
Identity is what sets you
apart from others, what
makes you unique.
5
Personality is how you
describe yourself; it is your
sense of humor, your
emotions, and how you
react in different situations.
IDENTITY vs. PERSONALITY
Identity in the form of continuity of
personality is an extremely important
characteristic of the individual.
- Kenneth Lee Pike, Anthropologist -
7
CIAM is the Way to Intimate Personalization
CIAM TODAY IS
MOSTLY ABOUT
ACCESS CONTROL
TODAY
CIAM OF THE
FUTURE BLENDS
CUSTOMER
PERSONALITY TO
THE BUSINESS.
FUTURE
Never change DNA, blood group, finger prints
Rarely change Name, nationality, religion, gender
Frequently change Location, age, social status, job, education
Rapidly change Social media, heart rate, playlists
8
Identity and Personality Attributes Vary in Durability
The Digital Double is the Fusion of Your
Identity and Personality
IDENTITY PERSONALITY
DIGITAL
DOUBLE
Digital Double
10
Picture credit: Photo by Zack Walker on Unsplash
Representation of People, Places & Things in the
Digital Universe.
DIGITAL DOUBLE
in science
fiction
11
DIGITAL DOUBLE
always active
inside the
digital space
12
DIGITAL DOUBLE
connects
● physical and
digital
● digital physical
mashups
● digital and
digital
13
DIGITAL DOUBLE
takes
decisions
behalf of you
14
DIGITAL DOUBLE
protected by
the privacy
ecosystem,
regulations,
cyber threats
15
DIGITAL DOUBLE
heliocentric,
adaptive,
interoperable,
decentralized
16
Decentralized identifiers - represent attributes
17
The Digital Double is the Fusion of Your
Identity and Personality
IDENTITY PERSONALITY
CIAM
CIAM is the Foundation that Creates and Manages
the Digital Double.
DIGITAL
DOUBLE
Digital Double as a Service from Your CIAM Provider
● Base CIAM: authn, authz with full power
● APIs for recording data
○ Record interaction data from applications
○ Record transactions from systems of record
○ Record omni-channel activities
● APIs for querying the personality by apps
● Silently observing the customer
○ Monitor their social media posts including sentiment analysis
○ Detect interaction patterns and anomalies
● AI/ML analysis of all data to derive insights on behalf of businesses
● Alerts for triggering action when anomalies are detected
● A CIAM provider can combine info about the same person across businesses
to build a comprehensive personality profile
19
CIAM of the Future - a reference architecture
20
APP
APP
APP
OMNICHANNEL
GROUPS
USER
SOCIAL
EVENT
FAMILY
WORK
SYSTEMS OF RECORD
CUSTOMER
SUCCESS
SAAS APIS
AUTH
AUTH
AUTH
DATA LAKE
DIGITAL
DOUBLE
UUID: 4d0b3060-bb77-11ec-8422-0242ac120002
SOCIAL: @user
ML AI
ALERTS
APIS AUTHORIZATION
CIAM PROVIDER
EVENT PROCESSING
REALTIME
DIGITAL DOUBLE
APIS
INTERACTIONS
TRANSACTIONS
ENTERPRISE ARCHITECTURE
SSO
MFA
…
CIAM 1.0 Access management by identifying the person
CIAM 2.0 Integrate user identity to the business
CIAM 3.0 Improve business applications by knowing the person
21
The Path to Provide Enhanced Digital Experiences
contribution
https://wso2.com/
The WSO2 CIAM Maturity Model
None
Managed
Siloed
00 01 02
Connected
03 04
Optimized
Basic identity management
Registration, password management,, user management
01
Simple integration with siloed business systems
Customer information replicated within apps
02
Business systems integration
360° customer view
Omnichannel customer experience
03
Intelligent, adaptive & personalized customer experience
04
Level
00 Customers are strangers
Interactions are anonymous
CIAM 1.0: Access
management by identifying
the person
CIAM 2.0: Integrate user identity to
the business
CIAM 3.0: Improve the business
applications by knowing the person
23
https://wso2.com/blogs/thesource/a-maturity-model-for-ciam/
WSO2 strategy is to deliver CIAM x.0 as a Service via Asgardeo
24
APP
APP
APP
OMNICHANNEL
GROUPS
USER
SOCIAL
EVENT
FAMILY
WORK
SYSTEMS OF RECORD
CUSTOMER
SUCCESS
SAAS APIS
AUTH
AUTH
AUTH
DATA LAKE
DIGITAL
DOUBLE
UUID: 4d0b3060-bb77-11ec-8422-0242ac120002
SOCIAL: @user
ML AI
ALERTS
APIS AUTHORIZATION
CIAM PROVIDER
EVENT PROCESSING
DIGITAL DOUBLE
APIS
INTERACTIONS
TRANSACTIONS
ENTERPRISE ARCHITECTURE
SSO
MFA
…
DEVELOPER
SDKS
CODE/LOW CODE
ORCHESTRATION
IDE (VSCODE)
VCS (GIT)
EXTENSIBILITY
REALTIME
https://wso2.com/asgardeo/
Summary
Getting personal with customers is the DNA of the experience economy
CIAM is the way to intimate personalization
The digital double is the fusion of your identity and personality
CIAM is the foundation that creates and manages the digital double
Digital double as a service from your CIAM provider
CIAM maturity model
Reference implementation with Asgardeo powered by WSO2
25
Let’s connect
26
https://blog.architect2architect.com
https://wso2.com/strategic-consulting/
asankaa AT WSO2.com
https://www.linkedin.com/in/asankaabeysinghe/
@asankama
Image: https://www.crn.com/news/cloud/crn-exclusive-new-google-cloud-partner-advantage-program-launches-today
Question Time!

Weitere ähnliche Inhalte

Ähnlich wie Creating a Seamless Access Experience with the Digital Double

APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...Nordic APIs
 
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital TransformationWSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital TransformationWSO2
 
Mobilizing Microsoft Sharepoint Server
Mobilizing Microsoft Sharepoint ServerMobilizing Microsoft Sharepoint Server
Mobilizing Microsoft Sharepoint Serverkidozen
 
Compassites Software - Company Profile | Digital Transformation & Custom Soft...
Compassites Software - Company Profile | Digital Transformation & Custom Soft...Compassites Software - Company Profile | Digital Transformation & Custom Soft...
Compassites Software - Company Profile | Digital Transformation & Custom Soft...Compassites Software Solutions Pvt Ltd
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensBitglass
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityWSO2
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
The 10 Most Promising IAM Solution Providers in 2022.pdf
The 10 Most Promising IAM Solution Providers in 2022.pdfThe 10 Most Promising IAM Solution Providers in 2022.pdf
The 10 Most Promising IAM Solution Providers in 2022.pdfInsightsSuccess4
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPowerSaturdayParis
 
How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...LeanIX GmbH
 
Building retail moments that matter across digital and physical environments
Building retail moments that matter across digital and physical environmentsBuilding retail moments that matter across digital and physical environments
Building retail moments that matter across digital and physical environmentsNational Retail Federation
 
CRM Application for Fashion & Luxury Market
CRM Application for Fashion & Luxury MarketCRM Application for Fashion & Luxury Market
CRM Application for Fashion & Luxury MarketSB Soft
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
Integration in the Enterprise Mobile World
Integration in the Enterprise Mobile WorldIntegration in the Enterprise Mobile World
Integration in the Enterprise Mobile Worldkidozen
 

Ähnlich wie Creating a Seamless Access Experience with the Digital Double (20)

APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
 
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital TransformationWSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
Mobilizing Microsoft Sharepoint Server
Mobilizing Microsoft Sharepoint ServerMobilizing Microsoft Sharepoint Server
Mobilizing Microsoft Sharepoint Server
 
Compassites Software - Company Profile | Digital Transformation & Custom Soft...
Compassites Software - Company Profile | Digital Transformation & Custom Soft...Compassites Software - Company Profile | Digital Transformation & Custom Soft...
Compassites Software - Company Profile | Digital Transformation & Custom Soft...
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
The 10 Most Promising IAM Solution Providers in 2022.pdf
The 10 Most Promising IAM Solution Providers in 2022.pdfThe 10 Most Promising IAM Solution Providers in 2022.pdf
The 10 Most Promising IAM Solution Providers in 2022.pdf
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...How to increase your understanding of application usage with LeanIX and OneLo...
How to increase your understanding of application usage with LeanIX and OneLo...
 
Building retail moments that matter across digital and physical environments
Building retail moments that matter across digital and physical environmentsBuilding retail moments that matter across digital and physical environments
Building retail moments that matter across digital and physical environments
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
Loqr
LoqrLoqr
Loqr
 
CRM Application for Fashion & Luxury Market
CRM Application for Fashion & Luxury MarketCRM Application for Fashion & Luxury Market
CRM Application for Fashion & Luxury Market
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Integration in the Enterprise Mobile World
Integration in the Enterprise Mobile WorldIntegration in the Enterprise Mobile World
Integration in the Enterprise Mobile World
 

Mehr von Asanka Abeysinghe

Your Business, as APIs Leveraging Abstractions to Drive the Experience Economy
Your Business, as APIs  Leveraging Abstractions to Drive the Experience Economy Your Business, as APIs  Leveraging Abstractions to Drive the Experience Economy
Your Business, as APIs Leveraging Abstractions to Drive the Experience Economy Asanka Abeysinghe
 
Inside and Outside the Mesh: Role of APIs in the Mesh Architecture
Inside and Outside the Mesh: Role of APIs in the Mesh Architecture Inside and Outside the Mesh: Role of APIs in the Mesh Architecture
Inside and Outside the Mesh: Role of APIs in the Mesh Architecture Asanka Abeysinghe
 
Building a future-ready bank (whatever that future may be)
Building a future-ready bank (whatever that future may be)Building a future-ready bank (whatever that future may be)
Building a future-ready bank (whatever that future may be)Asanka Abeysinghe
 
Securing the Digital Double - The Path to a Trusted Digital Ecosystem
Securing the Digital Double - The Path to a Trusted Digital Ecosystem Securing the Digital Double - The Path to a Trusted Digital Ecosystem
Securing the Digital Double - The Path to a Trusted Digital Ecosystem Asanka Abeysinghe
 
Building an Integrated Supply Chain for APIs
Building an Integrated Supply Chain for APIs Building an Integrated Supply Chain for APIs
Building an Integrated Supply Chain for APIs Asanka Abeysinghe
 
A Decentralized Reference Architecture for Cloud-native Applications V2.0
A Decentralized Reference Architecture for Cloud-native Applications  V2.0A Decentralized Reference Architecture for Cloud-native Applications  V2.0
A Decentralized Reference Architecture for Cloud-native Applications V2.0Asanka Abeysinghe
 
The Reconstitution of Middleware with APIs V2
The Reconstitution of Middleware with APIs V2The Reconstitution of Middleware with APIs V2
The Reconstitution of Middleware with APIs V2Asanka Abeysinghe
 
Crossing the low-code and pro-code chasm: a platform approach
Crossing the low-code and pro-code chasm: a platform approachCrossing the low-code and pro-code chasm: a platform approach
Crossing the low-code and pro-code chasm: a platform approachAsanka Abeysinghe
 
Architecting the Transformation (V1.2)
Architecting the Transformation (V1.2)Architecting the Transformation (V1.2)
Architecting the Transformation (V1.2)Asanka Abeysinghe
 
Architecting the Transformation
Architecting the TransformationArchitecting the Transformation
Architecting the TransformationAsanka Abeysinghe
 
Building a Digital Enterprise: learning from experience V2
Building a Digital Enterprise: learning from experience V2Building a Digital Enterprise: learning from experience V2
Building a Digital Enterprise: learning from experience V2Asanka Abeysinghe
 
A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications Asanka Abeysinghe
 
Achieving true Agility through Programmability
Achieving true Agility through Programmability Achieving true Agility through Programmability
Achieving true Agility through Programmability Asanka Abeysinghe
 
A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications Asanka Abeysinghe
 
A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native ApplicationsA Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native ApplicationsAsanka Abeysinghe
 
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...Asanka Abeysinghe
 
The Reconstitution of Middleware with APIs
The Reconstitution of Middleware with APIsThe Reconstitution of Middleware with APIs
The Reconstitution of Middleware with APIsAsanka Abeysinghe
 
Cell-based Architecture: OReilly Software Architecture Conference NY 2019
Cell-based Architecture: OReilly Software Architecture Conference NY 2019 Cell-based Architecture: OReilly Software Architecture Conference NY 2019
Cell-based Architecture: OReilly Software Architecture Conference NY 2019 Asanka Abeysinghe
 
Cell-based Architecture : An Emerging Architecture Pattern for Agile Integration
Cell-based Architecture : An Emerging Architecture Pattern for Agile IntegrationCell-based Architecture : An Emerging Architecture Pattern for Agile Integration
Cell-based Architecture : An Emerging Architecture Pattern for Agile IntegrationAsanka Abeysinghe
 
Iterative Architecture: Your Path to on-time Delivery
Iterative Architecture: Your Path to on-time DeliveryIterative Architecture: Your Path to on-time Delivery
Iterative Architecture: Your Path to on-time DeliveryAsanka Abeysinghe
 

Mehr von Asanka Abeysinghe (20)

Your Business, as APIs Leveraging Abstractions to Drive the Experience Economy
Your Business, as APIs  Leveraging Abstractions to Drive the Experience Economy Your Business, as APIs  Leveraging Abstractions to Drive the Experience Economy
Your Business, as APIs Leveraging Abstractions to Drive the Experience Economy
 
Inside and Outside the Mesh: Role of APIs in the Mesh Architecture
Inside and Outside the Mesh: Role of APIs in the Mesh Architecture Inside and Outside the Mesh: Role of APIs in the Mesh Architecture
Inside and Outside the Mesh: Role of APIs in the Mesh Architecture
 
Building a future-ready bank (whatever that future may be)
Building a future-ready bank (whatever that future may be)Building a future-ready bank (whatever that future may be)
Building a future-ready bank (whatever that future may be)
 
Securing the Digital Double - The Path to a Trusted Digital Ecosystem
Securing the Digital Double - The Path to a Trusted Digital Ecosystem Securing the Digital Double - The Path to a Trusted Digital Ecosystem
Securing the Digital Double - The Path to a Trusted Digital Ecosystem
 
Building an Integrated Supply Chain for APIs
Building an Integrated Supply Chain for APIs Building an Integrated Supply Chain for APIs
Building an Integrated Supply Chain for APIs
 
A Decentralized Reference Architecture for Cloud-native Applications V2.0
A Decentralized Reference Architecture for Cloud-native Applications  V2.0A Decentralized Reference Architecture for Cloud-native Applications  V2.0
A Decentralized Reference Architecture for Cloud-native Applications V2.0
 
The Reconstitution of Middleware with APIs V2
The Reconstitution of Middleware with APIs V2The Reconstitution of Middleware with APIs V2
The Reconstitution of Middleware with APIs V2
 
Crossing the low-code and pro-code chasm: a platform approach
Crossing the low-code and pro-code chasm: a platform approachCrossing the low-code and pro-code chasm: a platform approach
Crossing the low-code and pro-code chasm: a platform approach
 
Architecting the Transformation (V1.2)
Architecting the Transformation (V1.2)Architecting the Transformation (V1.2)
Architecting the Transformation (V1.2)
 
Architecting the Transformation
Architecting the TransformationArchitecting the Transformation
Architecting the Transformation
 
Building a Digital Enterprise: learning from experience V2
Building a Digital Enterprise: learning from experience V2Building a Digital Enterprise: learning from experience V2
Building a Digital Enterprise: learning from experience V2
 
A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications
 
Achieving true Agility through Programmability
Achieving true Agility through Programmability Achieving true Agility through Programmability
Achieving true Agility through Programmability
 
A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications
 
A Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native ApplicationsA Decentralized Reference Architecture for Cloud-native Applications
A Decentralized Reference Architecture for Cloud-native Applications
 
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
Cell-based Architecture: An Emerging Architecture Pattern for Agile Integrati...
 
The Reconstitution of Middleware with APIs
The Reconstitution of Middleware with APIsThe Reconstitution of Middleware with APIs
The Reconstitution of Middleware with APIs
 
Cell-based Architecture: OReilly Software Architecture Conference NY 2019
Cell-based Architecture: OReilly Software Architecture Conference NY 2019 Cell-based Architecture: OReilly Software Architecture Conference NY 2019
Cell-based Architecture: OReilly Software Architecture Conference NY 2019
 
Cell-based Architecture : An Emerging Architecture Pattern for Agile Integration
Cell-based Architecture : An Emerging Architecture Pattern for Agile IntegrationCell-based Architecture : An Emerging Architecture Pattern for Agile Integration
Cell-based Architecture : An Emerging Architecture Pattern for Agile Integration
 
Iterative Architecture: Your Path to on-time Delivery
Iterative Architecture: Your Path to on-time DeliveryIterative Architecture: Your Path to on-time Delivery
Iterative Architecture: Your Path to on-time Delivery
 

Kürzlich hochgeladen

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Creating a Seamless Access Experience with the Digital Double

  • 1. Hello! Asanka Abeysinghe Chief Technology Evangelist asankaa AT wso2.com
  • 2. Creating a Seamless Access Experience with the Digital Double May, 2022
  • 3. Digital Experience Economy 3 ECONOMY MOBILE APPS IoT APPS WEARABLE APPS METAVERSE APPS WEB 3.0 DISTRIBUTED APPS COMMODITIES PRODUCTS SERVICES EXPERIENCES DIGITALIZATION Integrating Digital Systems DIGITIZATION Analog to Digital DIGITAL TRANSFORMATION Building Digital Experiences ORGANIZATIONS API API API API API API API API API MESH API API API API API API API MESH API API MAINFRAME/ GREEN SCREEN DESKTOP/ DISTRIBUTED APPS WEB APPS EDGE APPS ….. APPLICATIONS PERSONALIZATION Getting Personal with Customers is the DNA of the Experience Economy
  • 4. Personalization for Better Digital Experiences 4
  • 5. ● Identity verification establishes that it is you (using the system) ● But the system knows nothing about you, other than a few identity attributes ● To get to know you, the system needs to know your personality ● Till the system gets to know you, it can't offer a personalized experience. Identity is what sets you apart from others, what makes you unique. 5 Personality is how you describe yourself; it is your sense of humor, your emotions, and how you react in different situations. IDENTITY vs. PERSONALITY
  • 6. Identity in the form of continuity of personality is an extremely important characteristic of the individual. - Kenneth Lee Pike, Anthropologist -
  • 7. 7 CIAM is the Way to Intimate Personalization CIAM TODAY IS MOSTLY ABOUT ACCESS CONTROL TODAY CIAM OF THE FUTURE BLENDS CUSTOMER PERSONALITY TO THE BUSINESS. FUTURE
  • 8. Never change DNA, blood group, finger prints Rarely change Name, nationality, religion, gender Frequently change Location, age, social status, job, education Rapidly change Social media, heart rate, playlists 8 Identity and Personality Attributes Vary in Durability
  • 9. The Digital Double is the Fusion of Your Identity and Personality IDENTITY PERSONALITY DIGITAL DOUBLE
  • 10. Digital Double 10 Picture credit: Photo by Zack Walker on Unsplash Representation of People, Places & Things in the Digital Universe.
  • 12. DIGITAL DOUBLE always active inside the digital space 12
  • 13. DIGITAL DOUBLE connects ● physical and digital ● digital physical mashups ● digital and digital 13
  • 15. DIGITAL DOUBLE protected by the privacy ecosystem, regulations, cyber threats 15
  • 17. Decentralized identifiers - represent attributes 17
  • 18. The Digital Double is the Fusion of Your Identity and Personality IDENTITY PERSONALITY CIAM CIAM is the Foundation that Creates and Manages the Digital Double. DIGITAL DOUBLE
  • 19. Digital Double as a Service from Your CIAM Provider ● Base CIAM: authn, authz with full power ● APIs for recording data ○ Record interaction data from applications ○ Record transactions from systems of record ○ Record omni-channel activities ● APIs for querying the personality by apps ● Silently observing the customer ○ Monitor their social media posts including sentiment analysis ○ Detect interaction patterns and anomalies ● AI/ML analysis of all data to derive insights on behalf of businesses ● Alerts for triggering action when anomalies are detected ● A CIAM provider can combine info about the same person across businesses to build a comprehensive personality profile 19
  • 20. CIAM of the Future - a reference architecture 20 APP APP APP OMNICHANNEL GROUPS USER SOCIAL EVENT FAMILY WORK SYSTEMS OF RECORD CUSTOMER SUCCESS SAAS APIS AUTH AUTH AUTH DATA LAKE DIGITAL DOUBLE UUID: 4d0b3060-bb77-11ec-8422-0242ac120002 SOCIAL: @user ML AI ALERTS APIS AUTHORIZATION CIAM PROVIDER EVENT PROCESSING REALTIME DIGITAL DOUBLE APIS INTERACTIONS TRANSACTIONS ENTERPRISE ARCHITECTURE SSO MFA …
  • 21. CIAM 1.0 Access management by identifying the person CIAM 2.0 Integrate user identity to the business CIAM 3.0 Improve business applications by knowing the person 21 The Path to Provide Enhanced Digital Experiences
  • 23. The WSO2 CIAM Maturity Model None Managed Siloed 00 01 02 Connected 03 04 Optimized Basic identity management Registration, password management,, user management 01 Simple integration with siloed business systems Customer information replicated within apps 02 Business systems integration 360° customer view Omnichannel customer experience 03 Intelligent, adaptive & personalized customer experience 04 Level 00 Customers are strangers Interactions are anonymous CIAM 1.0: Access management by identifying the person CIAM 2.0: Integrate user identity to the business CIAM 3.0: Improve the business applications by knowing the person 23 https://wso2.com/blogs/thesource/a-maturity-model-for-ciam/
  • 24. WSO2 strategy is to deliver CIAM x.0 as a Service via Asgardeo 24 APP APP APP OMNICHANNEL GROUPS USER SOCIAL EVENT FAMILY WORK SYSTEMS OF RECORD CUSTOMER SUCCESS SAAS APIS AUTH AUTH AUTH DATA LAKE DIGITAL DOUBLE UUID: 4d0b3060-bb77-11ec-8422-0242ac120002 SOCIAL: @user ML AI ALERTS APIS AUTHORIZATION CIAM PROVIDER EVENT PROCESSING DIGITAL DOUBLE APIS INTERACTIONS TRANSACTIONS ENTERPRISE ARCHITECTURE SSO MFA … DEVELOPER SDKS CODE/LOW CODE ORCHESTRATION IDE (VSCODE) VCS (GIT) EXTENSIBILITY REALTIME https://wso2.com/asgardeo/
  • 25. Summary Getting personal with customers is the DNA of the experience economy CIAM is the way to intimate personalization The digital double is the fusion of your identity and personality CIAM is the foundation that creates and manages the digital double Digital double as a service from your CIAM provider CIAM maturity model Reference implementation with Asgardeo powered by WSO2 25
  • 26. Let’s connect 26 https://blog.architect2architect.com https://wso2.com/strategic-consulting/ asankaa AT WSO2.com https://www.linkedin.com/in/asankaabeysinghe/ @asankama Image: https://www.crn.com/news/cloud/crn-exclusive-new-google-cloud-partner-advantage-program-launches-today