Join us to see Frontegg in action live on April 29 and get a free gift 🎁 Save Your Spot

 You’ve Outgrown Your Homegrown Customer Identity — What Now?

The “You’ve Outgrown Your Homegrown Customer Identity — What Now?” webinar, presented by Frontegg and ActualTech Media, explores the hidden costs, operational strain, and growing risks of maintaining homegrown customer identity and access management (CIAM) systems. As businesses scale and customer expectations evolve, legacy CIAM stacks become bloated, inflexible, and difficult to secure. That’s when it’s time to consider what’s next.

Key highlights include:

  • The identity management tipping point: Why businesses start with homegrown CIAM and what starts to break down as they grow.
  • The scalability struggle: How complexity, compliance demands, and technical debt slow down innovation and increase security risk.
  • The business case for change: A look at the real-world opportunity cost of maintaining custom CIAM systems, from developer burden to user friction.
  • Out-of-the-box CIAM, demystified: A live demo of Frontegg’s end-to-end CIAM platform featuring built-in SSO, adaptive MFA, fine-grained access control, and self-service user portals, all with zero coding required.
  • Security and user experience, in harmony: How modern CIAM enables strong protection without sacrificing customer experience or slowing down development.

This webinar is ideal for CTOs, product and engineering leaders, and security professionals ready to move beyond duct-taped identity systems and toward a scalable, secure, and user-friendly solution.


Transcript

Alright. Well, hi. Hello. And welcome to hey. You’ve outgrown your homegrown customer identity.

What now? Today’s fascinating webinar is sponsored by Frontegg and produced by Actual Tech Media. My name is Jess Steinbach with Actual Tech Media, a future b two b company, and I’m so happy that I get to be here with all of you today as your moderator. Because today, we are going to unpack something that I think probably affects a lot of you out there. My guess is that many of you have a homegrown customer identity and access management solution that you have built internally.

Maybe you have a legacy system. Maybe you’ve added on so many things. I was thinking about this ahead of time. You guys all know in Moana that hermit crab shell that’s all covered in shiny bits and bobs, and it’s it’s so big and bulky that I can barely move.

So even if we started with the best of intentions, we we wanted to keep the CIAM internal to manage it ourselves. As we scale, as we grow, and we’re sticking on all these shiny bits and bobs onto our wonderful shell, it gets harder and harder to keep up with those increasing requirements for each individual client while maintaining security and compliance. You get to the point that you can’t move. Your shell is too big.

Right? So today, we are going to look at the real world opportunity costs with your existing CIAM system, which signs you should maybe be keeping an eye out for to indicate that you have outgrown that system, and what benefits that you can expect if you make that move to an out of the box solution. This is an incredible opportunity, and I cannot wait to get started. We’ve got a fascinating conversation ahead of us here.

So I’m gonna get us rolling in just a second, but I do wanna walk through just a few things in the console here to make sure that we can all get the most out of our time here together today. Let’s kick it off over in the chat tab. That’s my favorite tab these days. I love hanging out there with all of you, And I can see some wonderful highs and hellos from you, Sam and Gilbert and Jared.

And we’ve got George and Rakesh and Eric. Eric from Madison, my home turf. I like it, Eric.

I I show you my little Madison chair. Wait. I got it. Okay. Here we go.

That’s a if you know, you know for anyone from Madison. Anyways, moving right along. We’ve got a wonderful crew of people here with us. And as we go throughout our day today, we absolutely want to hear from you.

So if you have thoughts, you have ideas, you wanna tell us about the weather, where you’re at, unless you’re in a sunny, beautiful place, and then I don’t wanna hear about it. It’s not that here. But tell us where you’re at. Tell us how your day is going.

And then you can also interact with each other. So the chat window, think of that as the best place for all of you to connect. You get to connect with each other. You get to share your stories, what you’ve learned, how your day is going.

Hey. On back to you, George. Nice to see you. So that’s where you can all really get interactive.

That’s the chat window. Now, if we take two little hops over to the q and a tab, this is where you get to interact with our speaker. So our wonderful speaker is gonna be watching that q and a tab. He’s keeping an eye out on it, and he wants to hear from you as we go through.

So if you have those insightful questions, those things that have been rattling around in your brain that you really wanna get answers to, get them into the q and a tab. So the chatter is all our fun conversations. The q and a is where we get to those questions. Now right sandwiched in the middle of those two is the docs tab.

The docs tab is absolutely full of cool resources and takeaways. Make sure you spend some time exploring that docs tab. You will want those handouts after we wrap. One more use for that chat window there, if you do have any technical issues that come up during the day today, I want to introduce you all, if you haven’t already met her, to the one and only Diana Albuquerque, who’s here with us in the wings today, and she is making sure that our ship sails smoothly off into webinar land.

Diana is gonna be there to help out. If you do have any problems, you can post in the chat there. Now your very first stop before you post should be a browser refresh. I promise a browser refresh is going to clear out most of the usual tech gremlins.

But if they’re really clingy and you’re having some troubles there, you can post in the chat window, and Diana will be there to help you out. One more thing that we have going on in the console are the closed captions. You can click on that closed caption button that you see in your audience console. We have about eighteen different languages.

So as I always say, pick a language you know, pick a language you don’t know, maybe you’re using it to study something new, whatever you like. But if you would enjoy having those closed captions, they are available for you there. Alright. That’s our lovely audience console.

That means it’s time to talk about prizes. We do have a $250 Amazon gift card that we will be giving away at the end of our webinar, so stay tuned for that. All of our winners do need to meet the actual tech media price terms and conditions. And if you’re not sure what those are, that’s okay.

We’ve got it written down for you. You can head into the docs tab, click in, scroll around, you’ll find the full t’s and c’s for you there. We also have a fifty dollar Amazon gift card going to the best question asked. So I can tell from this group already because we’ve got some wonderful highs and hellos coming.

I know you guys are gonna be active and involved, and I know that our q and a is gonna be hopping. The competition’s gonna be fierce for this one. So fifty dollar Amazon, best question gift card. We review all of the questions asked after we wrap up our webinar, and then we will follow-up with that best question gift card.

So stay tuned for that.

Alright. Boy, that was a lot of information very quickly, and we haven’t even gotten to the best stuff yet. Speaking of best stuff, look at our wonderful rock star expert presenter we have here with us, and that is, of course, Dignified, Sornolo Bempe, solutions engineer at Frontegg. Dignified, I am gonna bring you on out here with me. Dignified was joking that maybe he wouldn’t come on stage. Let’s see if he joins me.

Hey.

We gotcha. Hey, Dignified. How’s it going?

I’m doing well. Thank you. How are you doing, Chad?

I’m so glad you’re you’ve decided to to grace us with your presence here. Thank you so much. I was telling I was telling the audience you were teasing me that maybe you weren’t gonna come on stage when I invited you, so I appreciate you accepting.

Yeah. I’m so glad to be here. Thankful for the opportunity, and thank you to everybody that’s tuned in today. I wouldn’t have missed it for anything.

No. We’re gonna have a great time. And as I was saying, you look like you’re joining us from the a beautiful bright, sunshiny day. It’s making me feel relaxed already.

Let’s, let’s get you’ve got some great slides you’re gonna share, and I know we got a demo coming up. We got a lot to do.

So if you wanna get rolling with that Alright.

Thank you very much, Jess. I’m gonna share my screen.

Perfect.

Great. So once again, thank you very much everyone for tuning in today. Today, we’re here to talk about your homegrown customer identity.

And our interesting title is you’ve grown outgrown your homegrown customer identity. What now? And we’ll be talking about the pains associated with your homegrown customer identity, the challenges that usually come with that, and we’ll also be talking about, a a a great solution to help you transition from your homegrown customer identity.

And as usual, if you have any great any questions, there’s no good or bad questions. Any questions at all like Jess mentioned, please feel free to share them, and I’ll be more than happy to answer them, later on. So we go.

On the agenda today, we’ll talk about the challenges of homegrown CIAM over time. We’ll talk about the benefits of an out of box solution like Frontegg. We’ll go into a very quick demonstration of Frontegg showing you the benefits of an out of box solution live, and we’ll then, take the questions, at the end of the presentation.

Going right into it, what are the challenges associated with homegrown, consumer identity or customer identity and access management?

Now from my experience, and I’ve been in the identity and access management space from for about six years now, and, you know, usually, it starts out with wanting to provide the basic, you know, email and password combination. You just want to authenticate your users and maybe provide a reset password flow as well so you can get on with building your application or your solution.

But then over time, you start to realize that you need to introduce things like unmanaged identities.

These identities that are out of your control such such as social login. You think about people want wanting to offer your customers, you know, Google social login, Facebook social login, maybe LinkedIn social login.

And then some of your b two b clients start to request for enterprise single sign on. They want to, have their employees authenticate into your app or your solution with their active directory, with their Google Workspace IDs, with their Okta Federated IDs. And now you have to start thinking about offering that as a part of your identity solution.

And then there’s also the authorization concerns as well. You start to think about whether you’re offering role based access controls, attribute based access controls, relationship based access controls. These are just some of the many, questions that start to come up or the complexities that you start to add to your homegrown customer identity. And then, of course, there’s the risk and compliance aspect as well. You need to stay compliant with data privacy regulations. If you’re in the EU, you’d be thinking about GDPR, but then you also have to think about HIPAA as well in the US. So if you’re in the biopharma space, if you’re handling, personal data for financial transactions, you might have to start thinking about PCI DSS as well.

And then you start to think about extensibility.

You might want to connect to external databases. You might want to migrate users, maybe from one database to another.

Again, you have to factor or introduce that into your homegrown customer identity.

And, of course, there’s also maybe you want to integrate with third party solutions.

Maybe you want to talk to a third party service to pull additional data, for the users or add that to that user’s profile. Maybe you want to synchronize your, user database with your marketing tools as well. So maybe you want to push that into your mailing systems.

All of that, you start to add those layers of complication, to your homegrown customer identity.

And then from a developer’s point of view, which I also happen to be, this is very personal to me. The the effort it takes to continue to maintain and update this cons homegrown customer identity starts to become quite a challenge as well because, like I mentioned earlier, there’s the risk and compliance aspect to it, which you have to keep your solution up to date with. There’s also, you know, introducing these new features as well. So over time, you can see that we’ve gone from the basic email password authorization or authentication to having to think about all of these additional, features or factors that we were weren’t thinking about in the beginning.

And then we look at it again. Why did we even start in the first place? Why did we choose to take the homegrown route in the first place? Well, usually, it starts out as a necessity because, you know, who else is gonna build it for me? I need to get something up and running right away today.

And then you start to you you you initially choose that route because you think maybe I have more control, I have more, power to customize it to my desires.

You also think maybe this will save me some costs because, again, I’m doing it myself. I don’t have to pay anyone.

I know some of us in the in the audience are big on DIY. So, you know, sometimes you think, that’s the cheaper option to go. And then, of course, you you’re trying to address some specific business needs as well. So in the outset, you’re happy with your homegrown solution. Like we saw earlier, it does exactly what what it does just about what you need it to do.

But then over time, we start to see this is no longer working for the following reasons. Well, one, the security risk continue to increase and expand. We start to think about, you know, password encryptions, hashing algorithms, things like breach password protection, brute force protection. All of that will start to, become a challenge for us with our homegrown customer identity.

Then we also think about the cost of maintaining, the this solution. Think about, the amount of developers it will take to maintain this customer identity, the amount of time it’s taken to maintain this customer identity, the amount of effort it’s taken to stay compliant, with regulations.

There’s also the scalability limitations as well because as your user base or customer base continues to grow, your identity solution as well needs to be able to meet that demand.

It’s one thing where you have a couple of hundred users logging into your application, and then overnight, you become a major success, and then, you know, have hundreds of thousands of users logging into your application within an hour.

That could be a huge drain on your resources.

And then finally, there’s also the associated, technical debt that comes with, your homegrown customer identity as well. You know, layers and layers of of, homegrown code, developers come and go, different developers working on the identity solution. It becomes a really, difficult experience from a developer’s point of view. And this is why your homegrown customer identity no longer works.

Now all that said, we look at the pain points that we’re experiencing today, which I’m sure is why some of you have dialed into this webinar tonight or today.

Well, usually, from an end user point of view, there seems to be some friction. You know? They might expect some, you know, passwordless authentication.

Maybe the solution is not working as smoothly as they want. That is also a pain point. There’s also developer frustration, which we mentioned earlier.

The complex requirements from your enterprise customers, we talked about SSO earlier, but some of your enterprise customers might talk about things like, multi adaptive multi factor authentication.

They might talk about, you know, role based access controls as a requirement. They might talk about attribute based controls as a requirement.

Those are things that are now limiting your growth as a business or as a as a solution.

We also talk about the need for users to be more self self sufficient.

When you started out your application or your business, you know, it was easy for you to help your end users maybe reset their passwords, help them, you know, add new users to their account, or add, it was easy for you to be able to help them update their profiles or reset their MFA policies or factors.

But as they continue to grow, that is no more efficient anymore. It’s not easy to maintain or support all of these, users. And this is where the need for self sufficiency comes in as well. That can be a very big challenge for homegrown customer identity. We already touched on compliance. Again, it can be quite difficult and challenging to stay up to date with the compliance regulations, especially when it comes to handling personal information and data as well as user credentials.

And finally, we talked about security vulnerabilities.

This in the ever, growing world of the digital space, especially now with AI, the the security threats continue to evolve and expand, and that can be a challenge for you to maintain with your homegrown customer identity.

Now speaking about security vulnerabilities, here are some interesting, stats that I found and I thought will be interesting to share with you. The first being eighty percent eighty percent of cyberattacks leverage identity based attack attack methods, and this is, from a report by CrowdStrike. And what that means is your identity solution is a major target for cyber attackers.

If any of your users’ emails and passwords become compromised, that is a major loophole in your, security architecture.

Fifty four percent of organizations, identify technical debt as a primary obstacle to modernizing their identity and access management, and that is according to the Cloud Security Alliance. And think about that. Fifty four percent of organizations, that is a huge, huge number.

Again, identifying technical debt as a as an obstacle when trying to modernize that I am. We talked on it earlier. You know, the layers, the many versions of code that different developers have written over time to get your homegrown customer identity solution to where it is today.

And when you’re trying to continue to, evolve and modernize, that technical debt can be a big challenge.

Now finally, over one thousand password attacks per second were deflected in Microsoft systems in twenty twenty three alone.

A a thousand password attacks per second, that is a huge number on a on a platform or provider like Microsoft. So this again is emphasizing the point that, your identity solution needs to be very secure. It needs to be very scalable, but it also needs to be very, flexible as well. And these are the pains that we have identified from years of experience from talking to customers like yourselves or, developers like yourselves.

These are the pains that have been identified, and that are usually associated with homegrown, customer identity solutions.

Now I’m not that guy that comes in to tell you, hey. This is where the problem is, and I walk away. No. Today, we’re going to talk about not just the problem, but also the solution.

And what is that solution? Well, the solution is an out of box CIAM solution, what is, probably known as, you know, maybe authentication as a service solutions, authorization as a service solutions.

And what are the benefits of of, solutions like that? Well, I’ll point out six main benefits for developers, for businesses, for organizations like yourselves. The first being frictionless scaling. Like I mentioned earlier, as your business continues to grow from a couple of hundred users to a couple of thousand users to a couple of ten thousand users. You don’t need to start worrying about, you know, increasing your your AWS or Azure cloud subscription. You don’t need to worry about, you know, deploying more, developer resources to that particular identity, solution.

All of that is taken off from you by leveraging an out of box solution.

We’d also consider, enter enterprise grade features out of box. So things like single sign on, adaptive MFA, security policies, like, IP white IP white listing, domain white listing. All of that is available to the out of box with, an out of box solution like, Frontec.

And then we talk about delegates and security and compliance. Again, all of that is taken care of for you by that provider. So things like, you know, making sure you’re SOC 2 compliant, you’re PCI DSS compliant, you’re, GDPR compliant. You’re offloading all of that responsibility to the out of box I’m provider.

And then from an improved user experience as well, because features like we saw earlier, social login, password less login, all of that will be available to you out of box. So, again, from an end user perspective, there will be an improved experience as well as conversion because think about it. If it is very easy for your end users to be able to log into your applications, they will be able to convert or to engage with your products more quickly, the experience is better, and, you know, they’re able to convert as well.

And then there’s also the benefit of the reduced engineering efforts. So think about it. Your developers are no longer spending hours, days, months trying to, develop your identity solution, but rather they’re focused on making your product, the best at what it does. They’re not spending days and hours, you know, trying to debug issues with your identity and access management solution, trying to figure out how to enable single sign on. No. All of that is taken care of by your out of box I’m provider whilst they focus on what really matters, which is your unique selling point. And finally, we talk about extensibility.

Your ability to integrate with many other applications that you might be using or third party services.

All of that will be, easily achieved with an out of box CIAM solution. So this is why, I’m saying to you to move from your homegrown customer identity and leverage the benefits of, an out of box CIAM solution.

And that said, let’s talk about Frontegg, the end to end CIAM platform, which out of box offers or addresses your authentication needs, your entitlement needs, again, which is authorization, so things like, role based access controls, attribute attribute based access controls, relationship based access controls, all of that is available to you out of box. We talk about enterprise readiness, things like single sign on, adaptive MFA, white labeling. All of that, again, is available to you out of box with a solution like Frontec.

And then from an admin, from a self-service point of view, Frontec offers, an admin portal, which you can offer to your end users where they’re able to self serve things like reset their own passwords, set up their own MFA, factors, add users to their tenant, define roles and permissions, customize their security policies. You can offload that to your end users.

And then, of course, from a security perspective as well, that is also there’s also a lot of flexibility, from out of box, and some of this would show in the demo in a few minutes. Now very quickly, if we talk about authentication as a service out of box, you get things like your email login, your enterprise SSO out of box, your SMS login. So if you decided you wanted your end users to be able to log in with their mobile phones, you can simply enable that with by toggling a switch.

In this age of passkeys and multifactor authentication, all of those are available to you out of box with a solution like Frontegg.

And then, of course, like I mentioned earlier, there’s the entitlements aspect, which covers things like roles role based access controls.

If you wanted to, enable feature flags within your application, that is also something you can offload to Frontegg, so manage on your behalf. Even down to things like trials and subscriptions, those are things that you can offload, to Frontec whilst your developers focus on improving your unique selling point for your end users and customers.

And then finally, security.

You can define, preventative measures such as adaptive MFA, of user verification.

You can assess, your user logs, see security events, and you can also define what happens when, suspicious and malicious actors are detected. Are they blocked? Are they allowed? Are they challenged? You know, things like that, you can easily, define and configure within your front end tenant as well with a few clicks. So it saves you so much time and effort to implement these measures that are now being demanded by your end users and your business clients as well. So that brings me to the demo.

We would, at a at a very high level, showcase, the power that or the benefits that an out of box, sign solution like Frontec can bring to your business and your organization.

I can see there’s a question from Paul there about, password less options on Frontec. That is also something I’ll just touch on very briefly, during the demo. So like you can see on the screen, we’ll cover a lock and box builder, the self-service feature, which is the admin portal. We’ll talk about the security suite very briefly, and then we’ll also touch on single sign on, as well. And, again, if you have any questions, please just keep putting them in the q and a section, and we’ll get to them shortly. So I’m gonna stop sharing my screen for a second, and then we’ll go right into the demo.

I’m loving the participation and the engagement, I’m seeing in the in the audience. Please keep it coming.

We I would love to sort of address your questions as we go. So that said, let’s go into the demo. Now I’m gonna share my screen, and I will just need you all to just just let me know when you can see my screen.

K.

Not yet. I’m ready, though.

Okay. Great. Alright. So now it’s, gonna share my screen.

We’re we’re on pins and needles, edge of our seat.

This is the drum roll.

Drum roll. Yeah. Wow. There it is.

Nailed it.

And there it is.

And as as you can see on the screen, this is your Frontec dashboard. When you log in to your Frontec account, this is what you see. Now the first thing that I would usually do as a new developer, I’ve just gotten access to my Frontec account, will be to go into my login box. Now this is where I would customize my login page for my end users.

Now you can see on the left hand side there, I have some options like passkeys, SMS login that I can simply enable for my end users by toggling that switch on there. And then you can see there’s some single sign on options, OIDC, like an Okta, SAML, like an active directory, are already enabled, but I could disable that if I wanted to do so. But they’re already enabled, so we’ll keep them on. And then we move on to the, email sign on section where I can choose if I want my users to be able to log in with an email or password combination or use a password less option going this is answering your question, Phil.

Sorry, Paul. I can choose a passwordless option like a magic link or a magic code, which will mean that whenever my users come to my login page, they provide their email address, and, they will get a magic code sent to their email, which they will need to provide for my end users to be able to log in. But we’ll keep it at the password option for now, And then you can see out of box, there’s a couple of, social login options available to my to me. So I could choose maybe to enable LinkedIn.

Maybe I want to enable GitHub since I’m talking I believe I’m talking to quite a lot of developers here.

Maybe we want to enable, Apple as well so maybe people can use their Apple ID to log in as well. And there it is. I’ve you can see in the middle there what I’ve just enabled on my login form. Now that’s done, I can now move over to the right side, and I can choose, any of the preview themes that are available out of box, and I can start to customize them.

You know, I can customize the colors. I can change the positions of the button. So as you can see here, we have, the button the social buttons underneath the form. I can change that if I wanted to do so.

I can also customize the layout. So, you know, I could choose to either have the form on the left side. I can choose to remove the widgets on the side. You know?

All of this is being done without me even having to type a line of code. All of this is being done within a few clicks. I can also, upload a logo as well. So I can either drag and drop an image, or I could just, you know, paste the link there, and I can have that logo on my form.

We can choose to have that in or out of the box, and we can continue to do some more interesting things like maybe upload in the background image as well. But in the interest of time, I’ll keep things very, very simple, and we’ll leave the login form as it is right now. And when I hit the publish button there, I can now, you know, give this, give this a commit name. So everything you do in Frontegg version controlled.

You can easily roll back if you need to do so.

And now we have defined our login box. We’ve designed it. We’ve enabled features for it, and, that is now done. Now the next thing I would usually do is, you know, create an account. This is where my users will be stored. So, again, in this case, very simply, we could create an organization. Let’s call this, Teta Org, and we will create that organization or account.

And then once that is done, we can now invite an end user. In this case, we want to invite mister Sean Carter, with that email address, and the he will be the first user in our tenant.

And now that we have created that user, we now would also give him a name, and we will now invite this user into our tenant as you can see here. So mister Sean Carter has now received the invite into the tenant. Now the next thing I would normally do is connect applications to my account or tenant, and this means that members of this account can log in to my many my into multiple applications if I want to give them the ability to do so. So think of this as maybe you have a mobile app, you have, a web app, and maybe you have another service, maybe a documentation app, and you want them to be able to use your users to be able to maintain the same credentials across all three applications.

This, again, is something you can easily do with in Frontec by simply enabling which applications that members of this tenant or accounts can log into. As you can see here, my users can now log into my documentation app, my demo app, and my WordPress app with that one credential or that single credential that they have. And then the next thing I can do is also configure single sign on for members of this account as well, but I’ll skip that for a moment and then go to the security features. Now, again, with a solution like Frontegg, I can define unique security policies for members of this tenant or account. And as you can see here, I can define an MFA policy, maybe forcing all users to use MFA every time they need to log in. I can define things like how often they would need to, use their MFA to log in to the application if I wanted wanted to enforce that.

We can also define a password complexity. Remember, we chose the email password combination for our login form. So now we can also define how complex the passwords have to be. So if I chose hard, for example, I still have some flexibility to choose, you know, must they have a special character, must they put ten characters long? Frontegg gives you that level of flexibility.

And then I can also define things like domain white listing or black listing, meaning that I can choose that only people with a specific email address, a specific email domain will be able to access or sign up, as members of this account. Likewise, only people with a specific IP address will be able to log in to my application. So this is the level of, of power that a out of box solution like Frontegg will give you, and you don’t have to type a line of code. As you can see, I have not had to do any of that today. And then that is pretty much where I’ll keep it for now.

And then we would now go and look at things like security rules.

Now in the security section, you can see here I have options like bot detection helping me to identify, you know, if, somebody attempting to authenticate into my application is a genuine human being or malicious bot. And I can choose what happens when Frontegg detects such a user. Do we block that user? Do we challenge that user? If we challenge that user, it means we want to, maybe force them to perform MFA or go into their email and click a link. You know, we can define what happens there. We do things like finger device fingerprinting.

If a user logs in from a new device, what happens then? You’re able to define that policy as well within your Frontegg dashboard. You don’t have to type an additional line of code. One more thing I’ll touch on just in the interest of time will be well, two more things will be brute force protection.

If somebody tries to log in with, incorrect credentials, after how many attempts would that user be blocked or challenged, you can define that in Frontegg as well. So as you can see here, I can define to if a user logs tries to log in with a failed password five times, we can then maybe lock that user’s account. Or if we don’t really care about security, which I hope not, we can choose to continue to allow those, those, attempts. And then finally, we have, impossible travel. So if a user logs in from London and then maybe, ten minutes later, they’re trying to authenticate from Texas in the in the US, you can also choose what happens in that scenario. So, again, this is already available to you out of box. I want you to think about the time it would take for you to have built that yourself in your homegrown customer identity.

So these are the security rules I have now configured for my application.

And then the next thing I would normally do is, include the SDK, into the Frontegg desk SDK into my application. So if I used, for example, if I, was building a React application or a Next. Js application, or an Angular application, you know, you you would select that particular, stack or framework, and Frontegg already gives you the line of code for you to install the SDK in your application, and it already shows you how to configure that particular SDK to connect to your Frontec dashboard.

And once all of that is done, it takes a couple of minutes, to be honest. Once all of that is done, you can then go to your demo application, which you would see on the screen now. This is my demo app, Dignify travels.

I do like to point out that this is a demo site. So, for those of you that love to travel, don’t get excited by the prices you’re seeing on the screen for the packages. They’re absolutely not real.

But as you can see, this is my demo site here. And when I click on the login button, what happens is I am then redirected to the Frontegg environment where my end user is now able to log in. And straight away, you can see here that my the login page that we designed a few moments ago is now live. I did not have to reversion my code.

I did not have to go and update my application code. I didn’t have to do any of that. As soon as I hit the submit button in the login box builder that we did a few moments ago, that became live. And now my end users can now start to engage with this new experience, see how much time we’ve saved, see how much effort I’ve saved.

I’ve just had to toggle and enable, buttons, and that experience is now live for my end users in addition to all the security features and rules that we just configured a few moments ago. So now my end user has the ability to either log in using their email address and password combination or their mobile number or any of the social login providers at the bottom of this of the form there. In this case, I would authenticate using the Google social login. And as you can see, the user will be authenticated and then redirected back to my application.

And now the user is back in my application as you can see there, and they’re being asked for their preferred travel experience, but I wouldn’t, update that as of this moment. Now the user is logged in as you can see. And if we go and look at the user profile there, we can see the access token, the JWT access token that was returned to my application.

And if we decode that, access token, we can see it contains things like the user ID, the user’s email address, and the user’s permissions.

So we’ve not had to manually, write those permissions. All of that has been assigned to the user and included to in the access token, and my application can then read that access token and determine what features this user has access to and what this user is permitted to do within my application.

And then, we can go into deep deeper aspects of the solution like entitlements, but I will save that for later, in the interest of time the limited time we have today. Now, if I go into the admin portal there, this is, an out of box feature with Frontec, which is built into the SDKs. So, again, this is giving you the ability to offer self-service to your end users. You don’t have to build this dashboard for your end users yourself anymore. Now you can simply leverage the Frontec, SDK for this. And you can see here as an end user, I can update my own profile from within the application.

I can reset my password or set up my own MFA factor as well if I want to do so.

And if I was an administrator, which this user is, in the account or in the tenant, I can also update my own account within the application. I no longer have to send an email to tech support or admin to say, hey. Please update our our company logo, on your app.

Hey. We have a new joiner. Please invite them on our behalf. Now you can give them the ability to do so within a dashboard that’s available to you out of box as well.

And even down to the security policies that we saw earlier, they also have the ability now to also manage that themselves from within your application. They don’t need to you don’t need to give them access to Frontec, and they don’t need to send you any more tech support emails to do that on their behalf. And then finally, the last thing I wanted to show you today is the ability to how easy it is to set up, single sign on connections. And by clicking that button there, you can see straight away the user is presented with a guide for all the major providers where they can simply come in here, click on any preferred provider.

In this case, if they chose Okta, they will be able to follow the step by step guide on how to configure single sign on. And within a few minutes, they would have set up their own single sign on service for their users, and you can do that for them as well. So the whole idea here is I’ve not had to hit code once on this, presentation or demo because, you know, all of this is already available to me out of box with Frontec. All I’ve had to do is enable and toggle switches and follow the steps in the guide, that are being presented to me.

Now for these that we created earlier, I’m gonna switch over to mister Sean Carter’s profile as we can see there. And mister Sean Carter has now received that welcome email inviting him into the account.

And, of course, the look and feel of this email can be branded and customized. But as you can see, again, I didn’t have to worry about setting up a mailing service and worrying about how the emails will be delivered to the user. All of that is already built in into the solution.

And I, as mister Sean Carter webinar, now simply needs to click that welcome link, and I’m taken to the profile where I can now impute my password.

And, also, we’re just going to repeat the same password for mister Sean Carter, which is bad practice, but, you know, this is for testing purposes. And as you can see here, mister Sean Carter has now set up his own password as a new user, and he’s now redirected to my application.

Now if mister Sean Carter is to log in to the application, you can see mister Sean Carter is now, authenticated into the application as a member of Teta dot org, as you can see there. And if we go into mister Sean Carter’s profile, just like we saw with the previous user, we can see the access token.

We can see, the the what’s included in the ask access token. One thing I failed to point out a few moments ago was the roles that’s also included in the access token. The previous user was an administrative user or an administrator.

This user is, a read only has a read only role, so they have limited privileges within this application.

And if we go into the admin portal, as we can see here, the user can update their own profile, but when it comes to the account, there’s only there there’s only so much they can do. They can only read because that’s the privilege that the user has been given by default.

And this is how, a solution like Frontegg can save you time, effort, and energy, as opposed to having to build this all yourself out of box. So I’m gonna stop sharing my screen now, because that brings me to the end of the demo, and I’m gonna switch back to, the presentation where, we would just wrap up.

How are you doing, Jess?

Great. Yeah. No. I’m just here for the end of the presentation, and then we’re gonna get into some questions. I’m psyched.

Yeah. We’re almost done.

Take me back. That was such that’s such an interesting to get to see that in in action. And I think, really, and you hit on this a couple of times, how easy everything was and the user experience of it, from from just even the outside. I’m not a developer at all as the audience well knows.

But to to get to see how easy and simple that was, that was awesome.

Yeah. Thank you very much, Jess. Thank you very much. Now just, to wrap up, just to recap from everything we’ve seen, just before I hand the floor back to Jess, if there’s anything we’ve learned today, if there’s anything you take away from what you’ve seen in the last, couple of minutes or half hour, it’s that one.

An out of box solution like Frontegg offers you the benefit of low developer effort, whereas, your homegrown identity requires a high developer effort. We also have to think about faster time to market. As you saw, I only had to do a few clicks, and then I was able to have that deployed within my application as opposed to spending so much time trying to develop my own identity solution. And then, of course, you saw how easy it is for it was for me to use as opposed to having to hard code all of that, spend time testing the bug in.

You saw also how easily we could scale the solution as opposed to, you know, spending more money trying to get more resources, more cloud assets, more developers to be able to build that solution. And, of course, a solution like Frontec is fully managed in terms of security and certified in terms of compliance as well as opposed to you having to continuously do that those updates and maintenance yourself, with your homegrown solution.

And that brings me to the end of the presentation.

I’ll be happy to, take any questions, now if, you you have them.

Yeah. Let’s let’s get into some questions. And, obviously, there’s lots. And I do wanna say to everyone out there, we’re gonna do as many as we can in the next, like, five to seven minutes.

And then anything we don’t get to, we are gonna send to the Frontegg team so you will get responses back. So please do keep those questions coming in. Dignified, I’m gonna start with this one here. I’m I’m wondering we we got a couple of questions coming in, from teams.

Maybe it sounds like maybe some smaller teams, so maybe they’re they’re worried about the complexity.

And so wondering if maybe you could give some insight into the technical challenge, along the migration side. How difficult is it to actually get started?

Yeah. Great question. As you saw, during the demo, it only took me, single me, to do a couple of clicks, and the login page was customized. It was developed.

It took me a few clicks to be able to define my security policies. So in terms of the efforts it takes, it it is very, very low effort, and that is the benefit of a solution like Frontec. From a user migration perspective, you know, Frontec offers, two, two methods. We have what we call the lazy migration, which is where we connect to your existing data store, and we can authenticate the users with existing credentials and silently migrate them into Frontegg.

Or we can just do a bulk download, from your existing data store and upload them into Frontec. So it’s very, very easy and low effort. You don’t need any big teams to be able to do that.

Well, that’s huge, and that makes a big difference, obviously, because as I said, we’ve got a wide range of size of of organization here. I did see a question in here that I thought was interesting, and I and I’d like your take on it. So if you’ve given us, I think, some great, examples of why the homegrown solution is may not be the way to go when you hit a scalable point, that maybe the out of the box solution is better. If you were going to arm someone in our audience who indicated that they might have to be making this argument to the higher ups in their organization, what would be the the one or two or, you know, whatever you think the key arguments are that they should be bringing to that team?

Well, it’s two things. If you’re talking to the higher ups, of course, one of the first things that’s important to them is the finances. How much is this gonna cost us? And I like to always factor that to say, hey.

How much is it costing us to pay all the developers to be able to develop this custom identity solution? That’s number one. Number two, how long is it taking us to perfect the custom identity solution versus developing what makes our product special, what it is we’re trying to offer the market. There’s a that that’s the second point.

So in terms of, the effort required, the time to market, and, of course, more importantly for me, security. You know, How what would it what would a breach to the identity or or credentials of our users? What would that mean to us as a company? You know?

Yeah. Why not offload this to a more, a a solution and build to handle this type of responsibility? So those are the the the conversations I would say they should be pushing upwards.

And how long do you think for for someone out there that makes that argument, and then, you know, those are the reasons to to make the change, to to sort of, be motivated to make the change, when would they start to see the rewards? How long does it take for the ROI to kick in?

Oh, that’s a great question. Now from experience, this can be for anywhere from a couple of weeks, to a couple, to a month, two months. And the good the value is this, because you’re not spending, you know, months on end trying to perfect an identity solution.

Whereas with the Frontegg end, within a couple of hours, out out day, even say, maybe at max a couple of days, you can be fully up and running. And imagine what that means for you as a business in terms of cutting down what used to take you three, four, five months down to a couple of days or weeks is is a great return on investment. So from experience, I’ve seen customers start getting value from, you know, day one. I’ve also seen customers depending on how big the the rollouts or the, yeah, how big the rollout is to maybe, you know, a month. You know? So it is that, quick to get a return on investment.

Here’s an interesting question. We have an audience member looking for your key unique. What what do you think makes Frontegg stand out, in in a busy field?

Great question. Great question.

Well, I would say for Frontec is the power, the amount of flexibility that Frontec gives you compared to other providers in the space. And I’m not saying that because, of course, I work at Frontec. I’m saying that as somebody that has, you know, tested solutions, and I’m also saying that as a developer myself, Frontec offers you a lot of flexibility, number one. But number two, in terms of this power of self-service, nobody does self-service like Frontegg. You saw the admin portal. None of the competing providers offer you that.

And then, of course, we talk about, in terms of, you know, multitenancy hierarchy for tenancy and accounts, being able to customize experiences for each tenant, that is a great differentiator for Frontec as well.

Well, those are great key uniques, and, maybe maybe this also kind of fills in with that as well because we have somebody wondering about, some of the customization options. So are we able to still maintain our unique authentication experience for our users while using Frontec?

Yeah. That is a great question. It ties back to why I said as a a differentiator for Frontec because Frontec enables you to be able to customize the authentication journey, for your customers. You can even do it per account. So we are all that high level of flexibility, you know, customizing.

Do you want all users to use MFA just like you saw there? Do you want to widen all the login experience per account or per tenant? You’re able to do that with Frontec.

You know, the experiences you’re currently giving your customers today, Frontec can help you polish that and make it even better.

Yeah. That customization and power that you’re describing, that that it’s it’s hard to get those as a one two punch. You know, sometimes if things are powerful, then they’re sort of static.

And what you’re sort of describing is a little bit more of that agility that I think, especially for an organization that is in a scalability mindset, that’s huge because that can make all the difference between their, ability to grow with what they need to do and as an organization.

Dignified, we are reaching the very end of our presentation, which is crazy. This has gone by so fast. We have a lot to cover though. Yeah.

You you got through a lot. Okay. Let me ask you for a final takeaway. So if you were going to tell everyone in the audience, you know, thanks for listening to this whole awesome wonderful, deluge of information that you’ve just given us.

What would you want one thing for them to kind of walk away and mull over this evening or to to spend a little more time researching or thinking about later on?

I would say I want you to think about the amount of time you’re spending on your customer on maintaining your cost homegrown customer identity today. How much time is it taking you? How much effort is it taking you? And think about how you would continue to maintain that as your business continues to grow. Take that as a take as a takeaway. And if you decide that is something you don’t wanna have to deal with anymore, then, I I think now is the time to go sign up for a trial, on Frontec and start to see how easy and how better your your your life as a developer can be with a solution like Frontec?

Well, I think my takeaway is that I’d like to hire you as my travel agent as well. You have some great prices there.

And I’m also gonna put up this, wonderful QR code that you guys have. Tell me a little bit more about how I can get started with Frontegg.

Great. So if you have your mobile phone with you right now, you can, scan the QR code on the screen, and, you can, it will take you to the sign up page for the Frontegg trial. Sign up for a trial, and straight away, you can start to play with everything you saw me do on the screen today. You can start to test it out for yourself. And if, of course, you want to schedule a more tailored demo for a more specific use case, you can also contact the Frontec team through that trial account, and we’ll be happy to get you set up.

That’s awesome. And in fact, I think, the wonderful Diana has a link for us that she’s gonna, put up for everybody. So we’ll get that going as well. So you guys ah, there you go. Sign up for your free trial.

Totally. I like to I like to chill today.

Isn’t that fun? It’s like like a little news story.

There’s a link there as well.

Yeah. There you go. I really I like that. Actually and you know what? It’s, it’s super cool and customizable too.

So I can, like, I could replace that and I could just write, like, Dignified as amazing. And, and that would also be you know what? Here we go. Let’s, let’s do that.

Sign. Oh, it’s not gonna let me edit it. Okay. Alright. I’ll show I’ll put one up later.

Alright. Here we go. So, that is it for our chat today, Dignified. You have been so much fun to hang out with.

I wish we had more time. We’ll have to have you back in because I think there’s a lot more to explore here. And I do wanna remind you that all the questions that we got asked here, we are gonna make sure get sent on to the Frontegg team. So Dignified, you will have a chance to respond to everybody that we missed.

But thank you very much.

Yeah. Sorry. Jess, I did have a survey. I forgot, if you could share that with the audience. I’d appreciate it.

Up and running. Okay.

So learn more about Frontegg.

Thank you. Dignified.

I got so wrapped up in our conversation that I forgot to show everybody the poll. So there’s a poll that we’ve just opened up. See, it’s a good thing that he’s on top of things. We’ve got a poll up for all of you, and what we’re looking for is what additional information that you would like to get.

I’m gonna pull this up on the screen right now, and we want we want to hear from you guys. We want to know, are you looking for that data sheet, that white paper, more of a case study? Dignified, if you were picking your top, like, what how do you best interact with information? What would you choose?

Personally, for me, I’d love to schedule a a personal demo. I’d also be interested in customer case studies as well to see, you know, what other customers, organizations similar to myself are doing with a solution like Frontegg.

Yeah. I think that’s great. I think, you know, the personalized demo for me is an interesting one because, I feel that I’m a visual and communicative learner, so I like to have conversations about something as it’s kind of happening live. I like reading the papers, I like ingesting information on my own time, and then I want to talk to somebody about it. So, yeah, if you’re thinking of this as a one two punch, you’ve done the webinar now, you’ve gotten some great information, and now you wanna have a fun and interactive conversation that’s specifically tailored to you.

I I think that is is a great way to go. But there’s there it seems like we’ve got a lot of interest in the in the white papers and the data sheets. So clearly, the audience does not agree with me. They’re they’re all in on the they want the the written word. You guys are you’re all about the takeaways. Hey?

Yeah. We’ve got more than enough. We’ve got more than enough to go around.

So You got It’s not it’s not a finite resource of information. That’s what Dignified is saying.

Perfect. Okay. Well, I’m gonna I’m gonna stop sharing this on the screen, but I’m gonna leave the poll open. So please do take a second now.

If you’re you’re kinda hemming and hawing between these, click on that poll, and and let Frontegg know how they can follow-up with you once they leave this, the session here. Because, of course, this is really just the the beginning. There’s lots more to dig into. There’s lots more to explore.

So make sure that you’re getting the follow-up that you actually want that’s gonna be most impactful for you just by clicking on that poll, and then Frontegg is gonna hand that to you. It’s basically the easy button. Right? It’s the no code.

That’s the developer.

Alright. Well, Dignified, I’m I’m so glad you you caught that poll. I was I was absolutely just rolling with this webinar. It’s been so fun and interesting. I I forgot myself. So, we’ve got that in there, and, and thank you so much for being here with us today. It’s been a it’s been a blast.

Thank you very much for having me, and thank you everyone for tuning in tonight.

Alright. And to everyone out there who is, still asking some questions, a reminder that those are gonna get answers back, so keep those questions coming in. I’m leaving that poll open a second longer because I want all of you to, to make sure that you’ve got your answers in and submitted to the Frontegg deck team because there’s a lot more to learn here. So I know that some follow ups would be really, really helpful.

For those of you that are looking for something right away, you can also visit the docs tab. Now the docs tab has a couple of great handouts in there for you, some white papers.

So I saw a few people that were interested Frontegg methodology. You can also get into the front deck security approach, software design, architecture, and philosophy.

There’s a migration white paper. So for the the folks out there who are asking about how difficult difficult it was gonna be to migrate, there’s some of your answers. There’s a a white paper there on how to, go through that navigate that migration.

And then you have the Frontegg one pager. So this is that quick and easy at a glance customer identity for the whole team, how you can really start to distribute the responsibility of identity outside of just that engineering team. So really breaking down silos, and that’s that’s a really exciting thing, aspect of this as well. So that’s that one pager.

So you’ve got all your white papers. You’ve got the one pager. And And then if you’re looking for something else that you’re not seeing in that docs tab, you’re gonna click on the poll, and that will get you some follow-up information from Frontegg as well. So lots of great ways to follow-up.

While you’re all doing that, I am going to give away a prize. Now at some point in the next minute or so here, Dan is also gonna open up a survey. We are curious, for your feedback, so please do take a second and fill that out. Our two hundred and fifty dollar Amazon gift card today going to someone who is here live and present all the way through our wonderful webinar with us today, is Jeremy Vanek from Nebraska.

Jeremy Vanek from Nebraska. Congratulations to you. Now as always, we will be in touch about claiming your prize after we wrap, so stay tuned for that, Jeremy.

Well, with that, my friends, on behalf of the actual tech media team, I want to once again thank Frontegg for making this event possible. A big thank you to Dignified for such an interesting chat and a really, really cool demo. Like I said, I love being able to see those in action. And as always, my biggest high fives, my my most special and sparkliest of thank yous go to all of you for attending, for asking some really interesting and insightful questions.

I love chatting with all of you. I’m so glad we have this chat feature now, and we can hang out and get to know each other a little bit better in the chat and share some ideas together. I think, you know, one of the things that we were talking about throughout our day today is that sometimes it’s really easy to just keep rolling forward with the tools and the solutions we have. You know, things are working, and so we just start to feel like, you know, the frustrations we have, the things that don’t work.

It’s just the way it is. Right? It’s just it is what it is. And and we just roll with that.

And sometimes it’s nice to come together in this type of an environment and get that reminder that some things really could be better. There actually might be some greener grass on the other side. There might not be as many barriers to that change as you thought they were. And so now we’re yet to look ahead and we get to make those possibilities a little bit more of a reality in our organization.

And I think that was one of the the main points of our conversation today, which is what made it so interesting. So I hope that you all enjoyed your time here with us. I know I did, and I look forward to seeing you all at a webinar again soon. And until then, have an absolutely beautiful end to your day all.

Thank you.