What’s Next Identity?

It’s a unified governance layer for managing enterprise customer identity journeys at scale.

Who’s it for?

Enterprise companies with over 1 million user identities.

What does it do?

It lets you quickly deploy a feature-rich authentication and authorization layer that seamlessly integrates your applications with your data store.

What does it do?

Glad you asked. Next Identity can help you meet a wide array of goals.

What are you trying to accomplish?

Deploy fast

Problem: CIAM solutions can require a heavy lift from engineering to integrate CIAM backends into applications. Think six months to a year or more to fully integrate.
Solution: Next Identity offers integration patterns and follows industry-leading standards to drastically reduce integration time and accelerate time-to-market. The result: deployments that take 30 days or less.

Save money

Problem: Enterprise CIAM is expensive. Developing, maintaining, governing, supporting and scaling complex solutions often ends up costing far more than budgeted.
Solution: Our fully managed platform reduces the burden — and costs — of engineering, support and architectural resources needed. And because it’s an IDaaS solution, there’s no large upfront investment.

Follow industry standards and best practices

Problem: Authentication and authorization protocols are complicated. Engineers who aren’t specialists may end up developing solutions that aren’t sound, secure or scalable.
Solution: Next Identity follows all industry standard OIDC protocols, and evolves to meet new compliance requirements as they come up.

Handle complex use cases

Problem: Deploying custom CIAM solutions that need to meet complex requirements is incredibly challenging. Think: third-party data integrations, managing dozens or hundreds of properties, fraud protection, progressive profiling, or accessibility.
Solution: Our hosted CIAM deployment layer scales to meet even the most complex requirements by offering SaaS solutions for common integration patterns faced by large organizations.

Achieve security and privacy requirements (aka compliance)

Problem: When developers do their own integration, they can inadvertently make decisions that compromise your compliance, exposing you to legal and financial risk (not to mention data breaches).
Solution: Next Identity always follows best practices for securely stewarding data between the application and the CIAM backend, ensuring you stay secure and in compliance.

Achieve performance requirements

Problem: If unexpected surges in traffic overwhelm resources, it can result in a bad experience for the end users. That risks your retention revenue goals (never good).
Solution: Next Identity's modern container-based infrastructure adapts and auto-scales to meet the surges that follow a slam-dunk marketing campaign (or any sudden traffic you weren't expecting).

Stay on the cutting edge

Problem: CIAM vendors can be slow to evolve.
Solution: Because it’s built by Next Reason, Next Identity is more agile. We can develop new capabilities quickly, so you stay relevant to your consumers.

Core features like


  • Customer self-registration (B2C)
  • Invite-only activation (B2B)
  • Localization (30+ locales)
  • Custom branding

Add-on features like:


  • Multi-factor authentication
  • Consent management
  • Threat guard
  • Custom IdPs


A hosted solution with core features designed to jumpstart your digital transformation and unify your customer identity landscape.

Deliver secure user journeys connected to your data store.

Learn more and request a demo


All the features in Essential, plus:

  • Integrations for up to 20 business applications
  • Multi-factor authentication
  • Integrated consent management
  • Password history and inspection

Learn more and request a demo


Includes everything in Pro, plus:

  • Unlimited integrations
    (and custom integration)
  • Advanced threat detection
  • Support for multiple sub-brands

… and more

Learn more and request a demo

Feature Comparison

Included Essential Pro Enterprise
Consumer Identities 50,000 1,000,000 5,000,000+
Integrated Applications

Establish unique properties that require separate configurations, branding or integration

3 20 Unlimited
Identity Providers

Integrate with identity providers to meet compliance requirements

1 2 3+
Integration Environments

Support for advanced development workflow with pre-production environments

1 2 3+
Core Features Essential Pro Enterprise

Enable customers to create their own accounts

Check Mark Check Mark Check Mark

Enable customers to log in with their email, mobile number or biometric data using a traditional password and two-step verification

Check Mark Check Mark Check Mark

Enable customers to view and update their personal info

Check Mark Check Mark Check Mark

Enable your agents to create new accounts on behalf of customers and send email or SMS to customers to set up their new account

Check Mark Check Mark Check Mark
Forgot Password

Enable customers to securely reset passwords

Check Mark Check Mark Check Mark

Custom, branded email and SMS message services for core customer engagement

Check Mark Check Mark Check Mark

Support for 30+ global locales and languages

Check Mark Check Mark Check Mark
API Essential Pro Enterprise
API Access

Full API support for advanced platform integrations and customizations

Check Mark Check Mark
Identity Providers Essential Pro Enterprise
Akamai Identity Cloud Check Mark Check Mark Check Mark
Custom IdP Check Mark
Azure Active Directory Coming Soon Coming Soon Coming Soon
AuthO Coming Soon Coming Soon Coming Soon
Google Identity Coming Soon Coming Soon Coming Soon
Premium Extensions Essential Pro Enterprise
Multi-factor Authentication

Set-up secure logins that are customer-friendly

Check Mark Check Mark
Consent Manager

Meet compliance requirements including legal acceptances and marketing preferences

Check Mark Check Mark
Password Inspector

Help customers create new, stronger passwords with a strength meter

Check Mark Check Mark
Profanity Inspector

Prevent customers from creating inappropriate usernames according to your policy

Check Mark Check Mark
SIEM Stream

Increase security by streaming logs to your cyberdefense and compliance services

Check Mark
Threat Guard

Threat detection and mitigation services to manage common attacks and enhance security

Check Mark
Brand Factory

Create custom packages specific to your branding needs

Check Mark

Integrated notification service to downstream systems

Check Mark
Support Essential Pro Enterprise
Availability 8 x 5 24 x 7 24 x 7
SLA 99% 99.5% 99.95%
Onboarding Essential Pro Enterprise
Integration Accelerator

The expertise you need to deploy your first property

Essential Pro Custom
Adoption Accelerator

Comprehensive resources to meet your time-to-market goals for custom complex use cases

Available Custom