{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/102","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Innovations in the user identity management space have been a trend in the past couple of years. Most of these developments across business…","fields":{"slug":"/identity/identity-management-in-cloud-computing/"},"html":"<p>Innovations in the user identity management space have been a trend in the past couple of years. Most of these developments across business and technology fronts have been around identity management in cloud computing, enabling the authentication and authorization processes right in the cloud.</p>\n<p>The primary goal of identity management in cloud computing is dealing with personal identity information so that a user’s access to data, computer resources, applications, and services is controlled accurately. </p>\n<h2 id=\"what-is-cloud-identity-management\" style=\"position:relative;\"><a href=\"#what-is-cloud-identity-management\" aria-label=\"what is cloud identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Cloud Identity Management</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"identity-management-in-cloud-computing2\"\n        title=\"identity-management-in-cloud-computing2\"\n        src=\"/static/a6c8632ef11025d07dd2ee8306b73d3a/212bf/identity-management-in-cloud-computing-2.jpg\"\n        srcset=\"/static/a6c8632ef11025d07dd2ee8306b73d3a/6aca1/identity-management-in-cloud-computing-2.jpg 650w,\n/static/a6c8632ef11025d07dd2ee8306b73d3a/212bf/identity-management-in-cloud-computing-2.jpg 768w,\n/static/a6c8632ef11025d07dd2ee8306b73d3a/72e01/identity-management-in-cloud-computing-2.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Identity management in cloud computing is the subsequent step of identity and access management (IAM) solutions. However, it is a lot more than merely a straightforward web app single sign-on (SSO) solution. This next generation of IAM solution is a holistic move of the identity provider right to the cloud. </p>\n<p>Known as Directory-as-a-Service (DaaS), this particular service is the advanced version of the conventional and on-premises solutions, including Lightweight Directory Access Protocol (LDAP) as well as Microsoft Active Directory (AD).</p>\n<h2 id=\"features-of-a-modern-cloud-identity-management-solution\" style=\"position:relative;\"><a href=\"#features-of-a-modern-cloud-identity-management-solution\" aria-label=\"features of a modern cloud identity management solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Features of a Modern Cloud Identity Management Solution</h2>\n<p>The following are a few advantages of identity management in cloud computing:</p>\n<ul>\n<li><strong>It offers a consistent access control interface:</strong> Applicable for all cloud platform services; Cloud IAM solutions provide a clean and single access control interface. </li>\n<li><strong>It offers</strong> s<strong>uperior security levels:</strong> If needed, we can easily define increased security levels for crucial applications.</li>\n<li><strong>It lets businesses access resources at diverse levels:</strong> Businesses can<a href=\"https://www.loginradius.com/role-management/\"> define roles and grant permissions to explicit users</a> for accessing resources at diverse granularity levels.</li>\n</ul>\n<h2 id=\"why-do-you-need-cloud-iam\" style=\"position:relative;\"><a href=\"#why-do-you-need-cloud-iam\" aria-label=\"why do you need cloud iam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Do You Need Cloud IAM</h2>\n<p>Identity management in cloud computing incorporates all categories of user-base who can operate in diverse scenarios and with specific devices. </p>\n<p>A modern cloud Identity and Access Management (IAM) solution helps to:</p>\n<ul>\n<li>Connect professionals, employees, IT applications, and devices securely either on-premise or the cloud and through involved networks.</li>\n<li>It makes it easy to share the network abilities with the entire grid of users who were precisely connected with it.</li>\n<li>It offers zero management overhead, enhanced security levels, and easy management of diverse users with directory service in a SaaS solution.</li>\n<li>It is utterly known that cloud-based services are enabled, configured, and hosted by external providers. This scenario may also get the least hassle, either for users or clients. As a result, many organizations can enhance their productivity with cloud IAM.</li>\n<li>SaaS protocol is created and used as a hub for connecting with all virtual networks of distributors, suppliers, and partners.</li>\n<li>Business users can deal with all services and programs in one place with cloud services, and Identity management can be enabled with a click on a single dashboard.</li>\n<li>Easily connect your cloud servers, which are virtually hosted at Google Cloud, AWS, or elsewhere right next to your current LDAP or AD user store.</li>\n<li>Widen and extend your present LDAP or AD directory right to the cloud.</li>\n<li>Deal with Linux, Windows, and Mac desktops, laptops, and servers established at different locations.</li>\n<li>Connect different users to diverse applications that use LDAP or <a href=\"https://www.loginradius.com/single-sign-on/\">SAML-based authentication</a>.</li>\n<li>Effortlessly handle user access controls to WiFi networks securely by using a cloud RADIUS service.</li>\n<li>Enable GPO-like functionalities across diverse Windows, Mac, and Linux devices.</li>\n<li>Facilitate both system-based as well as application-level multi-factor authentications (2FA).</li>\n</ul>\n<p>These abilities help build a platform that connects users to virtually all IT resources through any provider, protocol, platform, or location. </p>\n<p><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Future-proof-your-security\"\n        title=\"Future-proof-your-security\"\n        src=\"/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png\"\n        srcset=\"/static/a164480ea3177cb0422ee6104202f8b3/a6d36/Future-proof-your-security.png 650w,\n/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png 768w,\n/static/a164480ea3177cb0422ee6104202f8b3/63ff0/Future-proof-your-security.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>IT admins know that legacy identity management systems (in most cases) struggle when they are matched to cloud services and the likes of AWS. </p>\n<p>So, the newest approach to identity management in cloud computing extends your current directory to the cloud with a commanding, easy-to-use SaaS-based solution.</p>\n<h2 id=\"introducing-loginradius-cloud-iam---implemented-across-markets-by-industry-leaders\" style=\"position:relative;\"><a href=\"#introducing-loginradius-cloud-iam---implemented-across-markets-by-industry-leaders\" aria-label=\"introducing loginradius cloud iam   implemented across markets by industry leaders permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introducing Loginradius Cloud IAM - Implemented Across Markets by Industry Leaders</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"identity-management-in-cloud-computing3\"\n        title=\"identity-management-in-cloud-computing3\"\n        src=\"/static/81fa8a050a97d6a7cd0fdf1203e0b163/e5715/identity-management-in-cloud-computing-3.png\"\n        srcset=\"/static/81fa8a050a97d6a7cd0fdf1203e0b163/a6d36/identity-management-in-cloud-computing-3.png 650w,\n/static/81fa8a050a97d6a7cd0fdf1203e0b163/e5715/identity-management-in-cloud-computing-3.png 768w,\n/static/81fa8a050a97d6a7cd0fdf1203e0b163/2bef9/identity-management-in-cloud-computing-3.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius enables businesses to provide an enhanced consumer experience and protects the managed identities. Utilizing the <a href=\"https://www.loginradius.com/\">CIAM platform</a>, organizations can offer a streamlined login process, registration, password setup, along with safeguarding consumer accounts and complying with precise data privacy regulations.</p>\n<p>LoginRadius enables this by providing open-source SDKs, integrations with more than 150 third-party applications, pre-designed and personalized login interfaces, and superior security products such as RBA, <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">MFA</a>, and Advanced Password Policies. More than 3,000 businesses appreciate the platform with monthly reachability of 1.17 billion users globally.</p>\n<p>Compared to conventional deployments with on-premise servers, LoginRadius facilitates everything for its customers, including upgrades, maintenance, data and infrastructure management, security, compliance, and complete privacy with 24/7 technical support.</p>\n<p>The LoginRadius identity platform increases the value of businesses by integrating with hundreds of third-party tools. The cloud directory offers everything an engineering team requires to manage consumer data. It enables you to tailor the abilities as needed. However, the platform is API driven, meaning it is easily accessible by developers.</p>\n<p>Further, when consumer data is completely locked away across silos, businesses will face multiple challenges. LoginRadius offers integrations to take apart data silos and the challenges that come with them.</p>\n<p>The cloud identity platform completely <a href=\"https://www.loginradius.com/compliances/#:~:text=The%20LoginRadius%20Identity%20Platform%20is%20designed%20to%20handle%20consent%20management,helps%20you%20meet%20GDPR%20requirements.\">complies with precise privacy regulations</a> and makes things simpler by giving consumer control when the data is entirely centralized. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Identity management in cloud computing is highly critical to your organization. It can persuade the productivity of your employees and the <a href=\"https://www.loginradius.com/blog/identity/2020/06/consumer-data-privacy-security/\">security of your organization</a>. It can also have immense control over what technology solutions you select.</p>\n<p>However, IAM solutions have to be supple across identity management and access control in cloud computing to match the current complexities of the computing environment. </p>\n<p>If you are locked into some conventional platforms or service providers because of your active directory ad service, explore a vendor-neutral cloud identity management solution.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 29, 2021","updated_date":null,"description":"Identity management in cloud computing is the subsequent step of identity and access management (IAM) solutions. However, it is a lot more than merely a straightforward web app single sign-on (SSO) solution. This next generation of IAM solution is a holistic move of the identity provider right to the cloud. ","title":"Identity Management in Cloud Computing","tags":["cloud computing","digital identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/11aaa3778c9c5ac2416f7873c5f6b9ba/9a31d/identity-management-in-cloud-computing-cover.jpg","srcSet":"/static/11aaa3778c9c5ac2416f7873c5f6b9ba/f836f/identity-management-in-cloud-computing-cover.jpg 200w,\n/static/11aaa3778c9c5ac2416f7873c5f6b9ba/2244e/identity-management-in-cloud-computing-cover.jpg 400w,\n/static/11aaa3778c9c5ac2416f7873c5f6b9ba/9a31d/identity-management-in-cloud-computing-cover.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"What is IAM  Identity and Access Management (IAM) is a core discipline for any enterprise IT, as it is inseparably linked to the security…","fields":{"slug":"/identity/what-is-iam/"},"html":"<h1 id=\"what-is-iam\" style=\"position:relative;\"><a href=\"#what-is-iam\" aria-label=\"what is iam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is IAM</h1>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"What-is-IAM-1\"\n        title=\"What-is-IAM-1\"\n        src=\"/static/87af51c2c6531493a9706789c27f6877/212bf/What-is-IAM-1.jpg\"\n        srcset=\"/static/87af51c2c6531493a9706789c27f6877/6aca1/What-is-IAM-1.jpg 650w,\n/static/87af51c2c6531493a9706789c27f6877/212bf/What-is-IAM-1.jpg 768w,\n/static/87af51c2c6531493a9706789c27f6877/72e01/What-is-IAM-1.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Identity and Access Management (IAM) is a core discipline for any enterprise IT, as it is inseparably linked to the security and sustainability of companies. </p>\n<p>When more and more businesses storing their confidential data electronically, it is important to ensure that data remains secure.</p>\n<p>\"Users,\" \"roles,\" \"access\" might be some of the terms you have heard concerning identity and access management. So, let's break it down.</p>\n<ul>\n<li><strong>Identity</strong>: Identity implies how you are represented and digitally documented online, sometimes through social login, work email address, or personal email ID. </li>\n<li><strong>Access</strong>: Access refers to determining that the right user can access the right resource securely inside a network, at the right time.</li>\n</ul>\n<p>This is majorly what an ideal identity and access management strive to provide. </p>\n<h2 id=\"what-is-identity-and-access-management-in-cybersecurity\" style=\"position:relative;\"><a href=\"#what-is-identity-and-access-management-in-cybersecurity\" aria-label=\"what is identity and access management in cybersecurity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is Identity and Access Management in Cybersecurity</h2>\n<p>Identity and Access Management in cybersecurity refers to the security framework and disciplines for managing digital identities. It regulates the responsibilities and access privileges associated with individual consumers and the conditions in which such privileges are allowed or denied.</p>\n<p>In simpler terms, IAM encompasses:</p>\n<ul>\n<li>The provisioning and de-provisioning of identities in the IAM system.</li>\n<li>Securing and authenticating identities.</li>\n<li>Authorizing access to resources or performing certain actions.</li>\n<li>Incorporating the correct levels of protection and access for sensitive data. </li>\n</ul>\n<p>IAM includes tools like two-factor authentication, multi-factor authentication, single sign-on, and privileged access management. These tools can store identity and profile data safely. </p>\n<p>They also comply with <a href=\"https://www.loginradius.com/blog/identity/2020/07/data-governance-best-practices/\">data governance</a> functions to ensure that only appropriate and relevant information is being shared. </p>\n<p>Information technology (IT) administrators can restrict user access to sensitive data within their organizations by putting an IAM <a rel=\"nofollow\" href=\"https://www.softwareworld.co/best-identity-management-software/\"> security framework </a> in place.</p>\n<h3 id=\"what-are-the-key-iam-terms\" style=\"position:relative;\"><a href=\"#what-are-the-key-iam-terms\" aria-label=\"what are the key iam terms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Key IAM Terms</h3>\n<p>Here are some of the key terminologies that you will encounter while processing identity and access management. </p>\n<ul>\n<li><strong>Access management</strong>: It refers to the processes and tools used to control and monitor network access for both on-premises and cloud-based systems.</li>\n<li><strong>Authentication</strong>– It is the first in the login process in which users enter their credentials to verify their identity.</li>\n<li><strong>Authorization</strong>– After authentication, the system now determines whether the authenticated user has permission to perform the action they have requested.</li>\n<li><strong>De-provisioning</strong>- It is the process of removing an identity from an ID repository and terminating access privileges.</li>\n<li><strong>Entity</strong>- The identification that has been used to authorize an entry. Usually, this comes either from a task grouping or an individual user account.</li>\n<li><strong>Identity Analytics</strong> – They are repositories that capture logging activities for authentication and authorization. </li>\n<li><strong>Managed Policy</strong> - It is a set of rules that an IAM system follows to track which users, organizations, and positions have access to which services.</li>\n<li><strong>Multi-Factor Authentication</strong> - It verifies consumer identities by adding (compulsory or optional) additional layers of security to the authentication process, usually in the form of numeric or alphanumeric codes. </li>\n<li><strong>Principal</strong>: The source that demands permission to access a resource. It can be a human being or an automated system. </li>\n<li><strong>Privileged account management</strong>:  It refers to managing and auditing accounts and data access based on consumers' allowed privileges. </li>\n<li><strong>Risk-Based Authentication</strong> - It is an advanced authentication method that uses real-time intelligence to verify a consumer based on certain risk scores. They usually include factors like login device, consumer identity, geolocation, geo velocity, number of failed login attempts, and more. </li>\n<li><strong>Single Sign-On</strong> - It allows consumers to log in to multiple independent applications with a single set of credentials, eliminating the need for multiple usernames and passwords.</li>\n<li><strong>User Provisioning</strong> – It is the process of creating new enterprise accounts for users and assigning them <a href=\"https://www.loginradius.com/provisioning/\">access privileges</a>.</li>\n</ul>\n<h2 id=\"how-iam-works\" style=\"position:relative;\"><a href=\"#how-iam-works\" aria-label=\"how iam works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How IAM Works</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 92.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"What is IAM-3\"\n        title=\"What is IAM-3\"\n        src=\"/static/9c41e19ac8e19f390c28c92c3f628883/e5715/What-is-IAM-3.png\"\n        srcset=\"/static/9c41e19ac8e19f390c28c92c3f628883/a6d36/What-is-IAM-3.png 650w,\n/static/9c41e19ac8e19f390c28c92c3f628883/e5715/What-is-IAM-3.png 768w,\n/static/9c41e19ac8e19f390c28c92c3f628883/2bef9/What-is-IAM-3.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Identity and access management systems perform three main tasks viz. identification, authentication, and authorization. In other words, IAM functions to provide the right people access to devices, hardware, software applications, or any IT tool to perform a specific task. </p>\n<p>All IAM includes the following core components:</p>\n<ul>\n<li>A database that includes the identities and access rights of users.</li>\n<li>IAM tools to provision, monitor, change and remove access privileges.</li>\n<li>A framework for auditing login and access history.</li>\n</ul>\n<p>The list of access rights must be up-to-date all the time with the entry of new users or the change of roles of current users. In an enterprise, the responsibilities of identity and access management typically come under IT or departments that handle data processing and cybersecurity.</p>\n<h3 id=\"the-key-functionalities-of-an-iam\" style=\"position:relative;\"><a href=\"#the-key-functionalities-of-an-iam\" aria-label=\"the key functionalities of an iam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The key functionalities of an IAM</h3>\n<ul>\n<li><strong>It manages identities</strong>: IAM creates, modifies, and deletes users. It also integrates with one or more other directories and synchronizes with them.</li>\n<li><strong>It provisions/provisions users</strong>: Once a user seeks permission to enter a system, IAM specifies which resource the user has access to and what level of access (like editor or viewer) based on their roles in the organization. On the contrary, when a user leaves the organization, IAM deprovisions from all the systems they have access to. After all, an ex-employee still having access to an organization's resources can have serious security implications. </li>\n<li><strong>It authenticates users</strong>: IAM authenticates users using tools like multi-factor authentication and adaptive authentication when they request access.</li>\n<li><strong>It authorizes users</strong>: After authenticating, IAM authorizes access to specific apps and resources based on predefined provisioning.</li>\n<li><strong>It provides report</strong>: IAM provides reports to help organizations identify possible cybersecurity threats, and strengthen their safety processes under global compliances. </li>\n<li><strong>It offers single sign-on</strong>: IAM allows consumers to access any connected web properties with a single identity. SSO adds security to the process of authentication and makes it even easier and faster to access resources. </li>\n</ul>\n<h2 id=\"designing-a-modern-iam-program-for-your-enterprise\" style=\"position:relative;\"><a href=\"#designing-a-modern-iam-program-for-your-enterprise\" aria-label=\"designing a modern iam program for your enterprise permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Designing a Modern IAM Program for Your Enterprise</h2>\n<p>Here are the best practices to enable a smooth and seamless integration of a modern IAM program. </p>\n<h3 id=\"define-your-iam-vision\" style=\"position:relative;\"><a href=\"#define-your-iam-vision\" aria-label=\"define your iam vision permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Define your IAM vision</h3>\n<p>Your IAM should be a combination of modern technologies and business processes. You need to understand your current IT and network infrastructure and build your future capabilities around it. </p>\n<p>Later, incorporate authorization, privileges, policies, and other constraints to ensure secure access into your web properties. </p>\n<h3 id=\"a-strong-foundation-is-a-must\" style=\"position:relative;\"><a href=\"#a-strong-foundation-is-a-must\" aria-label=\"a strong foundation is a must permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A strong foundation is a must.</h3>\n<p>This includes a thorough assessment of the capabilities of the IAM product and its sync with organizational IT. An efficient risk evaluation should ideally cover:</p>\n<ul>\n<li>An understanding of what third-party apps are currently in use.</li>\n<li>What are your technological forte and limitations?</li>\n<li>Should you build or buy your IAM solution? </li>\n</ul>\n<h3 id=\"stage-wise-implementation\" style=\"position:relative;\"><a href=\"#stage-wise-implementation\" aria-label=\"stage wise implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stage-wise implementation.</h3>\n<p>An IAM program is usually implemented based on the two practices mentioned above. However, to avoid any complications, most IAM experts recommend a stage-wise implementation process.</p>\n<h3 id=\"conduct-a-stakeholder-awareness-program\" style=\"position:relative;\"><a href=\"#conduct-a-stakeholder-awareness-program\" aria-label=\"conduct a stakeholder awareness program permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conduct a stakeholder awareness program.</h3>\n<p>Your stakeholder awareness program should cover detailed training about your product abilities, scalability standards, and what technologies you are using. However, more than anyone, train your IT teams as they should most definitely know about your IAM's core capabilities.</p>\n<h3 id=\"identity-should-be-your-core-security-parameter\" style=\"position:relative;\"><a href=\"#identity-should-be-your-core-security-parameter\" aria-label=\"identity should be your core security parameter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity should be your core security parameter.</h3>\n<p>Organizations should move from the conventional focus of securing a network to securing identity. Centralize security controls around the identities of users and facilities.</p>\n<h3 id=\"enable-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#enable-multi-factor-authentication-mfa\" aria-label=\"enable multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable multi-factor authentication (MFA).</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/#:~:text=10%20min%20read,And%20that&#x27;s%20the%20catch!\">MFA</a> is a crucial part of identity and access management. After all, it adds multiple security layers to user identities before allowing access to an application or database. Therefore, ensure that you have enabled MFA for all users and consumers, including IT admins and C-suite executives. </p>\n<h3 id=\"implement-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#implement-single-sign-on-sso\" aria-label=\"implement single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implement Single Sign-On (SSO).</h3>\n<p>Establish SSO for all your web properties (devices, apps, and services) so consumers can use the same set of credentials to access multiple resources. </p>\n<h3 id=\"enforce-a-zero-trust-policy\" style=\"position:relative;\"><a href=\"#enforce-a-zero-trust-policy\" aria-label=\"enforce a zero trust policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enforce a zero-trust policy.</h3>\n<p>Zero Trust is a holistic approach to network security where consumer identities are strictly verified, regardless of whether they are located inside or outside the network perimeter. However, it is only effective when you track and verify the access rights and privileges of consumers on an ongoing basis. </p>\n<h3 id=\"implement-a-strong-password-policy\" style=\"position:relative;\"><a href=\"#implement-a-strong-password-policy\" aria-label=\"implement a strong password policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implement a strong password policy.</h3>\n<p>Enforce a strong password policy for both employees and your consumers. Make sure they are updating passwords regularly and aren't using sequential and repetitive characters.</p>\n<h3 id=\"secure-all-privileged-accounts\" style=\"position:relative;\"><a href=\"#secure-all-privileged-accounts\" aria-label=\"secure all privileged accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Secure all privileged accounts.</h3>\n<p>A good way to protect your critical business asset is to secure all privileged accounts. For starters, limit the number of users who have access to those accounts.</p>\n<h3 id=\"conduct-access-audits-from-time-to-time\" style=\"position:relative;\"><a href=\"#conduct-access-audits-from-time-to-time\" aria-label=\"conduct access audits from time to time permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conduct access audits from time to time.</h3>\n<p>Regularly conduct access audits to ensure that whatever access you have granted is still required. You can offer additional access or revoke consumer access based on your audit report.</p>\n<h3 id=\"favor-passwordless-login\" style=\"position:relative;\"><a href=\"#favor-passwordless-login\" aria-label=\"favor passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Favor passwordless login.</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">Passwordless login</a> simplifies and streamlines the authentication process by swapping traditional passwords with more secure factors. These extra-security methods may include a magic link, fingerprint, PIN, or a secret token delivered via email or text message. </p>\n<h2 id=\"benefits-of-identity-and-access-management\" style=\"position:relative;\"><a href=\"#benefits-of-identity-and-access-management\" aria-label=\"benefits of identity and access management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Identity and Access Management</h2>\n<h3 id=\"it-reduces-security-risk\" style=\"position:relative;\"><a href=\"#it-reduces-security-risk\" aria-label=\"it reduces security risk permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>It reduces security risk.</h3>\n<p>Organizations can use identity and access management solutions to detect unauthorized access privileges, validations, or policy violations under a single system. You can also ensure that your organization meets necessary regulatory and audit requirements.</p>\n<h3 id=\"it-is-easy-to-use\" style=\"position:relative;\"><a href=\"#it-is-easy-to-use\" aria-label=\"it is easy to use permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>It is easy to use.</h3>\n<p>With IAM, it is easier to provision and manage access to end-users and system administrators. It also simplifies and secures the process of <a href=\"https://www.loginradius.com/authentication/\">registration and authentication</a>. </p>\n<h3 id=\"it-reduces-it-costs\" style=\"position:relative;\"><a href=\"#it-reduces-it-costs\" aria-label=\"it reduces it costs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>It reduces IT costs.</h3>\n<p>Using IAM can lower operation costs to quite an extent. For example, with federated identity, organizations can integrate third-party services into their system. Similarly, with cloud IAM organizations need not buy or maintain on-premise infrastructure.</p>\n<h3 id=\"it-improves-user-experience\" style=\"position:relative;\"><a href=\"#it-improves-user-experience\" aria-label=\"it improves user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>It improves user experience.</h3>\n<p>SSO removes the need for users to recall and enter multiple passwords. Gone are the days of trying to remember dozens of password variations. With SSO, every time consumers switch to a new connected device, they can enjoy automatic logins.</p>\n<h3 id=\"it-enhances-security-profiles\" style=\"position:relative;\"><a href=\"#it-enhances-security-profiles\" aria-label=\"it enhances security profiles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>It enhances security profiles.</h3>\n<p>Modern IAM systems use <a href=\"https://www.loginradius.com/single-sign-on/\">SSO</a> with additional levels of protection. A majority of these systems use Security Assertion Markup Language (SAML) 2.0 that can authenticate and authorize users based on the access level indicated in their directory profiles. </p>\n<p>A few other benefits of identity and access management system include:</p>\n<ul>\n<li>It enables secure, low-friction access through seamless authentication to different web properties. </li>\n<li>It demonstrates an extreme degree of scalability by anticipating potential surges and dips in consumer registrations and activities. </li>\n<li>It provides a unified experience by utilizing consolidated reports and analytics of user demographics, social registration and login data, revenue activities, and more. </li>\n<li>It adheres to privacy regulations for protecting data in transit and at rest.</li>\n<li>It keeps user data protected at all times by developing flexible schemas to get the most out of a system. </li>\n</ul>\n<h2 id=\"how-iam-and-compliance-are-related-to-each-other\" style=\"position:relative;\"><a href=\"#how-iam-and-compliance-are-related-to-each-other\" aria-label=\"how iam and compliance are related to each other permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How IAM and Compliance Are Related to Each Other</h2>\n<p>Consumer data centricity is crucial to the success of any business today. Organizations should securely collect, manage, analyze, and protect their data. However, the method of capturing and safely storing user data can be difficult. </p>\n<p>Many companies keep hundreds of separate data silos to get the job done. Fortunately, an identity and access management solution can help organizations break down these silos and store data into a unified database that provides a consistent view of the client across the business ecosystem. </p>\n<p>Consumers want more control over their data at the same time. They want the nod on how brands use their data, they also wish to know precisely what they agreed to while using the product or service. An IAM solution offers trust and transparency to consumers by helping organizations ensure compliance with local and global regulations. </p>\n<p>Speaking of regulations, many are industry-specific, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare organizations. Others apply more broadly, such as the Payment Card Industry Data Security Standard (PCI DSS) that must be adopted by any organization that collects debit and credit card information.</p>\n<p>The most disruptive regulations in recent years are the ones related to ensuring consumer privacy, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). </p>\n<p>The following are a few of the <a href=\"https://www.loginradius.com/blog/identity/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">major security assurance programs</a> identity solutions adhere to: </p>\n<ul>\n<li>OpenID - End-user identity verification supported by OAuth 2.0 protocol</li>\n<li>PCI DSS - Administered standard for payment transactions</li>\n<li>ISO 27001:2013 - Information security management system</li>\n<li>ISO 27017:2015 - Information security for cloud services</li>\n<li>AICPA SOC 2 (Type II) - System-level controls for Trust Services Criteria - security, availability, process integrity, confidentiality, and privacy </li>\n<li>ISAE 3000 - International attestation standard for assurance over non-financial information </li>\n<li>NIST Cybersecurity Framework - Standardized security framework to manage and reduce cybersecurity risk.  </li>\n<li>CSA CCM Level 1, Level 2 - STAR Self-Assessment, STAR Certification, STAR Attestation, and C-STAR Assessment.</li>\n<li>CIS Critical Security Controls Global standards for internet security</li>\n<li>US Privacy Shield Complaint resolution for EEA citizens</li>\n<li>ISO/IEC 27018:2019 - PII Protection</li>\n</ul>\n<h2 id=\"the-future-of-iam-in-the-post-covid-digital-era\" style=\"position:relative;\"><a href=\"#the-future-of-iam-in-the-post-covid-digital-era\" aria-label=\"the future of iam in the post covid digital era permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Future of IAM in the Post-COVID Digital Era</h2>\n<p>We live in the age of ever-growing cybersecurity threats. Organizations cannot afford to undermine the value of managing identities inside or across their systems. An IAM solution ensures that all identities are tracked, updated, and maintained throughout the users' lifecycle. </p>\n<p>Although 2020 has been a year-long roller coaster with the pandemic hitting hard, there's one thing that happened for sure. Digital transformation has progressed at an unparalleled pace, and identity and access management (IAM) is a major part of that evolution. </p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-future-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"future-of-digital-identity\"\n        title=\"future-of-digital-identity\"\n        src=\"/static/14504a482f49a68fd66cdbf009cda5de/e5715/future-of-digital-identity.png\"\n        srcset=\"/static/14504a482f49a68fd66cdbf009cda5de/a6d36/future-of-digital-identity.png 650w,\n/static/14504a482f49a68fd66cdbf009cda5de/e5715/future-of-digital-identity.png 768w,\n/static/14504a482f49a68fd66cdbf009cda5de/63ff0/future-of-digital-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Let's look at some of the most changing developments in the IAM market anticipated in 2021.</p>\n<h3 id=\"user-managed-access-uma-will-reign-supreme-in-2021\" style=\"position:relative;\"><a href=\"#user-managed-access-uma-will-reign-supreme-in-2021\" aria-label=\"user managed access uma will reign supreme in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User managed access (UMA) will reign supreme in 2021.</h3>\n<p>With more and more services migrating to the digital front, users are expecting amazing experiences online. To keep up with these demands, as more organisations continue to adopt the delegation model, digital interactions will need to include more than one identity. </p>\n<p>In 2021, conventional authentication and MFA controls will take over solutions that include a central management framework for organizing digital resources that reside in many places. </p>\n<h3 id=\"2021-will-be-the-year-of-zero-login-methods\" style=\"position:relative;\"><a href=\"#2021-will-be-the-year-of-zero-login-methods\" aria-label=\"2021 will be the year of zero login methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2021 will be the year of zero login methods.</h3>\n<p>Now that passwordless authentication (such as biometrics)  has witnessed abundant adoption, we can see a shift to a \"zero login\" mechanism that reduces user friction. </p>\n<p>Since, there will be no credentials to remember, MFA will take the backseat. Zero login will allow consumers to use variables such as fingerprints, keyboard typing habits, the way the phone/device is kept, and other markers to verify identification in the background while the user enjoys a frictionless experience. </p>\n<h3 id=\"it-will-infuse-access-governance-to-protect-workforce-cybersecurity\" style=\"position:relative;\"><a href=\"#it-will-infuse-access-governance-to-protect-workforce-cybersecurity\" aria-label=\"it will infuse access governance to protect workforce cybersecurity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IT will infuse access governance to protect workforce cybersecurity.</h3>\n<p>The threat landscape is rapidly changing, courtesy, the increasing pressure on conventional identity governance and administration (IGA) solutions. In addition to rising compliance risks, business IT environments are becoming more complex every year. </p>\n<p>In 2020, we will witness AI being increasingly employed to enable an autonomous approach to identity. AI-infused authentication and authorization solutions will be integrated with existing IGA solutions. </p>\n<p>And when that happens, it will be easier for enterprises to capture and analyze all identity data and provide insight into various risk levels. </p>\n<h2 id=\"how-loginradius-iam-solution-can-accommodate-your-enterprise-requirements\" style=\"position:relative;\"><a href=\"#how-loginradius-iam-solution-can-accommodate-your-enterprise-requirements\" aria-label=\"how loginradius iam solution can accommodate your enterprise requirements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius IAM Solution Can Accommodate Your Enterprise Requirements</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"What-is-IAM-4\"\n        title=\"What-is-IAM-4\"\n        src=\"/static/44222277916a3d82969e19a03189154d/e5715/What-is-IAM-4.png\"\n        srcset=\"/static/44222277916a3d82969e19a03189154d/a6d36/What-is-IAM-4.png 650w,\n/static/44222277916a3d82969e19a03189154d/e5715/What-is-IAM-4.png 768w,\n/static/44222277916a3d82969e19a03189154d/d0143/What-is-IAM-4.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>With the <a href=\"https://www.loginradius.com/\">right IAM provider</a>, organizations can enjoy enormous time-saving, efficiency-building, and security-boosting benefits, irrespective of where they operate. </p>\n<p>LoginRadius' extensive experience in the identity and access management market will help you build the right process for your enterprise. </p>\n<p>LoginRadius offers you the following tools to help you build secure, seamless experiences for your consumers and workforce.</p>\n<ul>\n<li>\n<p><strong>Single Sign-On</strong>: LoginRadius SSO provides your users with a single identity to access all of your web assets, mobile applications, and third-party systems. </p>\n<p>As your users navigate from one property to the next, you can recognize who they are, and document and access their activities in a central profile.</p>\n</li>\n<li>\n<p><strong>Multi-factor authentication</strong>: MFA verifies identities by adding additional layers of security to the authentication process. By requiring at least an extra step to verify identities, MFA ensures that the right consumer has the right access to your network. </p>\n<p>It lifts off the burden of stolen or lost passwords on consumers and makes it harder for criminals to get into their accounts. </p>\n<p>Additional forms of MFA by LoginRadius include security questions, biometric verification, automated phone calls, Google Authenticator, and social login. </p>\n</li>\n<li>\n<p><strong>Federated SSO</strong>: <a href=\"https://www.loginradius.com/federated-sso/\">Federated SSO</a> allows users to gain access to multiple organizations' web applications using one digital identity. </p>\n<p>LoginRadius supports standard SSO protocols like SAML, JWT, OAuth 2.0, OpenID Connect (OIDC), and Web Services Federation. The IAM platform offers a simple dashboard to manage all configurations required for these protocols.</p>\n</li>\n<li><strong>User management</strong>: LoginRadius offers complete user management features, including: </li>\n<li>Authorization: To validate the access rights of users.</li>\n<li>Provisioning: To create user accounts.</li>\n<li>Deprovisioning: To block, or delete user accounts.</li>\n<li>Account Management: To disable user accounts, and grant, or restrict access.</li>\n<li>Password Management: To trigger the password reset option for user accounts.</li>\n<li><strong>Compliance with privacy regulations</strong>: The LoginRadius Identity Platform handles consent management by ensuring continued compliance with all major privacy regulations, including the GDPR of the EU and the CCPA of California. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Powerful identity and access management solutions offer the right tools to ensure users can engage with enterprises at any time, from any device, securely. Organizations will need to rethink their business and operating models. </p>\n<p>There is a huge demand to invest in new digital methods of communication.  And prioritizing <a href=\"https://www.loginradius.com/blog/identity/2020/06/consumer-data-privacy-security/\">digital security</a> will go a long way. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 29, 2021","updated_date":null,"description":"Identity and Access Management in cybersecurity refers to the security framework and disciplines for managing digital identities. It regulates the responsibilities and access privileges associated with individual consumers and the conditions in which such privileges are allowed or denied.","title":"What is Identity and Access Management (IAM)?","tags":["customer-experience"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/4d1f2ad957c266f6330e9c6f942cff34/c3e3a/What-is-IAM-Cover.jpg","srcSet":"/static/4d1f2ad957c266f6330e9c6f942cff34/f836f/What-is-IAM-Cover.jpg 200w,\n/static/4d1f2ad957c266f6330e9c6f942cff34/2244e/What-is-IAM-Cover.jpg 400w,\n/static/4d1f2ad957c266f6330e9c6f942cff34/c3e3a/What-is-IAM-Cover.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Many of us have to choose between Merge and Rebase as a Developer. Here I'll explain what merge and rebase are, why you should use them, and…","fields":{"slug":"/engineering/git-rebase-vs-git-merge/"},"html":"<p>Many of us have to choose between Merge and Rebase as a Developer. Here I'll explain what merge and rebase are, why you should use them, and how to do so.</p>\n<p>The same function is fulfilled by Git Merge and Git Rebase. They are built to incorporate adjustments into one from different divisions. Although the end objective is the same, it is done in various ways by those two approaches, and it is useful to know the difference as you become a better developer of software.</p>\n<h2 id=\"what-are-git-merge-and-git-rebase\" style=\"position:relative;\"><a href=\"#what-are-git-merge-and-git-rebase\" aria-label=\"what are git merge and git rebase permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are Git Merge and Git Rebase?</h2>\n<p><em>Git Merge and Git Rebase are both used to combine the changes of branches but in a distinct way.</em></p>\n<p><strong>Git Merge</strong> - For developers using version control systems, merging is a prevalent method. Merging takes the contents of a source branch and combines them with a target branch, to be more precise. Only the <a href=\"https://medium.com/@loginradius/how-to-fetch-a-remote-branch-using-git-5c0f6d28264d\">target branch is updated</a> in this process. The history of the source branch remains similar.</p>\n<p><strong>Git Rebase</strong> - Another way to integrate modifications from one branch to another is by Rebase. Rebase compresses all the modifications into a single patch. The patch is then inserted into the target branch.</p>\n<h3 id=\"git-merge\" style=\"position:relative;\"><a href=\"#git-merge\" aria-label=\"git merge permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Git Merge</h3>\n<p>Combine multiple branch histories together.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  A---B---C feature</span>\n<span class=\"grvsc-line\"> /</span>\n<span class=\"grvsc-line\">D---E---F---G master </span></code></pre>\n<p>if we are merging feature and master branch, then it would be</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  A---B---C feature</span>\n<span class=\"grvsc-line\"> /               \\</span>\n<span class=\"grvsc-line\">D---E---F---G---H master</span></code></pre>\n<p><strong>Commands</strong> for merging feature and master branch</p>\n<p><code>git checkout feature</code>\n<code>git merge master</code></p>\n<p><strong>Note:</strong></p>\n<ul>\n<li>merge executes only one new commit</li>\n<li>if the feature branch has a completely different development </li>\n<li>If you get conflict while merging\n<code>resolve conflicts</code>\n<code>git add (changes)</code>\n<code>git merge --continue</code></li>\n</ul>\n<h3 id=\"git-rebase\" style=\"position:relative;\"><a href=\"#git-rebase\" aria-label=\"git rebase permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Git Rebase</h3>\n<p>Reapply commits on top of the base branch</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">   A---B---C feature</span>\n<span class=\"grvsc-line\"> /</span>\n<span class=\"grvsc-line\">D---E---F---G master</span></code></pre>\n<p>if we are rebasing the feature branch onto the master branch, then it would be</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">\t   A&#39;--B&#39;--C&#39; feature</span>\n<span class=\"grvsc-line\">\t /</span>\n<span class=\"grvsc-line\">\tD---E---F---G master</span></code></pre>\n<p><strong>Commands</strong> for merging feature and master branch</p>\n<p><code>git checkout feature</code>\n<code>git rebase master</code></p>\n<p><strong>Note:</strong> </p>\n<ul>\n<li>rebase typically executes multiple (number of commits in current branch).</li>\n<li>If you get conflict while rebasing\n<code>resolve conflicts</code>\n<code>git add (changes)</code>\n<code>git rebase --continue</code></li>\n</ul>\n<h2 id=\"when-to-use-git-rebase-or-git-merge\" style=\"position:relative;\"><a href=\"#when-to-use-git-rebase-or-git-merge\" aria-label=\"when to use git rebase or git merge permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>When to use Git Rebase or Git Merge</h2>\n<h3 id=\"choose-merge\" style=\"position:relative;\"><a href=\"#choose-merge\" aria-label=\"choose merge permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Choose Merge</h3>\n<ul>\n<li>whenever we want to add changes of a feature branch back into the base branch.</li>\n<li>if you want to keep the same history rather than rewrite it.</li>\n<li>if you want to revert the changes quickly</li>\n</ul>\n<h3 id=\"choose-rebase\" style=\"position:relative;\"><a href=\"#choose-rebase\" aria-label=\"choose rebase permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Choose Rebase</h3>\n<ul>\n<li>whenever we want to add changes of a base branch back to a feature branch.</li>\n<li>squash multiple commits</li>\n<li>reiterate each commit and update the changes</li>\n<li>reverting rebase would be very difficult</li>\n</ul>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>I hope some perspectives on Git merge and Git rebase have been provided by this description. The strategy of merge vs rebase is still debatable. But maybe this article will help to dispel your doubts and encourage you to take an approach that works for your team. Here are few articles posted by me that will help you in learning few more things in Git:</p>\n<ol>\n<li><a href=\"https://www.loginradius.com/blog/engineering/git-cherry-pick/\">How to use Git Cherry Pick</a></li>\n<li><a href=\"https://www.loginradius.com/blog/engineering/git-pull-force/\">How to Perform a Git Force Pull</a></li>\n</ol>\n<p>Do comment on the subjects that you would like me to write about in the coming weeks :)</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"January 27, 2021","updated_date":null,"description":"In this post, I will give you a walkthrough on merge and rebase, comparing Git rebase vs. Git merge to find out the similarities and differences.","title":"Git merge vs. Git Rebase: What's the difference?","tags":["GIT"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/84d7585291c78a887f774814c64479d6/ee604/merge.png","srcSet":"/static/84d7585291c78a887f774814c64479d6/69585/merge.png 200w,\n/static/84d7585291c78a887f774814c64479d6/497c6/merge.png 400w,\n/static/84d7585291c78a887f774814c64479d6/ee604/merge.png 800w,\n/static/84d7585291c78a887f774814c64479d6/f3583/merge.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Abhimanyu Singh Rathore","github":"abhir9","avatar":null}}}},{"node":{"excerpt":"An Identity Broker is an intermediary service that connects multiple service providers (SP) with different identity providers (IdP). It is…","fields":{"slug":"/identity/loginradius-identity-brokering/"},"html":"<p>An Identity Broker is an intermediary service that connects multiple service providers (SP) with different identity providers (IdP). It is responsible for developing trustworthy relationships with external IdPs and utilizing their respective identities to gain access to the service providers' internal services. </p>\n<p>Businesses can link an existing account with one or more identities from various IdPs, or even create new identities based on the information obtained from them. </p>\n<p>Using LoginRadius' Identity Brokering, businesses do not require consumers to provide their credentials to authenticate. Instead, LoginRadius acts as an identity broker service between the Identity and Service Providers and enables the authentication process between the two using the <a href=\"https://www.loginradius.com/protocols/\">industry-standard protocols</a>.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>With LoginRadius Identity Brokering service, businesses can enjoy a seamless authentication experience and delegate all single sign-on requirements to a click of a button. A few other  benefits include:</p>\n<ul>\n<li><strong>Better flexibility</strong>: Businesses can easily configure IdPs of their choice, including Google, Facebook, Linked In, and even custom ones. </li>\n<li><strong>Eliminate complexity</strong>: Businesses can delegate their <a href=\"https://www.loginradius.com/single-sign-on/\">SSO requirements to LoginRadius</a>, thereby eliminating the need to understand and implement complex SSO protocols like SAML, OpenID, JWT, and OAuth. </li>\n<li><strong>Verified digital identity</strong>: Businesses need not worry about verifying the consumers who authenticate themselves using configured IdPs. Such identities are already verified with respective IdPs.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/identity-brokering-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"identity-brokering\"\n        title=\"identity-brokering\"\n        src=\"/static/e7cdf22e3802f3103c0b0bc9a55a67bf/e5715/identity-brokering.png\"\n        srcset=\"/static/e7cdf22e3802f3103c0b0bc9a55a67bf/a6d36/identity-brokering.png 650w,\n/static/e7cdf22e3802f3103c0b0bc9a55a67bf/e5715/identity-brokering.png 768w,\n/static/e7cdf22e3802f3103c0b0bc9a55a67bf/63ff0/identity-brokering.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"key-features-offered-by-loginradius\" style=\"position:relative;\"><a href=\"#key-features-offered-by-loginradius\" aria-label=\"key features offered by loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features Offered by LoginRadius</h2>\n<ul>\n<li><strong>Configurable IdP and SP</strong>: Businesses can choose from the list of pre-configured IdPs or configure a custom IdP by choosing the supported protocol and providing the required details in the LoginRadius Admin Console. </li>\n<li><strong>Multiple protocol support</strong>: LoginRadius supports multiple SSO protocols like SAML, JWT, OAuth for identity brokering. Businesses can choose and configure their apps with LoginRadius for any of these protocols.</li>\n<li><strong>SP and IdP Initiated SSO</strong>: LoginRadius supports both SP and IdP initiated SSO flows with the SAML protocol. SP initiated is where the consumer lands on the service provider and redirects the identity provider for authentication. From IdP, the consumer is redirected back to the SP with an authentication response. IdP initiated is where the consumer lands on the identity provider and then redirects to the service provider with an authentication response.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>With Identity Brokering, businesses can skip the use of complex protocols and enjoy the luxury of simply calling an HTTPS endpoint—a much easier option to implement than understanding standards SSO protocols.</p>\n<p>Moreover, businesses acquire flexibility and verified digital identities, whereas consumers gain a <a href=\"https://www.loginradius.com/authentication/\">seamless authentication experience</a>. A win-win for both parties! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 27, 2021","updated_date":null,"description":"Using Identity Brokering, businesses do not require consumers to provide their credentials to authenticate. Instead, LoginRadius acts as an identity broker service between the Identity and Service Providers and enables the authentication process between the two.","title":"Announcement - LoginRadius Announces Identity Brokering To Establish Trust Between Identity and Service Providers","tags":["identity management","authentication","sso","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/dc179b4ebabd66c4d394331e1d812be9/6051d/loginradius-identity-brokering.png","srcSet":"/static/dc179b4ebabd66c4d394331e1d812be9/69585/loginradius-identity-brokering.png 200w,\n/static/dc179b4ebabd66c4d394331e1d812be9/497c6/loginradius-identity-brokering.png 400w,\n/static/dc179b4ebabd66c4d394331e1d812be9/6051d/loginradius-identity-brokering.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Onboarding is the process of helping new users understand and experience how your product is intending to help them in achieving their goals…","fields":{"slug":"/identity/user-onboarding-revamp-application/"},"html":"<p>Onboarding is the process of helping new users understand and experience how your product is intending to help them in achieving their goals. In general, you confirm to your consumers that your product is the best solution to their problem, which inspired them to find your product.</p>\n<p>Meanwhile, the onboarding process is your user's first impression about your application and, if correctly designed, it can be successfully adopted. </p>\n<p>When the user launches your app for the first time, the onboarding process reinforces your application's value and offers instructions that focus on potential features and benefits. </p>\n<h2 id=\"5-ways-how-user-onboarding-can-upgrade-your-application\" style=\"position:relative;\"><a href=\"#5-ways-how-user-onboarding-can-upgrade-your-application\" aria-label=\"5 ways how user onboarding can upgrade your application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Ways How User Onboarding Can Upgrade Your Application</h2>\n<ol>\n<li>All consumers are different; if you are analyzing your consumer through the same script, you might be missing some information about their needs, which might lead to missed opportunities throughout or after the onboarding process.</li>\n<li>The onboarding process cannot be explained in one minute. It should be clear and precise. If you cannot explain the process within a minute, then you cannot expect your consumer to follow the whole process.</li>\n<li>If you do not have an internal transition process, you cannot ask your consumer to trust the process to onboard correctly and manage them efficiently. The consumer should know that whatever is discussed and agreed upon during the sales process is documented. The consumer success team has already been briefed and should pick up and start the onboarding process.</li>\n<li>Onboarding involves people, products, and processes. It is more likely that any one of these components will evolve within the year. They might evolve simultaneously or independently. However, the main criteria is they might change if you do not upgrade your onboarding process according to their convenience. It's time you start incorporating these developments according to the changes.</li>\n<li>You need to know the time frame that it takes to onboard your consumer. So, if you don't know it yet, consider it as a warning sign. If you have a clear number, it is easy to measure whether your process is working or not and gauge where you need to make alterations.</li>\n</ol>\n<h2 id=\"what-are-the-primary-elements-of-an-ideal-user-onboarding-process\" style=\"position:relative;\"><a href=\"#what-are-the-primary-elements-of-an-ideal-user-onboarding-process\" aria-label=\"what are the primary elements of an ideal user onboarding process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Primary Elements of an Ideal User Onboarding Process</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ideal-user-onboarding-process\"\n        title=\"ideal-user-onboarding-process\"\n        src=\"/static/6801bfc7e5220009cf813c3d92914973/e5715/ideal-user-onboarding-process.png\"\n        srcset=\"/static/6801bfc7e5220009cf813c3d92914973/a6d36/ideal-user-onboarding-process.png 650w,\n/static/6801bfc7e5220009cf813c3d92914973/e5715/ideal-user-onboarding-process.png 768w,\n/static/6801bfc7e5220009cf813c3d92914973/2bef9/ideal-user-onboarding-process.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The onboarding process should be a mix of inspiration, education, timely and actionable insights. Each product is unique, and how you are going to handle the onboarding will help you to know about your users, their needs, and how your product is going to stay with them.</p>\n<p>So, here are the different <a href=\"https://www.loginradius.com/blog/fuel/2021/01/user-onboarding-tools/\">user onboarding tools</a> and resources that you can use to revamp your application. </p>\n<ul>\n<li>Personalized welcome.</li>\n</ul>\n<p>A greeting is one of the best ways to interact with new users during offline engagements; the same applies to online ones. Welcome your consumer by offering bonus materials such as additional integration, e-books, which will help them get started. </p>\n<p>Also, you can personalize the welcome message by using the consumer's name or their company. It can act as a lovely gesture and will show users that you value their business. </p>\n<ul>\n<li>Demonstrate the product.</li>\n</ul>\n<p>You can demonstrate key functions and explain to users how they can accomplish a particular task. If you do not highlight your product's purpose, then the user might fail to see the benefit of your product. </p>\n<p>Besides, consumers' success depends on using the product correctly; if they find it difficult, they might be frustrated with your product.</p>\n<ul>\n<li>Set specific goals.</li>\n</ul>\n<p>One of the major steps is setting specific goals for active users. Once you send your goals, create logical steps to reach the desired outcome of your product. </p>\n<p>Also, adding a checklist within the app can help your consumers stay on track and motivated.</p>\n<ul>\n<li>Offer consumer service.</li>\n</ul>\n<p>You should know that offering <a href=\"https://www.loginradius.com/customer-experience-solutions/\">exceptional consumer service</a> is imperative for a business to succeed. If your consumer service is good, your consumer will come back to you for more. You can also add a live chat feature or add phone assistance and email assistance to your application. </p>\n<ul>\n<li>Produce quality content.</li>\n</ul>\n<p>Add more value to your application by producing quality content that will help consumers solve their problems. When you provide advice that greatly benefits them, you can become your client’s trusted advisor. And with added trust comes the prospect of earning more sales.</p>\n<ul>\n<li>The Aha! moment.</li>\n</ul>\n<p>This happens when your customer truly appreciates the value of your software. Complex <a href=\"/blog/growth/sign-up-tips-conversion-rate/\">sign-up forms</a> and painful login processes can create a tough barrier between the new user and the ‘Aha Moment.’ </p>\n<p>The main goal of onboarding is to show new users the key features and guide users towards the ‘Aha Moment,’ which is called the moment of delight, where the value of the product becomes instantly clear.</p>\n<p><a href=\"https://www.loginradius.com/resource/ciam-101/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ciam-101\"\n        title=\"ciam-101\"\n        src=\"/static/07ffa60c01ac470ddc137679ce2cc238/e5715/ciam-101.png\"\n        srcset=\"/static/07ffa60c01ac470ddc137679ce2cc238/a6d36/ciam-101.png 650w,\n/static/07ffa60c01ac470ddc137679ce2cc238/e5715/ciam-101.png 768w,\n/static/07ffa60c01ac470ddc137679ce2cc238/63ff0/ciam-101.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li>In-app messaging and ‘empty states’.</li>\n</ul>\n<p>One of the most powerful tools for engaging users completely is by using the in-app message function. These touchpoints are highly effective when introducing new updates and features or conveying some important information to your users. </p>\n<p>Empty space is how your product or app looks when you first use it before it is filled with useful content. The empty state design should prompt the user to fill content or add sample content illustrating the app’s value, thereby helping the user feel more confident to take the next step.</p>\n<ul>\n<li>Set up automated alerts.</li>\n</ul>\n<p>If you are looking for people who have not completed the onboarding process, you can use alerts to remind them to finish it. You can also set up automated alerts that will push people to complete it.</p>\n<ul>\n<li>Onboard your current users to new features.</li>\n</ul>\n<p>The onboarding process is not just for new users but for current users to receive updates and on new features.</p>\n<ul>\n<li>Offer multiple channels of communication.</li>\n</ul>\n<p>To increase user interaction and retention, use multiple channels for communication. You can also use outside channels like text messages, live chat, and automated email sequences to aid the onboarding process along with in-app messaging.</p>\n<h2 id=\"how-loginradius-helps-businesses-to-enhance-a-great-user-onboarding-experience\" style=\"position:relative;\"><a href=\"#how-loginradius-helps-businesses-to-enhance-a-great-user-onboarding-experience\" aria-label=\"how loginradius helps businesses to enhance a great user onboarding experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Helps Businesses to Enhance a Great User Onboarding Experience</h2>\n<p>Data breaches can cost companies loss of revenue and fines. To earn your consumers' trust and protect your brand, you need to take up advanced data security measures to keep the threats at bay. </p>\n<p>LoginRadius protects the identity of customers through multi-level security systems with <a href=\"https://www.loginradius.com/press/loginradius-is-the-only-identity-platform-to-deliver-100-system-availability-in-2018/\">99.99% availability</a>. To help businesses deliver a dedicated consumer experience and win customer trust, the platform offers the following: </p>\n<ul>\n<li><strong>Design an ideal consumer journey</strong>. From the first step of onboarding to the thousandth login, the <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">CIAM platform</a> creates a welcoming and intelligent process.</li>\n<li><strong>Offer localization</strong>. Businesses can customize their forms, email messages, and texts for the worldwide market according to the local language. </li>\n<li><strong>Tailor-make interfaces</strong>. Businesses can choose their custom fields and design their own registration, login, and forgotten password forms. </li>\n<li><strong>Use an email workflow that actually works</strong>. LoginRadius provides customizable templates and sequences to get into the consumers' inbox and manage the login process. </li>\n<li><strong>Unify the login process with single sign-on</strong>. Businesses can connect their websites, mobile apps, and third-party dependencies so consumers can interact with <a href=\"https://www.loginradius.com/blog/identity/2019/05/what-is-single-sign-on/\">a single identity</a>.</li>\n</ul>\n<p>LoginRadius's identity platform can streamline the login process and also protect customer accounts by complying with global data privacy regulations during the onboarding process.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>You know by now how user onboarding software can revamp your application. But, onboarding is not an easy process or just about offering new users a warm welcome. There's more to it. And that includes helping <a href=\"https://www.loginradius.com/blog/fuel/2019/11/improve-customer-experience-ecommerce/\">new users experience the value of your product</a> and retaining current users. </p>\n<p>It takes time to build an onboarding process and a lot of work to update it. You cannot change everything immediately, but you can make small changes over a period of time to smoothen the onboarding process.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 27, 2021","updated_date":null,"description":"The onboarding process should be a mix of inspiration, education, timely and actionable insights. Each product is unique, and how you are going to handle the onboarding will help you to know about your users, their needs, and how your product is going to stay with them.","title":"5 Ways User Onboarding Software Can Revamp Your Application","tags":["customer-experience"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/7692e12cb51f6149a100dde9964f6227/9a31d/user-onboarding-application.jpg","srcSet":"/static/7692e12cb51f6149a100dde9964f6227/f836f/user-onboarding-application.jpg 200w,\n/static/7692e12cb51f6149a100dde9964f6227/2244e/user-onboarding-application.jpg 400w,\n/static/7692e12cb51f6149a100dde9964f6227/9a31d/user-onboarding-application.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"As the world becomes increasingly digitized, individuals, organizations, and government agencies are producing staggering quantities of data…","fields":{"slug":"/growth/360-degree-growth-data-driven/"},"html":"<p>As the world becomes increasingly digitized, individuals, organizations, and government agencies are producing staggering quantities of data every day. In fact, <a href=\"https://www.domo.com/solution/data-never-sleeps-6\">according to a report</a>, 1.7MB of data is created every second for every person on earth.  </p>\n<p>But are companies leveraging such massive amounts of data for competitive advantage? The response, for the most part, is, 'no.'</p>\n<p>This shortfall in capability can seriously limit the growth of an organization or even undermine its overall performance.</p>\n<p>A data-driven approach can save the day. </p>\n<p>Data plays a pivotal role in enabling long-term and sustainable growth. This means, if you want to take quick actions with minimum risk, data is your only savior. </p>\n<p>A data-driven approach is adopting strategic actions based on analysis and interpretation of data rather than observation. So, how do you identify and unlock a 360-degree growth of your data? </p>\n<p>Let's find out. </p>\n<h3 id=\"prioritize-and-focus\" style=\"position:relative;\"><a href=\"#prioritize-and-focus\" aria-label=\"prioritize and focus permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Prioritize and focus.</strong></h3>\n<p>The first step is to understand and monitor the right metrics, also known as the <a href=\"https://www.loginradius.com/blog/fuel/2021/01/north-star-metrics-nsm/\">North Star Metics</a>. To qualify as a North Star, a metric must cover three primary parameters: </p>\n<ul>\n<li>Your data should help generate revenue. </li>\n<li>Your data should reflect your consumer value.</li>\n<li>Your data should help measure progress. </li>\n</ul>\n<p>Take note if you aren't measuring the right metric yet. </p>\n<h3 id=\"measure-relevant-data\" style=\"position:relative;\"><a href=\"#measure-relevant-data\" aria-label=\"measure relevant data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Measure relevant data.</h3>\n<p>The second step is to analyze the right set of data, period, and context. Therefore, once you identify your data source, start capturing it. Set the time period and segregate the data into relevant buckets.</p>\n<p>Though this step may seem simple, you may end up with insights that are not even relevant if you collect data in the wrong frame. It won't be easy to make the right choices at the right time. </p>\n<p>Therefore, remove all useless data before you start analyzing.</p>\n<p>Let's understand with an example that a sales team wants to accelerate their revenue growth. (P.S. Revenue growth is the North Star metrics here). So, how can they achieve that?</p>\n<ul>\n<li>By implementing strategies to add new businesses.</li>\n<li>By increasing their consumer base.</li>\n<li>By reducing revenue leakages.</li>\n</ul>\n<p>Start collecting data for adding new business and review where targets are most likely to buy. Consequently, you can research data based on demographics, firmographics, economics, etc. </p>\n<p>Furthermore, to uncover key predictors of growth in existing customers and who are likely to buy add-on services, you could be capturing data of existing customers, their purchase and usage behavior, product use trends, and more. </p>\n<p>Finally, to reduce revenue leakage, you could capture data for pricing strategy or discount strategy. You could also be monitoring industry data, deal sizes, and details to analyze and maximize revenue for each deal.  </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-consumer-audit-trail\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"consumer-audit-trail\"\n        title=\"consumer-audit-trail\"\n        src=\"/static/45e84493266224aeeed90ee74a246cfb/212bf/consumer-audit-trail.jpg\"\n        srcset=\"/static/45e84493266224aeeed90ee74a246cfb/6aca1/consumer-audit-trail.jpg 650w,\n/static/45e84493266224aeeed90ee74a246cfb/212bf/consumer-audit-trail.jpg 768w,\n/static/45e84493266224aeeed90ee74a246cfb/d9f85/consumer-audit-trail.jpg 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"analyze-and-capture-insights\" style=\"position:relative;\"><a href=\"#analyze-and-capture-insights\" aria-label=\"analyze and capture insights permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Analyze and capture insights.</strong></h3>\n<p>The third step is to analyze the collected data. You can use <a href=\"https://www.loginradius.com/customer-insights/\">various tools to generate insights</a>, trends, and patterns. For example, you can add historical behavior and customer feedback for data-based insights. Next, set a strategy and plan of action based on those insights. </p>\n<h3 id=\"execution-is-key\" style=\"position:relative;\"><a href=\"#execution-is-key\" aria-label=\"execution is key permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Execution is key.</strong></h3>\n<p>So, you have received the insights and planned your actions. What about execution? Well, that's crucial too. Here's what you can do: </p>\n<ul>\n<li>Communicate your insights to all relevant stakeholders.</li>\n<li>Formulate a team for execution.</li>\n<li>Timely execute and review progress.</li>\n<li>Measure and take course correction, if required.</li>\n</ul>\n<p>Note that it is important to analyze your data in realtime and share it with all stakeholders. Also, to implement a successful data-driven approach, it is crucial that you manage, integrate, and analyze your data from one source. </p>\n<p>Research suggests that <em>only 62% of organizations implement their strategies in a timely manner after analysis.</em> Companies that use data-driven decisions make high profits and can reduce substantial costs. </p>\n<p>So, there you go —</p>\n<p>\"Leverage\" data, \"analyze,\" \"implement,\" \"measure,\" and then \"repeat success.\" </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 25, 2021","updated_date":null,"description":"In order to optimize their marketing efforts, marketers are continually searching for a better plan, and a 360 data driven approach would be crucial to unravelling the required customer insights.","title":"How to Achieve a 360-Degree Growth with Data-Driven Approach","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":0.6666666666666666,"src":"/static/f008406413124be1a8afb2ba7e498c7b/14b42/360-degree-growth-with-data-driven.jpg","srcSet":"/static/f008406413124be1a8afb2ba7e498c7b/f836f/360-degree-growth-with-data-driven.jpg 200w,\n/static/f008406413124be1a8afb2ba7e498c7b/2244e/360-degree-growth-with-data-driven.jpg 400w,\n/static/f008406413124be1a8afb2ba7e498c7b/14b42/360-degree-growth-with-data-driven.jpg 800w,\n/static/f008406413124be1a8afb2ba7e498c7b/47498/360-degree-growth-with-data-driven.jpg 1200w,\n/static/f008406413124be1a8afb2ba7e498c7b/ec6c5/360-degree-growth-with-data-driven.jpg 1280w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Shachindra Saxena","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":606,"currentPage":102,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}