{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/111","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction to Arduino and its usage Arduino is an open-source community that works on both Hardware and software development. We can say…","fields":{"slug":"/engineering/bluetooth-controlled-arduino-car-miniature/"},"html":"<h2 id=\"introduction-to-arduino-and-its-usage\" style=\"position:relative;\"><a href=\"#introduction-to-arduino-and-its-usage\" aria-label=\"introduction to arduino and its usage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction to Arduino and its usage</h2>\n<p>Arduino is an open-source community that works on both Hardware and software development. We can say that both the hardware and software help build the new segment automated devices like e.g., 3D printer, IOT based projects, and much more. </p>\n<p>The Arduino software is used to build the code for every project made using any Arduino boards; it mostly uses the C/C++ language for its coding. Once the code is ready, we have to just compile and upload it on the board to make our project work. There are many types of Arduino boards like  Arduino Uno, Arduino Nano, Arduino USB, etc. In this project, we are going to use the Arduino UNO board (Atmega 328p).</p>\n<h3 id=\"bluetooth-module-hc-05\" style=\"position:relative;\"><a href=\"#bluetooth-module-hc-05\" aria-label=\"bluetooth module hc 05 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bluetooth Module HC-05</h3>\n<p>Bluetooth HC-05 is a Bluetooth module that is mostly used in the Bluetooth based project. It is easy to operate and can be easily configured with the Arduino.</p>\n<p>It has two operating modes: Command mode and Data mode, as we can change these modes by just pressing the push button on the Bluetooth module.\nIt has Six terminals. Two terminal are Vcc and GROUND for power purpose. The other two are TXD and RXD, the transmitter and receiver; respectively, these are the terminals that send and receive signals from the Arduino board to control the device. The other two terminals are State and Key, which tells the state of the module that it is in command mode or data mode.</p>\n<h3 id=\"motor-driver-l298d\" style=\"position:relative;\"><a href=\"#motor-driver-l298d\" aria-label=\"motor driver l298d permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Motor Driver L298D</h3>\n<p>This is an IC made into a Module with a HEAT SINK embedded into it, which helps release heat whenever the L298D IC is heated. Now, this module is used to control the motors connected for the locomotion of the car; these motors work by the command prompted by the Arduino to move or rotate in a specific direction. It can control Four Gear motors at maximum; also, the speed of the motors can be handled by this IC.</p>\n<h2 id=\"objective\" style=\"position:relative;\"><a href=\"#objective\" aria-label=\"objective permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Objective</h2>\n<ul>\n<li>This project's main motive is to expand the knowledge for smart micro-controllers like Arduino, which is widely used in the latest IoT technologies.</li>\n<li>Making the use of Connectivity Modules like Bluetooth HC-05, to understand the different modes of operating and communications with the micro-controller board.</li>\n<li>To get familiar with Codes and programs used for the controlling of the Arduino Uno board.</li>\n<li>Introductory project for Every Electronics And Electrical Student, to get the working of the Arduino board and its software.</li>\n</ul>\n<h3 id=\"components-required-for-the-project\" style=\"position:relative;\"><a href=\"#components-required-for-the-project\" aria-label=\"components required for the project permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Components Required for the project:</h3>\n<ol>\n<li>Arduino UNO</li>\n<li>Bluetooth HC-05 Module</li>\n<li>Motor Driver L298</li>\n<li>Jumper Wires </li>\n<li>Gear Motors (x4)</li>\n<li>12 V battery (x3 Lithium-ion cells)</li>\n<li>LED</li>\n<li>Motor Wheels </li>\n</ol>\n<h3 id=\"pin-connections\" style=\"position:relative;\"><a href=\"#pin-connections\" aria-label=\"pin connections permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pin Connections:</h3>\n<ol>\n<li>Connect one terminal of each of two motors to the OUT1 (left side) and OUT2(left side) pins and each of the other two motors to the OUT3(right side) and OUT4(right side) of L298N motor driver.</li>\n<li>Connect the  positive wire of batteries to +12V pin and negative to the GND of L298N also +5V(of motor driver) to Vin(in analog pins)</li>\n<li>Connect the same GND of a motor driver to GND (in analog) of Arduino.</li>\n<li>Pins of HC-05 are connected to Arduino like this: GND(in analog pins) to GND; VCC(in analog) to 5V; RX to TX(in digital pins) and TX to RX(in digital pins).</li>\n<li>Connect anode and cathode of LED to Pin 9 (in digital pins) and 3.3V (in analog pins) pins, respectively.</li>\n<li>The use of the LED light is the optional parameter in this project.</li>\n</ol>\n<p>Here, I want to tell one important point that, The code that will be given should be uploaded before connection of the pins; else you will face an error in uploading the code, so, just first copy the code provided below and pasted in the Arduino software and upload it to the board before the pin connections.</p>\n<blockquote>\n<p>Software details: Arduino: 1.8.9 (Windows Store 1.8.21.0) (Windows 10), Board: \"Arduino/Genuino Uno \"</p>\n</blockquote>\n<blockquote>\n<p>The application used for Controlling the car is <code>Arduino Car</code>, which can be found on Playstore.</p>\n</blockquote>\n<h3 id=\"code-for-the-project\" style=\"position:relative;\"><a href=\"#code-for-the-project\" aria-label=\"code for the project permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CODE FOR THE PROJECT</h3>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">char t;</span>\n<span class=\"grvsc-line\"> </span>\n<span class=\"grvsc-line\">void setup() {</span>\n<span class=\"grvsc-line\">pinMode(13,OUTPUT);   //left motors forward</span>\n<span class=\"grvsc-line\">pinMode(12,OUTPUT);   //left motors reverse</span>\n<span class=\"grvsc-line\">pinMode(11,OUTPUT);   //right motors forward</span>\n<span class=\"grvsc-line\">pinMode(10,OUTPUT);   //right motors reverse</span>\n<span class=\"grvsc-line\">pinMode(9,OUTPUT);   //Led</span>\n<span class=\"grvsc-line\">Serial.begin(9600);</span>\n<span class=\"grvsc-line\"> </span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> </span>\n<span class=\"grvsc-line\">void loop() {</span>\n<span class=\"grvsc-line\">if(Serial.available()){</span>\n<span class=\"grvsc-line\">  t = Serial.read();</span>\n<span class=\"grvsc-line\">  Serial.println(t);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> </span>\n<span class=\"grvsc-line\">if(t == &#39;F&#39;){            //move forward(all motors rotate in forward direction)</span>\n<span class=\"grvsc-line\">  digitalWrite(13,HIGH);</span>\n<span class=\"grvsc-line\">  digitalWrite(11,HIGH);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> </span>\n<span class=\"grvsc-line\">else if(t == &#39;G&#39;){      //move reverse (all motors rotate in reverse direction)</span>\n<span class=\"grvsc-line\">  digitalWrite(12,HIGH);</span>\n<span class=\"grvsc-line\">  digitalWrite(10,HIGH);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> </span>\n<span class=\"grvsc-line\">else if(t == &#39;R&#39;){      //turn right (left side motors rotate in forward direction, right side motors doesn&#39;t rotate)</span>\n<span class=\"grvsc-line\">  digitalWrite(11,HIGH);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> </span>\n<span class=\"grvsc-line\">else if(t == &#39;L&#39;){      //turn left (right side motors rotate in forward direction, left side motors doesn&#39;t rotate)</span>\n<span class=\"grvsc-line\">  digitalWrite(13,HIGH);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">else if(t == &#39;M&#39;){    //turn led on or off)</span>\n<span class=\"grvsc-line\">  digitalWrite(9,HIGH);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\">else if(t == &#39;m&#39;){</span>\n<span class=\"grvsc-line\">  digitalWrite(9,LOW);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> </span>\n<span class=\"grvsc-line\">else if(t == &#39;S&#39;){      //STOP (all motors stop)</span>\n<span class=\"grvsc-line\">  digitalWrite(13,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(12,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(11,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(10,LOW);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\">else if(t == &#39;Q&#39;){</span>\n<span class=\"grvsc-line\">   digitalWrite(13,HIGH);</span>\n<span class=\"grvsc-line\">  delay(2000);</span>\n<span class=\"grvsc-line\">    digitalWrite(13,HIGH);</span>\n<span class=\"grvsc-line\">  digitalWrite(11,HIGH);</span>\n<span class=\"grvsc-line\">  delay(2000) ;</span>\n<span class=\"grvsc-line\">  digitalWrite(13,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(11,LOW);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> else if(t == &#39;E&#39;){</span>\n<span class=\"grvsc-line\">   digitalWrite(11,HIGH);</span>\n<span class=\"grvsc-line\">  delay(2000);</span>\n<span class=\"grvsc-line\">    digitalWrite(13,HIGH);</span>\n<span class=\"grvsc-line\">  digitalWrite(11,HIGH);</span>\n<span class=\"grvsc-line\">  delay(2000); </span>\n<span class=\"grvsc-line\">  digitalWrite(13,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(11,LOW);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> else if(t == &#39;Z&#39;){</span>\n<span class=\"grvsc-line\">   digitalWrite(13,HIGH);</span>\n<span class=\"grvsc-line\">  delay(2000);</span>\n<span class=\"grvsc-line\">  digitalWrite(12,HIGH);</span>\n<span class=\"grvsc-line\">  digitalWrite(10,HIGH);</span>\n<span class=\"grvsc-line\">  delay(2000) ;</span>\n<span class=\"grvsc-line\">  digitalWrite(12,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(10,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(13,LOW);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"> else if(t == &#39;C&#39;){</span>\n<span class=\"grvsc-line\">   digitalWrite(11,HIGH);</span>\n<span class=\"grvsc-line\">  delay(2000);</span>\n<span class=\"grvsc-line\">    digitalWrite(12,HIGH);</span>\n<span class=\"grvsc-line\">  digitalWrite(10,HIGH);</span>\n<span class=\"grvsc-line\">  delay(2000); </span>\n<span class=\"grvsc-line\">  digitalWrite(12,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(11,LOW);</span>\n<span class=\"grvsc-line\">  digitalWrite(10,LOW);</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"November 04, 2020","updated_date":null,"description":"In this blog, you will learn how to make a Bluetooth controlled Arduino Car.","title":"Bluetooth Controlled Arduino Car Miniature","tags":["Arduino","Bluetooth"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/8506853b30d28d4025e1c2a0ad2593a6/ee604/Arduinocar.png","srcSet":"/static/8506853b30d28d4025e1c2a0ad2593a6/69585/Arduinocar.png 200w,\n/static/8506853b30d28d4025e1c2a0ad2593a6/497c6/Arduinocar.png 400w,\n/static/8506853b30d28d4025e1c2a0ad2593a6/ee604/Arduinocar.png 800w,\n/static/8506853b30d28d4025e1c2a0ad2593a6/db955/Arduinocar.png 900w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Abhishek Potekar","github":"Madmaxcoder2612","avatar":null}}}},{"node":{"excerpt":"Amazon Web Services offers scalable, reliable, and inexpensive cloud computing services. Below are some salient features provided by AWS…","fields":{"slug":"/engineering/a-journey-with-aws/"},"html":"<p>Amazon Web Services offers scalable, reliable, and inexpensive cloud computing services. Below are some salient features provided by AWS.</p>\n<ol>\n<li>Secure cloud services platform</li>\n<li>Compute power</li>\n<li>Database storage</li>\n<li>Content delivery </li>\n<li><strong>Pay for what you use</strong></li>\n</ol>\n<p>Prerequisites:</p>\n<ul>\n<li>AWS Account</li>\n<li>Active internet connection</li>\n<li>CLI usage</li>\n</ul>\n<h2 id=\"aws-ec2elastic-compute-cloud\" style=\"position:relative;\"><a href=\"#aws-ec2elastic-compute-cloud\" aria-label=\"aws ec2elastic compute cloud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>AWS EC2(Elastic Compute Cloud)</h2>\n<p>It is the most commonly used service of AWS and catered deployment of various applications as per AMI configured before creating an EC2 Instance.\nAmazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure and resizable compute capacity in the cloud.\nIt is designed to make web-scale cloud computing easier for developers. <br>\n<strong>Here are some of the important steps while setting up new EC2 Instance-></strong> <br></p>\n<p>Choose an Amazon AMI.\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 46.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"AWS\"\n        title=\"AWS\"\n        src=\"/static/39375118427b51e5a9addb9f636f8b74/e5715/AWS_EC21.png\"\n        srcset=\"/static/39375118427b51e5a9addb9f636f8b74/a6d36/AWS_EC21.png 650w,\n/static/39375118427b51e5a9addb9f636f8b74/e5715/AWS_EC21.png 768w,\n/static/39375118427b51e5a9addb9f636f8b74/67a79/AWS_EC21.png 1408w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Choose the instance type.\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 48.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAKCAYAAAC0VX7mAAAACXBIWXMAAAsTAAALEwEAmpwYAAABrElEQVQoz5VS2Y6dMAzl/z+mUv+j6nulau703gJZIJCNkAQ4tTND3/rQSEdecxzH7iazQosesn9CzzMWv6EcF1I5sH/Cp4K4V6RccZwnruv6J7pp0hiGEdZ5aK0gpUBMO2z8IAEu/M/pxnEAg4m1UlBSkj1ilAqjkJBCYFkWWGvhvSNJHWlNPtNsR/4QApwj6T06szo8f/dYSHLLcpqabl2AWVaoyYBzfr3oWxTFLHUyLxSz4O96vD+psIKgmJpmatnueHtJGFfwUAN+DA+EDLh0NdjtbLaYPYzPTfc39gsvYSANvTCdWCnYbfsOpSewDHFrf1mOE6UeDblUVLKdD9job1kvx9GQKT6bpcU4LxFHt4aEx2sAy8VHaGplKyciTTfmjwmnetEr1pbDOsdvDNTqbAMCDdDGhK7kjHVdUUpGpgrbtuE8j4aDXlFLwUWrwn7OPUlnP7++EiINJJP/qLXFuy0l9H2PRDLGSNNyfy+1i0xI+8VFOYcPF7nPYmZEKsaHiTu+xIk3QaVKTMCkN9hmEl52GyJeo8aXbxpfv0/4+RQQtHaC1mumLfkDmiYD4QmXc7YAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"AWS\"\n        title=\"AWS\"\n        src=\"/static/2b98ce5fcfa460cd9d674eb4884f8121/e5715/AWS_EC22.png\"\n        srcset=\"/static/2b98ce5fcfa460cd9d674eb4884f8121/a6d36/AWS_EC22.png 650w,\n/static/2b98ce5fcfa460cd9d674eb4884f8121/e5715/AWS_EC22.png 768w,\n/static/2b98ce5fcfa460cd9d674eb4884f8121/133ae/AWS_EC22.png 1424w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Configure security group(It allows specific IP's that user will give permission to specific ports as per requirement.)\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 48.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"AWS\"\n        title=\"AWS\"\n        src=\"/static/58a086d6cddcc19dc4af4208b8f996a1/e5715/AWS_EC23.png\"\n        srcset=\"/static/58a086d6cddcc19dc4af4208b8f996a1/a6d36/AWS_EC23.png 650w,\n/static/58a086d6cddcc19dc4af4208b8f996a1/e5715/AWS_EC23.png 768w,\n/static/58a086d6cddcc19dc4af4208b8f996a1/afd61/AWS_EC23.png 1431w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Login to EC2 via CLI</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">$ ssh -i ec2-key.pem ec2-user@11.11.11.111</span></code></pre>\n<p>Switch to ROOT</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">sudo su</span></code></pre>\n<h2 id=\"aws-rdsrelational-database-service\" style=\"position:relative;\"><a href=\"#aws-rdsrelational-database-service\" aria-label=\"aws rdsrelational database service permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>AWS RDS(Relational Database Service)</h2>\n<p>Amazon Relational Database Service is a web service that makes it easier to set up, operate, and scale a relational database in the AWS Cloud. It provides a resizable,  cost-efficient capacity for an industry-standard relational database and manages everyday database administration tasks.\nAfter setting up RDS, you can be logged in to the local tool(SQL Developer/ MY SQL Workbench) and copy RDS's endpoint with Username/Password configured while setting RDS.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 760px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 90.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Available Databases\"\n        title=\"Available Databases\"\n        src=\"/static/d8b2d343908b287d565a18fa57154372/3c051/AWS_RDS.png\"\n        srcset=\"/static/d8b2d343908b287d565a18fa57154372/a6d36/AWS_RDS.png 650w,\n/static/d8b2d343908b287d565a18fa57154372/3c051/AWS_RDS.png 760w\"\n        sizes=\"(max-width: 760px) 100vw, 760px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"aws-elasticache\" style=\"position:relative;\"><a href=\"#aws-elasticache\" aria-label=\"aws elasticache permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>AWS ElastiCache</h2>\n<p>Amazon ElastiCache allows you to seamlessly set up, run, and scale popular open-Source compatible in-memory data stores in the cloud. This service is commonly used to avoid unnecessary calls to RDS and improve the user experience by displaying the data faster.</p>\n<p>There are two types of cluster engine supported by AWS ElastiCache</p>\n<ul>\n<li>Redis</li>\n<li>Memcached</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"AWS Elasti Cache\"\n        title=\"AWS Elasti Cache\"\n        src=\"/static/cfc6a58469afeb93ed80642ead207a62/e5715/AWS_EC.png\"\n        srcset=\"/static/cfc6a58469afeb93ed80642ead207a62/a6d36/AWS_EC.png 650w,\n/static/cfc6a58469afeb93ed80642ead207a62/e5715/AWS_EC.png 768w,\n/static/cfc6a58469afeb93ed80642ead207a62/05fb0/AWS_EC.png 1138w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Login to Redis locally via this command (First port can be anything except 6379 as it will direct AWS Redis to local Redis installed on the machine) and after first port, just paste the endpoint of Redis.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">ssh -f -i ec2-key.pem -N -L 6378:demo-redis.xxxx.xx.0001.xxxx.cache.amazonaws.com:6379 ec2-user@11.11.11.111</span></code></pre>\n<h2 id=\"aws-lex\" style=\"position:relative;\"><a href=\"#aws-lex\" aria-label=\"aws lex permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>AWS Lex</h2>\n<p>Amazon Lex provides advanced deep learning functionalities of ASR(Automatic Speech Recognition) &#x26; NLU(Natural Language Understanding). With the use of Lex, we can build chatbots that can converse using speech and text as mediums.\nThere are a few components of BOT that need to be understood to build it.</p>\n<ul>\n<li>Intent:- It is a particular goal that the user wants to achieve.</li>\n<li>Utterances:-These are spoken/typed phrases that invoke content.</li>\n<li>Slots:- Data provided by the user to fulfill the intent.</li>\n<li>Prompts:-These are queries/questions asked by the user to input the data.</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 74%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"AWS Lex\"\n        title=\"AWS Lex\"\n        src=\"/static/27f62b87be9405b2c4160aeab5222eee/e5715/AWS_Lex.png\"\n        srcset=\"/static/27f62b87be9405b2c4160aeab5222eee/a6d36/AWS_Lex.png 650w,\n/static/27f62b87be9405b2c4160aeab5222eee/e5715/AWS_Lex.png 768w,\n/static/27f62b87be9405b2c4160aeab5222eee/7e4a6/AWS_Lex.png 952w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Moreover, there are VERSIONS linked with bots, intents, and custom slots. With the help of versions, we can make changes in the dev version without any impact occurring in PROD; hence it helps to make Immutable versions of bot that is created using AWS Lex.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 69.84615384615384%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"AWS Lex Versions\"\n        title=\"AWS Lex Versions\"\n        src=\"/static/29fe85239a84f13823470cc3b162593e/e5715/AWS_LexV.png\"\n        srcset=\"/static/29fe85239a84f13823470cc3b162593e/a6d36/AWS_LexV.png 650w,\n/static/29fe85239a84f13823470cc3b162593e/e5715/AWS_LexV.png 768w,\n/static/29fe85239a84f13823470cc3b162593e/aa08e/AWS_LexV.png 967w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"aws-api-gateway\" style=\"position:relative;\"><a href=\"#aws-api-gateway\" aria-label=\"aws api gateway permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>AWS API Gateway</h2>\n<p>This AWS service is used to Create, Publish, Maintain, and Monitor secure Application Programming Interfaces(<strong>API</strong>). Moreover, it provides an easy interface for code running on AWS Lambda.\nHere are some of the pointers that explain the need for this service.</p>\n<ul>\n<li>Efficient API Development.</li>\n<li>Performance at Scale.</li>\n<li>Cost-saving at scale.</li>\n<li>Flexible Security Controls.</li>\n</ul>\n<p>This service enables us to make APIs on the go with a few clicks; also, we can use the Mocking approach to make dummy routes without any original data. In this faking data is used and bouncing back to without any activity.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAKCAYAAAC0VX7mAAAACXBIWXMAAAsTAAALEwEAmpwYAAABG0lEQVQoz42SiW6DMBBE+f+frAikBWODsQ3hnu6YJEoVaLvSiGNX4ze2k6ZpoLXBsixonUdpGnk6+OChjcFHmiLLc6SXC2qZdd7H/pu8i70khA6327Ab+oCs0DC2jc3GWhRliVIpfBUFbNvKQuFQnGc/GccJ4zhi27ZoeFU1rPN3ygBT1zCmhhLTruviwvM8v2kYRgTpJ3gp2zpkn4WY7NGoPL+i73v8txKSUSwaMKIWIr6TUKkKqqqErsf8pFvetexKHmasTkjcfT8Y2Un0WminaZJIg+z17VDsMa6Vvf9ByJ+vJxcJhY6RXxc+K84cGj4J/X51eHoPkjOxz4Snhg9VWseTpRj9TDSM9/A3QkauJDIJnXyv6/pn7G+pSwh8eghThwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"AWS API Gateway\"\n        title=\"AWS API Gateway\"\n        src=\"/static/6476a0f189d08b6bd81760c48ec0f9bb/e5715/AWS_API.png\"\n        srcset=\"/static/6476a0f189d08b6bd81760c48ec0f9bb/a6d36/AWS_API.png 650w,\n/static/6476a0f189d08b6bd81760c48ec0f9bb/e5715/AWS_API.png 768w,\n/static/6476a0f189d08b6bd81760c48ec0f9bb/1e093/AWS_API.png 1376w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"aws-dynamodb\" style=\"position:relative;\"><a href=\"#aws-dynamodb\" aria-label=\"aws dynamodb permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>AWS DynamoDB</h2>\n<p>Dynamo DB is a NO SQL database provided by Amazon Web Services. The main job of Dynamo DB is to Store &#x26; Retrieve any amount of data and serve any level requests of traffic.\nIn this, there are different terminologies as that of a regular database. Secondary Indexes is a Data Structure that contains a subset of attributes from a table.</p>\n<ul>\n<li>Partition &#x26; Sort Keys (Partition key is single primary key composed of one attribute only)</li>\n<li>\n<p>Local &#x26; Global Secondary Indexes</p>\n<ul>\n<li>Local Index: Index with same partition key as of base table but different sort key</li>\n<li>Global Index: In the global index, both the partition key and sort key can differ from that of the base table.  </li>\n</ul>\n</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 55.69230769230769%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"AWS Dynammo\"\n        title=\"AWS Dynammo\"\n        src=\"/static/092e8d1d77c1e9912f7f58f5dbb15977/e5715/AWS_Dynammo.png\"\n        srcset=\"/static/092e8d1d77c1e9912f7f58f5dbb15977/a6d36/AWS_Dynammo.png 650w,\n/static/092e8d1d77c1e9912f7f58f5dbb15977/e5715/AWS_Dynammo.png 768w,\n/static/092e8d1d77c1e9912f7f58f5dbb15977/f79fa/AWS_Dynammo.png 940w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"November 03, 2020","updated_date":null,"description":"Learn about various AWS services and how to set up in a step by step tutorial.","title":"AWS Services-Walkthrough","tags":["AWS","Serverless"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/1bc36a6b88cc1025d3852dc1ffe6eef6/ee604/aws.png","srcSet":"/static/1bc36a6b88cc1025d3852dc1ffe6eef6/69585/aws.png 200w,\n/static/1bc36a6b88cc1025d3852dc1ffe6eef6/497c6/aws.png 400w,\n/static/1bc36a6b88cc1025d3852dc1ffe6eef6/ee604/aws.png 800w,\n/static/1bc36a6b88cc1025d3852dc1ffe6eef6/db955/aws.png 900w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Nitin Gupta","github":"ng29","avatar":null}}}},{"node":{"excerpt":"Healthcare is one of the most heavily regulated sectors in existence, mostly because of the sensitivity of the collected data—such as social…","fields":{"slug":"/identity/identity-management-healthcare/"},"html":"<p>Healthcare is one of the most heavily regulated sectors in existence, mostly because of the sensitivity of the collected data—such as social security numbers, patient medical records, insurance policy details, and credit card numbers.</p>\n<p>Patients expect that their data remain confidential, and they enjoy a quality experience. This is the primary reason why modern, digital health care is based on cooperation, and the <em>opportunity is immense</em>. </p>\n<p>Employing identity management in healthcare can genuinely make all the difference. How? Let's explain with a use case. </p>\n<p>Almost every patient goes through multiple registration processes in their lives. They could be looking for specialists, booking an appointment, or getting test results. Implementing identity management in healthcare facilities can lead medical professionals to enjoy a single view of identity, reduce human error, cut down costs, <a href=\"https://www.loginradius.com/security/\">improve data security and compliance</a>—all while optimizing their organizational efficiency.</p>\n<p>We also need to understand the fact that identity and access management (IAM) solutions are more than just security tools, or they only enhance technological skill sets. They are also the drivers of emerging healthcare opportunities. </p>\n<p>First, though, we need to discuss what makes the control of healthcare identities so complicated and overwhelming. </p>\n<h2 id=\"current-security-challenges-in-the-healthcare-sector\" style=\"position:relative;\"><a href=\"#current-security-challenges-in-the-healthcare-sector\" aria-label=\"current security challenges in the healthcare sector permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Current Security Challenges in the Healthcare Sector</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Identity Management in Healthcare 1\"\n        title=\"Identity Management in Healthcare 1\"\n        src=\"/static/96194edf148b1b4fe3d279e0198a59a2/e5715/Identity-Management-in-Healthcare-1.png\"\n        srcset=\"/static/96194edf148b1b4fe3d279e0198a59a2/a6d36/Identity-Management-in-Healthcare-1.png 650w,\n/static/96194edf148b1b4fe3d279e0198a59a2/e5715/Identity-Management-in-Healthcare-1.png 768w,\n/static/96194edf148b1b4fe3d279e0198a59a2/d0143/Identity-Management-in-Healthcare-1.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Simply put, the more data compromised, the more it leads to regulatory penalties, loss of patient trust, and bad publicity. </p>\n<ul>\n<li>According to the 2020 Breach Barometer published by Protenus, more than 41 million patient records were breached in 2019.  </li>\n<li>59 percent of the respondents surveyed in Europe and the U.S. were <a href=\"https://www.rsa.com/content/dam/en/e-book/rsa-data-privacy-report.pdf\">concerned about their medical data</a> security, while 39% were worried that hackers would play foul with their digital data. </li>\n</ul>\n<p>So, why are information networks for healthcare a priority for hackers? </p>\n<p>The answers lie in the interconnected nature of modern healthcare facilities—namely that integrating so much critical data derived from a huge chunk of the population makes it a noticeable target for hackers and cybercriminals. </p>\n<p>A few other reasons include: </p>\n<h3 id=\"1-the-growing-attack-surface\" style=\"position:relative;\"><a href=\"#1-the-growing-attack-surface\" aria-label=\"1 the growing attack surface permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. The growing attack surface.</h3>\n<p>The transition from hard papers to electronic health records (EHRs) containing a host of confidential data on patients' medical history has dramatically changed the quality and reliability of patient care. However, the increase in the number of healthcare service providers has also broadened the attack surface. </p>\n<p>Governments worldwide are ensuring that all health records are digitized as quickly as possible, yet investment in <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-best-practices-for-enterprises/\">data technology and cybersecurity</a> is lagging far behind.</p>\n<h3 id=\"2-patients-lack-of-adequate-knowledge\" style=\"position:relative;\"><a href=\"#2-patients-lack-of-adequate-knowledge\" aria-label=\"2 patients lack of adequate knowledge permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Patient's lack of adequate knowledge.</h3>\n<p>Usually, patients do not have adequate knowledge of the data security hazard of their EHRs. They do not understand the gravity of medical privacy and aren't as cautious. </p>\n<p>For example, they store their data in unencrypted folders or even send their results via email, which could be quite an easy pathway for <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">cybercriminals</a> to grab their records and also hack other personal details.</p>\n<h3 id=\"3-the-rise-of-ransomware-and-phishing-attempts\" style=\"position:relative;\"><a href=\"#3-the-rise-of-ransomware-and-phishing-attempts\" aria-label=\"3 the rise of ransomware and phishing attempts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. The rise of ransomware and phishing attempts.</h3>\n<p>An entire device can be infiltrated by advanced ransomware and phishing programs. Hackers can easily plant malicious scripts on a computer or steal login credentials. </p>\n<p>Just last week, a joint alert from Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) was released with a <a href=\"https://us-cert.cisa.gov/ncas/alerts/aa20-302a\">warning about the wave of ransomware attacks</a> in the healthcare and public health sector. </p>\n<p>Similarly, IoT devices like ventilators, insulin pumps, and other medical instruments are vulnerable network access points, and they should be audited for software updates, patches, and other upgrades. </p>\n<h3 id=\"4-unrestricted-access-to-computers\" style=\"position:relative;\"><a href=\"#4-unrestricted-access-to-computers\" aria-label=\"4 unrestricted access to computers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Unrestricted access to computers.</h3>\n<p>Computers that are out in the open can easily invite unauthorized personnel. If these open systems store confidential patient information, and they fall into the hands of unauthorized staff, the consequences could be dire. </p>\n<p>It may lead to active <a href=\"https://www.loginradius.com/blog/phishing-for-identity/\">phishing</a> attempts and provide hackers with a backdoor into more vulnerable network areas. Be sure that every device that contains patient data is stored in a safe location.</p>\n<h3 id=\"5-lack-of-comprehensive-identity-management\" style=\"position:relative;\"><a href=\"#5-lack-of-comprehensive-identity-management\" aria-label=\"5 lack of comprehensive identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Lack of comprehensive identity management.</h3>\n<p>Lack of comprehensive identity and access management in healthcare leads to weaker authentication and access control. This is where many healthcare organizations fail. </p>\n<p>It is too common for health facilities to exchange massive databases around the organization. Without data access controls and robust and <a href=\"https://www.loginradius.com/blog/2020/06/authentication-vs-authorization-infographic/\">adaptive authentication</a> methods, it is difficult to authorize the right employees for the right action. </p>\n<h2 id=\"top-5-benefits-of-choosing-the-right-identity-and-access-management-solution-in-healthcare\" style=\"position:relative;\"><a href=\"#top-5-benefits-of-choosing-the-right-identity-and-access-management-solution-in-healthcare\" aria-label=\"top 5 benefits of choosing the right identity and access management solution in healthcare permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Top 5 Benefits of Choosing the Right Identity and Access Management Solution in Healthcare</h2>\n<p>Protected health information (PHI) takes ten times the price of the dark web's financial records, and that makes any healthcare institution a highly tempting option for hackers. There was a steep <a href=\"https://www.privacyaffairs.com/healthcare-data-breach-statistics/\">increase in PHI breaches in the United States alone by 2733%</a> between 2009 and 2019.</p>\n<p>Modern identity management in healthcare is designed with an essential security strategy for hospitals embedded just right in. IAM prevents unauthorized people from accessing PHI and the right people from leaking it by accident. When obtaining access to sensitive information and facilities, a sound IAM approach would also minimize costs, decrease help desk calls, and improve the overall patient experience.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"protecting pii against data breaches\"\n        title=\"protecting pii against data breaches\"\n        src=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-pii-against-data-breaches.png\"\n        srcset=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/a6d36/protecting-pii-against-data-breaches.png 650w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-pii-against-data-breaches.png 768w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/63ff0/protecting-pii-against-data-breaches.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Below are a few things that identity management in healthcare businesses actually do as a cybersecurity and convenience gatekeeper. </p>\n<h3 id=\"1-protecting-patient-information\" style=\"position:relative;\"><a href=\"#1-protecting-patient-information\" aria-label=\"1 protecting patient information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Protecting patient information.</h3>\n<p>The first benefit of identity management is healthcare is cybersecurity. Phishing attacks, ransomware, and other malware incidents regularly target the medical facilities, yet rarely they deploy security protocols. This is where IAM takes the front seat. </p>\n<p>For example, businesses can benefit from multi-factor authentication (MFA) as a tool for next-generation identity management in healthcare. Adding multiple layers of security is unquestionably the strongest form of authentication available at the moment. </p>\n<p>Similarly, <a href=\"https://www.loginradius.com/single-sign-on/\">single sign-on (SSO)</a> can solve the multiple login points paradox by offering patients a single set of credentials to authenticate to multiple accounts. </p>\n<h3 id=\"2-securing-access-and-seamless-usage\" style=\"position:relative;\"><a href=\"#2-securing-access-and-seamless-usage\" aria-label=\"2 securing access and seamless usage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Securing access and seamless usage.</h3>\n<p>IAM provides a mechanism for regulating the identities of healthcare staff and determining how they navigate healthcare systems and their responsibilities and roles. Identity access management offers features to centralize the identity of hospital employees, thereby making it easier to add new staff, delete old ones, manage users, and monitor their access. </p>\n<p>It benefits physicians - as they do not have to log in manually and out of different software many times a day. By utilizing single sign-on, they only have to log into their sessions once and access whenever they need to without wasting much time. </p>\n<h3 id=\"3-caring-about-compliance\" style=\"position:relative;\"><a href=\"#3-caring-about-compliance\" aria-label=\"3 caring about compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Caring about compliance.</h3>\n<p>Implementing identity management in healthcare makes it easier for medical organizations and facilities to focus on patient privacy, protection, and compliance. A few regulations that have raised the bar for safeguarding both physical and administrative security include:</p>\n<ul>\n<li><strong>HIPAA</strong>: Health Insurance Portability and Accountability Act (HIPAA) is an established regulation to exercise best practices in the administrative, physical, and technical security of patient's data.</li>\n<li><strong>EPCS</strong>: Electronic Prescribing for Controlled Substances (EPCS) is a newer industry-specific regulation that mandates two-factor authentication and I.D. proofing to verify a provider, among others. </li>\n<li><strong>CCPA</strong>: <a href=\"https://www.loginradius.com/blog/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">California Consumer Privacy Act (CCPA)</a> is a state-level regulation that mandates institutions to provide notice to patients before they collect personal data. They can also opt-out, read, and delete their personal data from the hospital's database. </li>\n</ul>\n<p>A comprehensive IAM solution offers the perfect balance by meeting security requirements and the access control needed to comply with international regulations.</p>\n<h3 id=\"4-improving-patient-experience\" style=\"position:relative;\"><a href=\"#4-improving-patient-experience\" aria-label=\"4 improving patient experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Improving patient experience.</h3>\n<p>The possibilities to improve patient experiences by juxtaposing identity management in healthcare are limitless, including the ability to:</p>\n<ul>\n<li>Automate the processes to assign and withdraw privileges as needed.</li>\n<li>Support integrated healthcare delivery.</li>\n<li>Modernize communication collectively through identity federation</li>\n<li>Transform identity verification with <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">MFA</a>. </li>\n</ul>\n<p>This, in turn, ensures that patient data remains out of the hands of hackers.</p>\n<h3 id=\"5-centralizing-system-audits\" style=\"position:relative;\"><a href=\"#5-centralizing-system-audits\" aria-label=\"5 centralizing system audits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Centralizing system audits.</h3>\n<p>Although IAM solutions provide preventive controls such as access protection, they also offer detective capabilities. IAM solutions include central databases to verify transactions, access requests, and other operations. </p>\n<p>Security departments can produce reliable system audits and documentation effectively through unified logging and reporting tools. Such real-time inspections allow medical facilities to remain <a href=\"https://www.loginradius.com/blog/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">compliant</a> with the law and to escape prosecution and fines.</p>\n<h2 id=\"how-can-loginradius-help-the-healthcare-industry-stay-secure-and-compliant\" style=\"position:relative;\"><a href=\"#how-can-loginradius-help-the-healthcare-industry-stay-secure-and-compliant\" aria-label=\"how can loginradius help the healthcare industry stay secure and compliant permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can LoginRadius Help the Healthcare Industry Stay Secure and Compliant</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAYAAABiDJ37AAAACXBIWXMAAAsSAAALEgHS3X78AAABzElEQVQoz22TSU8CQRCFOWh3jxoP6sF40IML4kYURRhmAEXEBddERdyiBw/+//vzVc3iDPFQqXT39NevXtUU3FoAb7UBt3GM8RJjowO33uaeD2/zBN56E47nXvJdnL0VP7P203Uhgh1hcruL5eAGi7U+LEFu5wxe+ZzAFlyRUAEnl+XO9ins3jXs/h3zja7lXIGWqmZ3e5irXmGhdg1XOlLF3kpdP3LFkMCWqpBsDx9gGq8w/gtM7YkxgKkPYCu3MXCzg+nyKaYrfcxULlkqy97p5RRJlkcsL5rgjUDCAkLDd4Xaw0cFRyWzpMlyT1XO7p3BbbHkUpu5CyfwtVDXdrcPw4u2+qAqJRv/mdCPFFpIm8JLhs2Q0L3EdPFQ/JGgr6b58RdUqVBRSwsUmOtcHOqbqFJwPfKUD1k2yRx/w7Q+YdpfcE2WK2pjG3LAXIgqVRqm3ukeLRBlY4TNdD6xdPENzx9EjUmAo+oiT8NoVBI7BC5QsUXUEDrf/cLq7Q+mgiHGs8BUoQCKYaoyW34yd2oDZ1QUTTSeFabdlU77w1FgmPrmMn9FtmkKTUo/uKeyQdRhaQ5n0HGe/y15tFG5B2SMJGSk2CTN8kg8s7+wFGRTZKgnIwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Identity Management in Healthcare 2\"\n        title=\"Identity Management in Healthcare 2\"\n        src=\"/static/9e42a812d21d11582e365c1bc52bf2d4/e5715/Identity-Management-in-Healthcare-2.png\"\n        srcset=\"/static/9e42a812d21d11582e365c1bc52bf2d4/a6d36/Identity-Management-in-Healthcare-2.png 650w,\n/static/9e42a812d21d11582e365c1bc52bf2d4/e5715/Identity-Management-in-Healthcare-2.png 768w,\n/static/9e42a812d21d11582e365c1bc52bf2d4/d0143/Identity-Management-in-Healthcare-2.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius is a powerful player that checks all the major boxes in securing patient identities and authentication throughout the healthcare infrastructure. </p>\n<p>The ability to offer provisioning, reporting, support for identities, compliance benefits, and easy access makes the CIAM provider one of the top contemporary solutions for identity management in healthcare.</p>\n<p>With LoginRadius, you can integrate:</p>\n<ul>\n<li><strong>Role-based management</strong>: Manage access rights for application, provision, or de-provision employees or change roles throughout your health facility.</li>\n<li><strong>Self-serve capabilities</strong>: Enjoy self-service functionality by allowing healthcare professionals to request access to resources. Consequently, managers can approve or reject them with zero IT intervention.</li>\n<li><strong>Compliance regulations</strong>: Safeguard patient privacy and sensitive health information via regulations like HIPAA, CCPA, and stay updated on more.</li>\n<li><strong>Seamless access management</strong>: Improve patient and member access by providing multiple opportunities for making access more seamless and intuitive.</li>\n</ul>\n<h3 id=\"loginradius-does-identity-and-access-management-for-healthcare-organizations-rightwith-modern-authentication\" style=\"position:relative;\"><a href=\"#loginradius-does-identity-and-access-management-for-healthcare-organizations-rightwith-modern-authentication\" aria-label=\"loginradius does identity and access management for healthcare organizations rightwith modern authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius does identity and access management for healthcare organizations right—with modern authentication.</h3>\n<p>Modern authenticate is no longer just about the login screen. Rather, there are many benefits attached to it, including auditing, monitoring, provisioning, deprovisioning, enforcing security policies, multi-factor authentication (2FA/MFA), social login, and single sign-on (SSO).</p>\n<p>Addressing all of the above depends heavily on an effective <a href=\"https://www.loginradius.com/industry-healthcare/\">identity management capability</a>. Consequently, LoginRadius authenticates patients and healthcare professionals with any third-party identity provider running on any device or the cloud. </p>\n<p>The CIAM provider solves the following modern authentication problems: </p>\n<ul>\n<li>It establishes a single source of truth for patients and staff identities. </li>\n<li>It allows SSO where a set of credentials can <a href=\"https://www.loginradius.com/blog/identity/prevent-credential-stuffing-attacks/\">unlock login access</a> to multiple accounts. </li>\n<li>It offers centralized provisioning and de-provisioning of patients and healthcare professionals.</li>\n<li>It provides the ability to add extra security layers with stronger second-factor authentication (2FA/MFA).</li>\n<li>It offers out-of-the-box API security and fraud detection to protect against cybercrime.</li>\n<li>It enables consent management to manage and version consent during registration or login.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion </h2>\n<p>Times are changing—IAM is no longer an administrator-driven set of capabilities. It is gradually shifting to an integrated approach where patient experiences are being optimized, and security and compliance capabilities are being enforced in the zest to accommodate organizational effectiveness.</p>\n<p>Moving forward, identity management in healthcare organizations is about to take a giant leap. LoginRadius can help you with that! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book a demo loginradius\"\n        title=\"book a demo loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 03, 2020","updated_date":null,"description":"Healthcare is one of the most heavily regulated sectors in existence, mostly because of the sensitivity of the collected data. Patients expect that their data remain confidential, and they enjoy a quality experience. Employing identity management in healthcare can genuinely make all the difference","title":"Identity Management in Healthcare: Analyzing the Industry Needs","tags":["customer-experience"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3986013986013985,"src":"/static/462f5ec83ba80a8a7dabaa960e5ab34c/9a31d/Identity-Management-in-Healthcare.jpg","srcSet":"/static/462f5ec83ba80a8a7dabaa960e5ab34c/f836f/Identity-Management-in-Healthcare.jpg 200w,\n/static/462f5ec83ba80a8a7dabaa960e5ab34c/2244e/Identity-Management-in-Healthcare.jpg 400w,\n/static/462f5ec83ba80a8a7dabaa960e5ab34c/9a31d/Identity-Management-in-Healthcare.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"As we all know, Twitter is one of the most preferred microblogging websites when it comes to putting your thoughts on the internet. Big…","fields":{"slug":"/engineering/beginners-guide-to-tweepy/"},"html":"<p>As we all know, Twitter is one of the most preferred microblogging websites when it comes to putting your thoughts on the internet. Big organizations use this platform for advertising their product; government institutions even use it to provide prompt customer resolution; various groups use Twitter to run social awareness campaigns and media campaigns. Twitter has close to 330 million monthly active users worldwide, out of which 17 million hits are generated from India itself along with more than 1 billion downloads on Play Store. With all this in mind, Twitter allows access to Twitter API to developers to create some cool applications like bots, automation tools, etc. This Twitter API gives developers access to almost all of Twitter's functionalities like likes, retweets, tweets, etc. Tweepy, a python package, helps us in achieving all this.</p>\n<p>Tweepy is a python package that smoothly and transparently accesses Twitter's endpoints made available for the developers. Without Tweepy, the user would have to take care of various low-level details about HTTP requests, rate limiting, authentication, serialization, etc. Tweepy handles all this mess on behalf of the user making the application prone to errors.\nIn simple words, Tweepy is an open-source python package that provides a way for developers to communicate with the Twitter API. But keep in mind that Twitter levies a rate limit on the number of requests made to the Twitter API. To be precise, 900 requests/15 minutes are allowed; Twitter feeds anything above that an error.</p>\n<h3 id=\"installation\" style=\"position:relative;\"><a href=\"#installation\" aria-label=\"installation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Installation</h3>\n<p>Tweepy can be installed by using Python package manager <strong>pip</strong>. A simple demonstration can be seen below:\n<img src=\"/40dde8efec2ad55ac4676067a47623cc/installation.png\" alt=\"installation\" title=\"Installation\"></p>\n<p>Installation on Linux and macOS should follow similar steps as well.</p>\n<p>Twitter API uses OAuth for authentication, so initially, you need to apply for authentication credentials from Twitter. These authentication credentials basically consists of 4 components namely : <em>consumer</em>key, consumer<em>secret</em>key, access<em>token, access</em>token<em>secret</em> . These credentials from Twitter are used to instantiate the API. <strong>Each account gets a unique key, so don't reuse someone else's keys.</strong>\nFor getting those credentials from Twitter, apply for a developer account on the <a href=\"https://developer.twitter.com/en\">Twitter Developers</a> page.\n<img src=\"/5c15dfefc6853d899b15baf7a91ab241/twitterdev.png\" alt=\"twitterdev\" title=\"Twitter Dev Dashboard\">\nThis is what the account looks like. Here you will get detailed information about the total no. of requests made, your API credentials, and much more information. After creating an account, you need to create an app wherein you will be asked to name your app and a short description. You must be wondering what an app is?\nThe app is like a gateway that contains a set of permissions and keys used to access the Twitter API. An app is needed for accessing the Twitter API as a part of Twitter's OAuth authentication. After creating an app, generate new authentication tokens for authorization purposes.</p>\n<p><img src=\"/3e1ad6c1ae5d8e5ab84b112068ba87f1/keys.png\" alt=\"keys\"></p>\n<h3 id=\"getting-started-tweepy\" style=\"position:relative;\"><a href=\"#getting-started-tweepy\" aria-label=\"getting started tweepy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Getting Started: Tweepy</h3>\n<p>There are four common basic steps in any Tweepy application.</p>\n<ol>\n<li>Importing tweepy package.</li>\n<li>Setting the authentication credentials.</li>\n<li>Instantiating the API.</li>\n<li>Creating API object.</li>\n</ol>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk15\">import</span><span class=\"mtk1\"> tweepy</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\"># authenticating twitter api credentials</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">consumer_key = </span><span class=\"mtk8\">&#39;2OsNoPKOYCpxxxxxxxxxxxxxxxxxxxxxx&#39;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">consumer_secret = </span><span class=\"mtk8\">&#39;Xw07uU51xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&#39;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">access_token = </span><span class=\"mtk8\">&#39;24621057xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&#39;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">access_token_secret = </span><span class=\"mtk8\">&#39;pXt5xxxxxxxxxxxxxxxxxxxxxxxxxxxx&#39;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\"># instantiating the api</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">auth = tweepy.OAuthHandler(consumer_key, consumer_secret)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">auth.set_access_token(access_token, access_token_secret)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\"># creating API object</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">api = tweepy.API(auth,</span><span class=\"mtk12\">wait_on_rate_limit</span><span class=\"mtk1\">=</span><span class=\"mtk4\">True</span><span class=\"mtk1\">,</span><span class=\"mtk12\">wait_on_rate_limit_notify</span><span class=\"mtk1\">=</span><span class=\"mtk4\">True</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">import</span><span class=\"mtk1\"> tabulate</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">user = api.get_user(</span><span class=\"mtk8\">&quot;Cristiano&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk11\">print</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;User Details:&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk11\">print</span><span class=\"mtk1\">(tabulate([[</span><span class=\"mtk8\">&quot;Name&quot;</span><span class=\"mtk1\">,</span><span class=\"mtk8\">&quot;Description&quot;</span><span class=\"mtk1\">,</span><span class=\"mtk8\">&quot;Location&quot;</span><span class=\"mtk1\">],[user.name,user.description,user.location]],</span><span class=\"mtk12\">headers</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;firstrow&quot;</span><span class=\"mtk1\">))</span></span></code></pre>\n<blockquote>\n<p>Note: Use your credentials in the hidden keys above._</p>\n</blockquote>\n<p>Objects created from the Tweepy. API class helps us access most of Twitter's available functionality like tweets, retweets, likes, etc. In the code snippet, we used the api.get_user method for getting information about a certain user on Twitter. Likewise, there can be several use cases of different methods(discussed below) made available by Twitter to developers. You can find the link for this code <a href=\"https://colab.research.google.com/drive/1dN02ioXElOQPOktIzNBACCncyrI2eiBR?usp=sharing\">here.</a></p>\n<p>Now we will see different methods provided by Twitter. The API methods have been divided into groups based on their functionality. The detailed guide for the API methods can be found at the official <a href=\"https://tweepy.readthedocs.io/en/latest/api.html\">API Reference</a> documentation. </p>\n<ul>\n<li>Timeline methods</li>\n<li>Status methods</li>\n<li>User methods</li>\n<li>Direct Message Methods</li>\n<li>Friendship Methods</li>\n<li>Favorite Methods</li>\n<li>Block Methods</li>\n<li>Search Methods</li>\n<li>Trends Methods</li>\n<li>Geo Methods</li>\n</ul>\n<h4 id=\"timeline-methods\" style=\"position:relative;\"><a href=\"#timeline-methods\" aria-label=\"timeline methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Timeline Methods</h4>\n<p>These methods handles the tweets, retweets, statuses on your/someone else's timeline as long as the account is public.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">tweets = api.home_timeline()</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">for</span><span class=\"mtk1\"> tweet </span><span class=\"mtk4\">in</span><span class=\"mtk1\"> tweets:</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">print</span><span class=\"mtk1\">(</span><span class=\"mtk4\">f</span><span class=\"mtk8\">&quot;</span><span class=\"mtk4\">{</span><span class=\"mtk1\">tweet.user.name</span><span class=\"mtk4\">}</span><span class=\"mtk8\"> said </span><span class=\"mtk4\">{</span><span class=\"mtk1\">tweet.text</span><span class=\"mtk4\">}</span><span class=\"mtk8\">&quot;</span><span class=\"mtk1\">)</span></span></code></pre>\n<p>api.home_timeline() is an API method that returns the 20 most recent tweets on the user's timeline.</p>\n<h4 id=\"status-methods\" style=\"position:relative;\"><a href=\"#status-methods\" aria-label=\"status methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Status Methods</h4>\n<p>These methods deal with creating, fetching tweets, retweeting tweets.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">api.update_status(</span><span class=\"mtk8\">&quot;Hello World!&quot;</span><span class=\"mtk1\">)</span></span></code></pre>\n<p>api.update_status() is an API method used to create a tweet on the user's timeline. For each update request, it will check the user's recent tweets. If any duplication is found, the request will be blocked by Twitter as a user cannot post the same tweet more than once.</p>\n<h4 id=\"user-methods\" style=\"position:relative;\"><a href=\"#user-methods\" aria-label=\"user methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Methods</h4>\n<p>These methods help to find the user details using various paramaeter like name, location, description,friends, followers,etc. as long as the account is public. </p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">user = api.get_user(</span><span class=\"mtk8\">&quot;ISRO&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk11\">print</span><span class=\"mtk1\">(user.name)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk11\">print</span><span class=\"mtk1\">(user.decscription)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk11\">print</span><span class=\"mtk1\">(user.followers)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk11\">print</span><span class=\"mtk1\">(user.location)</span></span></code></pre>\n<p>We have used get_user() previously to fetch user details of specific accounts.</p>\n<h4 id=\"friendship-methods\" style=\"position:relative;\"><a href=\"#friendship-methods\" aria-label=\"friendship methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Friendship Methods</h4>\n<p>These methods help the user to follow, unfollow certain accounts, list the accounts user follows, etc.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">api.create_friendship(</span><span class=\"mtk8\">&quot;elonmusk&quot;</span><span class=\"mtk1\">)</span></span></code></pre>\n<p>create_friendship() will add @elonmusk to the list of accounts you follow.</p>\n<h4 id=\"favorite-methods\" style=\"position:relative;\"><a href=\"#favorite-methods\" aria-label=\"favorite methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Favorite Methods</h4>\n<p>Likes or unlikes(if already liked) the status specified in the ID parameter as the authenticating user.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">api.create_favorite(tweet.id)</span></span></code></pre>\n<p>create_favorite() will like a tweet based on the tweet id provided.</p>\n<h4 id=\"block-methods\" style=\"position:relative;\"><a href=\"#block-methods\" aria-label=\"block methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Block Methods</h4>\n<p>Used to block, unblock, list blocked accounts of the user.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">api.create_block(</span><span class=\"mtk11\">id</span><span class=\"mtk1\">/screen_name)</span></span></code></pre>\n<p>create<em>block() will block the specific user using the id/screen</em>name provided. </p>\n<h4 id=\"search-methods\" style=\"position:relative;\"><a href=\"#search-methods\" aria-label=\"search methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Search Methods</h4>\n<p>These methods help the user to search specific tweet based upon the search query and parameters provided. But not all tweets will be indexed or made available through the search methods.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"7\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk15\">for</span><span class=\"mtk1\"> tweets </span><span class=\"mtk4\">in</span><span class=\"mtk1\"> api.search(</span><span class=\"mtk12\">q</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;iphone&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">lang</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;en&quot;</span><span class=\"mtk1\">):</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">print</span><span class=\"mtk1\">(tweet.text)</span></span></code></pre>\n<p>search() will look out for all the tweets available for the query keyword 'q' provided.</p>\n<h4 id=\"trends-methods\" style=\"position:relative;\"><a href=\"#trends-methods\" aria-label=\"trends methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Trends Methods</h4>\n<p>It returns the trends going on at a specific geographical location.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"8\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">api.trends_place(</span><span class=\"mtk7\">1</span><span class=\"mtk1\">)</span></span></code></pre>\n<p>trends_place() will show trends in the specific area. Here one stands for worldwide.</p>\n<h4 id=\"geo-methods\" style=\"position:relative;\"><a href=\"#geo-methods\" aria-label=\"geo methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Geo Methods</h4>\n<p>It returns the geographical location like latitude, the longitude of the place id provided.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"python\" data-index=\"9\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">api.geo_id(</span><span class=\"mtk11\">id</span><span class=\"mtk1\">)</span></span></code></pre>\n<p>geo_id() returns more geographical information of the concerned place id.</p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>Tweepy allows the user to concentrate on the application's logic by hiding many low-level details, thus making the application bug-free. You can use tweepy to do some cool projects like bots, automation, machine learning applications, etc. </p>\n<h5 id=\"ket-takeaways\" style=\"position:relative;\"><a href=\"#ket-takeaways\" aria-label=\"ket takeaways permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Ket Takeaways</h5>\n<ul>\n<li>What is Tweepy?</li>\n<li>Installation</li>\n<li>Getting Started with Tweepy</li>\n<li>Various API methods</li>\n</ul>\n<p>More information about tweepy can be found at <a href=\"https://tweepy.readthedocs.io/en/latest/index.html\">docs.</a> Make sure to look at the official documentation as it will provide you with a greater picture of the package. So what are you waiting for? Go ahead, use your imagination, and get started with the side-project you've always been thinking of.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk3 { color: #6A9955; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n</style>","frontmatter":{"date":"November 02, 2020","updated_date":null,"description":"Learn how to use Twitter APIs using Tweepy, a python package,","title":"Beginners Guide to Tweepy ","tags":["Twitter","Tweepy","Python"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/63d4d3ea1070111c43e0bdfa476b2a62/14b42/coverimage.jpg","srcSet":"/static/63d4d3ea1070111c43e0bdfa476b2a62/f836f/coverimage.jpg 200w,\n/static/63d4d3ea1070111c43e0bdfa476b2a62/2244e/coverimage.jpg 400w,\n/static/63d4d3ea1070111c43e0bdfa476b2a62/14b42/coverimage.jpg 800w,\n/static/63d4d3ea1070111c43e0bdfa476b2a62/47498/coverimage.jpg 1200w,\n/static/63d4d3ea1070111c43e0bdfa476b2a62/0e329/coverimage.jpg 1600w,\n/static/63d4d3ea1070111c43e0bdfa476b2a62/d8255/coverimage.jpg 1920w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Sameer Mahajan","github":"sameermahajan101","avatar":null}}}},{"node":{"excerpt":"Introduction to Github APIs What are APIs API stands for Application Program Interfaces, which developers use to access web tools or…","fields":{"slug":"/engineering/github-api/"},"html":"<h1 id=\"introduction-to-github-apis\" style=\"position:relative;\"><a href=\"#introduction-to-github-apis\" aria-label=\"introduction to github apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction to Github APIs</h1>\n<h2 id=\"what-are-apis\" style=\"position:relative;\"><a href=\"#what-are-apis\" aria-label=\"what are apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are APIs</h2>\n<p>API stands for Application Program Interfaces, which developers use to access web tools or information on the cloud. It allows different cross-platform applications to talk to each other.\nOne of the common examples of it is <a href=\"https://cloud.google.com/speech-to-text\">Google Speech to Text API</a> used when you talk to Google Assistant.</p>\n<h2 id=\"what-is-github-apis\" style=\"position:relative;\"><a href=\"#what-is-github-apis\" aria-label=\"what is github apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is <a href=\"https://developer.github.com/v3/\">Github APIs</a></h2>\n<p>Github APIs( or Github ReST APIs) are the APIs that you can use to interact with GitHub. They allow you to create and manage repositories, branches, issues, pull requests, and many more.\nFor fetching publicly available information (like public repositories, user profiles, etc.), you can call the API. For other actions, you need to provide an authenticated token.</p>\n<h2 id=\"basic-github-apis-examples\" style=\"position:relative;\"><a href=\"#basic-github-apis-examples\" aria-label=\"basic github apis examples permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Basic Github APIs Examples</h2>\n<p>The base URL for GitHub APIs is:- <a href=\"https://api.github.com/\">GithubAPI</a></p>\n<h3 id=\"accessing-public-information\" style=\"position:relative;\"><a href=\"#accessing-public-information\" aria-label=\"accessing public information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Accessing Public Information</h3>\n<h4 id=\"fetching-user-information-with-its-username\" style=\"position:relative;\"><a href=\"#fetching-user-information-with-its-username\" aria-label=\"fetching user information with its username permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Fetching user information with its username</h4>\n<p>Request type: GET\nAPI endpoint: /users/{username}</p>\n<p>Example :- <code>curl https://api.github.com/users/devkapilbansal</code></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 79.23076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"user_details\"\n        title=\"user_details\"\n        src=\"/static/c9f56c8e81c084bad243f45322340f26/e5715/user_details.png\"\n        srcset=\"/static/c9f56c8e81c084bad243f45322340f26/a6d36/user_details.png 650w,\n/static/c9f56c8e81c084bad243f45322340f26/e5715/user_details.png 768w,\n/static/c9f56c8e81c084bad243f45322340f26/43fbc/user_details.png 797w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As you can see, API returns us a JSON response with info about the user, like its image<em>url, name, mail</em>address.</p>\n<h4 id=\"fetching-users-followers-list\" style=\"position:relative;\"><a href=\"#fetching-users-followers-list\" aria-label=\"fetching users followers list permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Fetching user's followers' list</h4>\n<p>Request type: GET\nAPI endpoint: /users/{username}/followers</p>\n<p>Example :- <code>curl https://api.github.com/devkapilbansal/followers</code></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 91.23076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"followers\"\n        title=\"followers\"\n        src=\"/static/3298cd5d67ff8492417a65b6b7067d82/e5715/followers.png\"\n        srcset=\"/static/3298cd5d67ff8492417a65b6b7067d82/a6d36/followers.png 650w,\n/static/3298cd5d67ff8492417a65b6b7067d82/e5715/followers.png 768w,\n/static/3298cd5d67ff8492417a65b6b7067d82/5d72a/followers.png 834w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>This URL returns info about all the users that follow a particular user.</p>\n<h4 id=\"check-if-a-user-follows-another\" style=\"position:relative;\"><a href=\"#check-if-a-user-follows-another\" aria-label=\"check if a user follows another permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Check if a user follows another</h4>\n<p>Request type: GET\nAPI endpoint: /user/{username}/following/{target_username}</p>\n<p>This endpoint doesn't return any content. It just returns a status code.</p>\n<p>A status code of 204 means the <code>target_user</code> is followed by the user, whereas a status code of 404 means the user does not follow a <code>target_user</code>.</p>\n<p>Example :- <code>curl https://api.github.com/devkapilbansal/following/KapilBansal</code></p>\n<p>When a user follows another user\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 44.61538461538462%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"follow\"\n        title=\"follow\"\n        src=\"/static/7bf691c6c057b3af9b9a09d1e8c6693c/e5715/user_follows.png\"\n        srcset=\"/static/7bf691c6c057b3af9b9a09d1e8c6693c/a6d36/user_follows.png 650w,\n/static/7bf691c6c057b3af9b9a09d1e8c6693c/e5715/user_follows.png 768w,\n/static/7bf691c6c057b3af9b9a09d1e8c6693c/076ca/user_follows.png 914w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>When a user doesn't follow another user\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 48%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"not_follow\"\n        title=\"not_follow\"\n        src=\"/static/3fe6f8c04f1e39452f3be90655c254f5/e5715/user_not_follows.png\"\n        srcset=\"/static/3fe6f8c04f1e39452f3be90655c254f5/a6d36/user_not_follows.png 650w,\n/static/3fe6f8c04f1e39452f3be90655c254f5/e5715/user_not_follows.png 768w,\n/static/3fe6f8c04f1e39452f3be90655c254f5/076ca/user_not_follows.png 914w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"performing-tasks-as-an-authenticated-user\" style=\"position:relative;\"><a href=\"#performing-tasks-as-an-authenticated-user\" aria-label=\"performing tasks as an authenticated user permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Performing tasks as an authenticated user</h3>\n<p>If you provide an authenticated token, you don't need to provide a username in the endpoints mentioned above.</p>\n<p>By providing the token, you can create repositories/gists, comment on pull requests/issues, and all other tasks that you can perform from the Web Interface.</p>\n<h4 id=\"generating-token\" style=\"position:relative;\"><a href=\"#generating-token\" aria-label=\"generating token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Generating Token</h4>\n<p>You can get a token by going to <a href=\"https://github.com/settings/tokens\">Personal access tokens</a> and clicking on <em>Generate new token</em>. You will be asked for the permissions/scopes of that token. Choose them <strong>wisely</strong> while creating one as some of these might be destructive.</p>\n<p>After selecting scopes, click on generate token and save the token somewhere as you will not see that token again.</p>\n<p><strong>Note</strong>:- Store your token in a secured environment while using it.</p>\n<h4 id=\"creating-a-repository\" style=\"position:relative;\"><a href=\"#creating-a-repository\" aria-label=\"creating a repository permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Creating a Repository</h4>\n<p>Request type: POST\nAPI endpoint: /user/{repos}\nRequired data: name</p>\n<p>Example :- <code>curl -H \"Authorization: token ${token}\" -d '{\"name\":\"Github API Testing\"}' https://api.github.com/user/repos</code></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.46153846153847%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAOCAYAAAAvxDzwAAAACXBIWXMAAAsTAAALEwEAmpwYAAACMklEQVQ4y3VUZ3faQBDUpzjFdsqzHYJTAJteVOgIhGkS1ZTYJPn/P2Syswo8bJMP81a6u7c7uzN3hhe10ftRxzjVgRd10I7YuPtWRfdrBc3Lov67EQvetYOO7LufLYUXLet5ru2ifZqEMYg3MMnc4b40lOgJuujH6pqUcORQ8SSO0klCIPF1Qr+59hzmmxsYftLFPN8HExPedVmZ1T8V0LhgzOvBQ1hvb/8Lw/1iYZbrYZq9UwzjTWnJROU8DftdUuGcpVA+zyic09STBM8LGM3LEtZ2gEBmGKTa8JNtjBItmWtNWybj1pWpCAtlYErbh2wPkxrNqxKWpZGw62KS9rC0RlgUB1g7YzxUJliaI51pS861pDgTk/GO/VGGD9WZqkwwERlvJBKPtRm2jQW2EnnusTbHvRQcJpqovM8eSSiVfwoTznGS7mBRILsAa8vHpjyWvakkmmJbn8t/eK73varCHRPIaAhDsmDLMxWmi5XtyxiGypTFwsQTXR/duOjLfDkCtv6CIRNSELZAg9Y+5lD9kNMYfmf/Ifwun6W1VYpzVOWB2IR24eBZmbeAg+cNaUesvcJk1LgoqKkLr2J7I79oeSDMdH5yQ/xbF4HYhpHYKR8kO7pOqPmlk1Dt9BPD8xYZvrS7Emuwbc6NylIEivG7ucAfd4VfojLBWXOWVHojwg1iDdAlvFFhZyUybGEliqqxhQE9uTR99SLXaRUWCUUJ9vvzfE8fEJq/L48LLwAfh7+bbLKaXf+7ZwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"create repo\"\n        title=\"create repo\"\n        src=\"/static/40d3976b856cb7dd39bb99f5993cdad9/e5715/create_repo.png\"\n        srcset=\"/static/40d3976b856cb7dd39bb99f5993cdad9/a6d36/create_repo.png 650w,\n/static/40d3976b856cb7dd39bb99f5993cdad9/e5715/create_repo.png 768w,\n/static/40d3976b856cb7dd39bb99f5993cdad9/6a6e9/create_repo.png 826w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h4 id=\"list-issues-assigned-to-you\" style=\"position:relative;\"><a href=\"#list-issues-assigned-to-you\" aria-label=\"list issues assigned to you permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>List issues assigned to you</h4>\n<p>Request type: GET\nAPI endpoint: /issues</p>\n<p>Example :- <code>curl -H \"Authorization: token ${token}\" https://api.github.com/issues</code></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 665px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 120.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAYCAYAAAD6S912AAAACXBIWXMAAAsTAAALEwEAmpwYAAADYElEQVQ4y3WVaVsaUQyF/aRoVWwr1WrVAuLKvg6DIsiOiGu1/f8/JM2bWQpqP+TJzL1zz01OTjILzd2CVDZOpbGVk4vvBfP1WEYa2wV9L0p9MyPuVl7cbzndy8vFdt4878XVI8mvHM7ZQjl67H9YkKsfZfPt/ao9t/Yqcn1Qk+ufNemo8dw+qJoHOLMYl/TiT7PMUlxyy0lZKK4dyVNpJA+FgfQPGzI+bcljcSAPxaE8V8b2/Kj7L9WJvNan8tudyh/3Tp7LYxkcXcrQt268LqW1Y1koaYQcuMt2NRJHJulruc/3ZJrpqu/rRX0D/qWAZlyi3w+Pm/btNNORkT5Xv5x7KZeiJzLN9uTmrCVP5ZFGeCWD1IX01fCkC4/1WFYc8xkpr59INpKQ7JJnpM67l/L6saXcS9SNu4Cfsl5U/XxmxNvByD/j4NtiYAaYW0kaB71kw6KCx5JeAskcDnxoS97abFQBmKXMZjfhGlek+6C8jU6u5DbdMRoud4oqkaylHEinuVOS5m5JnK/p9xFySyfuyI1Wl+gA72hxsPZ+xfagobVXNr0GVFAEuAQkMC9CBQTkVitG5bC7XM9kROWRz+T82kCJEH7RKs9QU/iUCgVuEQaAFIbyd7U4yGUKmIJivAOOXF6dW1UDMrrRbzrS0kI2d4uzEcatIGgNEEBvztsW2WPBE7Un8KFFfq+GvHgfK9c9pamy4ckoBIQ7bgSMSCgKB1h79qMBFHupTQy4r0E0tWBwStphhGmqHHf9FABrWg+jyY62E0XpJV3jkEKZ13U89NDzCD8EzK+mdNMJSWeTngz0l4sk53UYeS/yWS0aIBEBZLLw2wrhBgI28KXEhxZeHBZlOWFATJnxWcu4o+kpDMJm3S6Mef0cmgbg+D1e8weDJxsFZGOiAFSbiYImkYMNV2jwu8SNzXaMb6pLvnsHiN4GqUubMJc6uTlIN2AcpDuczXTIM4c9Kjw6wpSzOhyC8OkCwq9ET80jiZJyCiVFLVRZ1wGeH1/x+aIQYU2b3DhkOFirtU2LCBffQhpwGPBmVGTDVuTiuaIAyOSlBWktAPmYKB0fxDgExOcwuIC1OcC0dgpj6F7HF3ORruFW169e3Z/S/5NO5m3K+bWUHeRnFbRRyFXU4w/7aEK/nYX4v0692ZvTkHO8AAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"list issues\"\n        title=\"list issues\"\n        src=\"/static/85d67a193b02e71dc4a7642ebde9eac7/5f4af/list_issues.png\"\n        srcset=\"/static/85d67a193b02e71dc4a7642ebde9eac7/a6d36/list_issues.png 650w,\n/static/85d67a193b02e71dc4a7642ebde9eac7/5f4af/list_issues.png 665w\"\n        sizes=\"(max-width: 665px) 100vw, 665px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h4 id=\"creating-an-issue\" style=\"position:relative;\"><a href=\"#creating-an-issue\" aria-label=\"creating an issue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Creating an issue</h4>\n<p>Request type: POST\nAPI endpoint: /repos/{owner}/{repo_name}/issues\nRequired data: title</p>\n<p>Example :- <code>curl -H \"Authorization: token ${token}\" -d '{\"title\":\"Issue_For_Test\"}' https://api.github.com/repos/devkapilbansal/Github-API-Testing/issues</code></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.84615384615384%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAPCAYAAADkmO9VAAAACXBIWXMAAAsTAAALEwEAmpwYAAAB2ElEQVQ4y6VUaXPSUBTli7ZqR6t2dylbW5YsEAKBhD2sBdoKdRn///843nODjM5g0PHDmfsmyTvv3HPuS6J1XkY/Wccw42OQbmB81ZQarYeZAKNsgDAVvW9fVOCf2GielRGclXTtH1toCPxTG+6rHBKjbBMLM8TkuoWlM8HKneJzbYbvwQO++ff44s0Vy8oEs3wXY/mude7A2k/D2ktHdb22n2WQoIqF0cdtvoPpTRvTXAe9jzVQOUE1RP2tgephHrXXBZRfXKH0PLsVid6lh5G02Xnv6iZbTjP3UjCeJmFukFIV9loNlXDzz/obIXtny3NRybZJ7L0pqprqYQHeWpkS/LJxG5kSBqeljYfzYh935gAPpZHUEF1pvXFsonFkwjm43km2JrQ1DJpNslVlik/OWOvX+kJDIngYU6Z/sYS+KCQhw2A4SyFaSaKP7q0SMuE7a6Cjox7HkG1avreHOm/tdxX1sPuhqkkTfQmNz5sydyTc2bJ/YqF+ZKhH/JAJ63xJjdaprcn+MRSqYSAktvczsTP2V6G0LhyESQ/uyxyMJ9HM7VIR6yHv6KzQE7+q6h3BO0m1/0q2Jgx0RCZy7ZgkL/yu0YglDOVPMy+Kwsua+liR1v+n5R90abnC3EUCAgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"create_issue\"\n        title=\"create_issue\"\n        src=\"/static/de5adf93eab6a28c28e3efaf2a582fdf/e5715/create_issue.png\"\n        srcset=\"/static/de5adf93eab6a28c28e3efaf2a582fdf/a6d36/create_issue.png 650w,\n/static/de5adf93eab6a28c28e3efaf2a582fdf/e5715/create_issue.png 768w,\n/static/de5adf93eab6a28c28e3efaf2a582fdf/42de8/create_issue.png 1033w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h4 id=\"commenting-on-issue\" style=\"position:relative;\"><a href=\"#commenting-on-issue\" aria-label=\"commenting on issue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Commenting on issue</h4>\n<p>Request type: POST\nAPI endpoint: /repos/{owner}/{repo<em>name}/issues/{issue</em>no}/comments\nRequired data: body</p>\n<p>Example :- <code>curl -H \"Authorization: token ${token}\" -d '{\"body\":\"Test comment\"}' https://api.github.com/repos/devkapilbansal/Github-API-Testing/issues/1/comments</code></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 46.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"comment\"\n        title=\"comment\"\n        src=\"/static/edc194854fb47af2320b13277b97dd42/e5715/comment_on_issue.png\"\n        srcset=\"/static/edc194854fb47af2320b13277b97dd42/a6d36/comment_on_issue.png 650w,\n/static/edc194854fb47af2320b13277b97dd42/e5715/comment_on_issue.png 768w,\n/static/edc194854fb47af2320b13277b97dd42/cf4cc/comment_on_issue.png 1079w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Note</strong> - The same endpoint is used for commenting on pull requests too. Just change the issue number with the pull request number.</p>\n<h4 id=\"openingclosing-an-issue\" style=\"position:relative;\"><a href=\"#openingclosing-an-issue\" aria-label=\"openingclosing an issue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Opening/Closing an issue</h4>\n<p>Request type: PUT\nAPI endpoint: /repos/{owner}/{repo<em>name}/issues/{issue</em>no}</p>\n<p>Example :- <code>curl -H \"Authorization: token ${token}\" -d '{\"state\":\"close\"}' https://api.github.com/repos/devkapilbansal/Github-API-Testing/issues/1</code></p>\n<p><strong>Note</strong> - The same endpoint is valid for updating pull requests too.</p>\n<h4 id=\"results\" style=\"position:relative;\"><a href=\"#results\" aria-label=\"results permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Results</h4>\n<p>The above results can be verified on the GitHub website too.\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 46.46153846153846%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"results\"\n        title=\"results\"\n        src=\"/static/4d950ce26d69f4f81cb7b84f9b6acd7b/e5715/output.png\"\n        srcset=\"/static/4d950ce26d69f4f81cb7b84f9b6acd7b/a6d36/output.png 650w,\n/static/4d950ce26d69f4f81cb7b84f9b6acd7b/e5715/output.png 768w,\n/static/4d950ce26d69f4f81cb7b84f9b6acd7b/332b4/output.png 1826w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>There are a lot more endpoints that you can explore at <a href=\"https://developer.github.com/v3\">Github</a>. Also, you can only do the work you are authorized to with that token.\nAlthough there are plenty of data fields that can be sent with these endpoints, only required ones are shown above.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 02, 2020","updated_date":null,"description":"Github APIs are a way to interact with Github. Here, we will learn about some basic things we can do with Github APIs.","title":"Introduction to Github APIs","tags":["Github","API"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/524ee49cabd1aaadf454989f10cb1e83/ee604/GitHub_coverImage.png","srcSet":"/static/524ee49cabd1aaadf454989f10cb1e83/69585/GitHub_coverImage.png 200w,\n/static/524ee49cabd1aaadf454989f10cb1e83/497c6/GitHub_coverImage.png 400w,\n/static/524ee49cabd1aaadf454989f10cb1e83/ee604/GitHub_coverImage.png 800w,\n/static/524ee49cabd1aaadf454989f10cb1e83/f3583/GitHub_coverImage.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Kapil Bansal","github":"devkapilbansal","avatar":null}}}},{"node":{"excerpt":"What is Android Studio? In recent times, Android became the world's most popular operating system for various reasons. As an Android…","fields":{"slug":"/engineering/introduction-to-android-studio/"},"html":"<h3 id=\"what-is-android-studio\" style=\"position:relative;\"><a href=\"#what-is-android-studio\" aria-label=\"what is android studio permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Android Studio?</h3>\n<p>In recent times, Android became the world's most popular operating system for various reasons. As an Android programmer, I want to share what the Android Studio is? Android Studio is an IDE for Google Android Development launched on 16th May 2013, during Google's I/O 2013 event. Android Studio contains all the Android tools to design, test, debug, and profile your application. The Android Studio uses <a href=\"https://gradle.org/\">Gradle</a> to manage your project, a Build Automation Tool.</p>\n<p>For developing your first app, you need to download Android Studio for your preferred platform (Windows®, Mac OS X, or Linux) from the <a href=\"https://developer.android.com/studio\">Android developers site</a>. Android Studio can develop and test your application on either a real device or an emulator.</p>\n<h5 id=\"android-studio-has-many-exciting-features-that-can-help-you-to-develop-your-android-application-like-\" style=\"position:relative;\"><a href=\"#android-studio-has-many-exciting-features-that-can-help-you-to-develop-your-android-application-like-\" aria-label=\"android studio has many exciting features that can help you to develop your android application like  permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Android Studio has many exciting features that can help you to develop your Android application like :</h5>\n<ul>\n<li>Powerful code editor with smart editing and code re-factoring.</li>\n<li>Emulator to show your code output in various resolutions, including Nexus 4, Nexus 7, Nexus 10, and many other android phones.</li>\n<li>Gradle based build support.</li>\n<li>Maven Support.</li>\n<li>Template-based wizards.</li>\n<li>Dracula Theme Environment to enjoy your coding experience.</li>\n</ul>\n<p>You can experience all the awesome features by using Android Studio in-hand.</p>\n<h3 id=\"lets-build-something\" style=\"position:relative;\"><a href=\"#lets-build-something\" aria-label=\"lets build something permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Let's Build Something!!!</h3>\n<p>In this article, we're going to build a simple \"Hello World\" Android Application.</p>\n<blockquote>\n<p>Requirement: Make sure you have Android Studio installed. If you don't, refer to this <a href=\"https://developer.android.com/studio\">link</a>. It's pretty straightforward.</p>\n</blockquote>\n<p>To create the application, we will follow these steps through the process in a pretty painless manner.</p>\n<p><strong>Step 1. Open your Android Studio after installing, and this following screen appears after starting:</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 57.692307692307686%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"alt_text\"\n        title=\"Welcome Screen\"\n        src=\"/static/8eec88f24d2afe21a2e72beadf0fe2c9/e5715/welcomepage.png\"\n        srcset=\"/static/8eec88f24d2afe21a2e72beadf0fe2c9/a6d36/welcomepage.png 650w,\n/static/8eec88f24d2afe21a2e72beadf0fe2c9/e5715/welcomepage.png 768w,\n/static/8eec88f24d2afe21a2e72beadf0fe2c9/681f1/welcomepage.png 899w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Step 2. Click on \"Start a New Android Project\" and choose the activity we want the project to be. For me, I'm selecting an empty activity.</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 74.76923076923076%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAPCAIAAABr+ngCAAAACXBIWXMAAA7DAAAOwwHHb6hkAAADcElEQVQozy3TbUhbVxgH8BPXpZrUzK50owtGrKaNaZrEe3Puyzn3/d68mERTY+pLY1hijElrfBnrqgwL7VqHYCsOJ6xCOybYSW1nWYThun3sXr5s7sNgY1u7D/0wYXQf3BjUQXYjhT8PDwd+nPPwcEBdnW18dOLN0YtXLky/PzV7++rC9srSb/e+vL658+17f/5968HOyv0nq7eXrsxfnpx9e3L68qUZTT0FgLmq6hCwWOrz+bOFwnDhXHF4bDyTLyTSuZ50ZiDVdybblxjIJDIDPelsOjc0mC9kc/nh4ghiFQBqK7h6/6s0K/CCxiKRZQUIEUvQtBdSNA99mHKTlIeEkCUJmnQRhJuEFFtvOw7AAYPhIKipPsIJmqSGecGPsYR52ZPoc/amkBzAkv9ET7/z9BksKIwacPSlXLGEJGtNze49XKfj1xAWOV7mBQVzkij7P9/64eedfzq7k8FIbGt7++vHjwXJn8rmn5TLpYffSJJqP+YFwFLBphorwhWjaCEdK2rw0aPfy+Vyf7K/PRrbffbsr6dPVVnL5Yv64fdbW6KkNds9z3GdqV43PBZEhuOwKIjq4uKNO8vzkXAw0JG+u7a5vLLhb+vFbZ2XZs71jw7ycshu159dW8GvmKwcEolwh6MnyWgh3ZM0Pk6wEMk4Oni4a6QhXhTb0pwWdnQl3dG4qgWbn+OXgNVs5Rn+UHEczC14Tp32hKKWianRu+ud5yewrGTvr499tMwzqPv19MNfvltaXdQHtNtdANQYDLXAfsAmMNzBsfPg2vzJWOJEJAbeeZf75FP3Gxe62uO7u//9+tOP+tqGhjLlf//Y/OIrLKjNTU4AjPsM1YB5uQkxvCsQPpro9QYiNJZOhjqOhdqdghIMhFc+vjN//SpFcdFYeO7mjZGLH2AsNh5tAeDFmioTSLY4RF7gkSQjkaYwRSGO4QVWYChEMxxBMiTEegMpDvoQhDSLhIYGx97N+8FZwqmoCq/6OVEmfTRJUkQlkIS0j6T2An2kz0eSXghdek8jm03H1VUGI9h4y8ORBOXCRCt2k0iPl2A9BHK5KZdeIe+m9Chu1M17g5FWCbdC65HGysfQ8YNCcK1lerZpnddWTfE108A9S27NPFYyRaeMEx++sLC571rJOLNhnPzMliolUSneOGc2QwM4bACm/wHHDRD71yJc+gAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"alt_text\"\n        title=\"Choosing the Activity\"\n        src=\"/static/c5fef3dfc7ba07a49cd613a9921dca7f/e5715/empty.png\"\n        srcset=\"/static/c5fef3dfc7ba07a49cd613a9921dca7f/a6d36/empty.png 650w,\n/static/c5fef3dfc7ba07a49cd613a9921dca7f/e5715/empty.png 768w,\n/static/c5fef3dfc7ba07a49cd613a9921dca7f/5d030/empty.png 771w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Step 3. Configure your project by changing the project's name and the desired language the user wants to code with. Android Studio supports two languages, i.e., Java and Kotlin. The user can also choose their desired API, like which android version they want to run, and then click on finish.</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 74.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAPCAIAAABr+ngCAAAACXBIWXMAAA7DAAAOwwHHb6hkAAAC6ElEQVQoz12Qy08TURSHz7TFioKliUKjRApVDH1Np/OeuXPvPDqdtlDFRwLxAfhqItEAQgJqTFwQg4BUJcQYQ/wP3JqYGF34QJcu/QPc+YiJC1d6GcEEb77FWZzv/s45ANAcDEQSCY7twWbGGeAq02jw8/Xzz289Hbn669Phjz/GZ39en31yZoQky/mMw7I4Hk8DRHwgEg7HZmZuLC4sLS7U799bvl9/cHehPne3Pl+vLywuLW5Qp8zPLy0vr5y/MOqbUSq3BAK7czlJR6akIFnDgqxnOZHjxBzLszlhC6zA83JXIkWtv3I0FGqVZGQQGxuWpWFbJ8Sw3HK/WzlquX12sWptYrpV2/EyWRFglw+Vg62ipFNTdEqJwdNdg6cFx3MLZa/SbzolbHuE4pSIX5tWIZXm/eT1nVtCwTZZNmRJGxm9svbl69q370OXLmNkVg8fKxYrNIqYrmn5rBdb5cZQTFWwIKnjY1d/+48WsmIUvT6nULJpoOn+Y1OO+D5EWhraNCqL6tj45IY8MSXJOo3SDQsZloHtf1A5vSHvggZojm1rVWWkIbNcqU5OTU9NTZfLVUIKntdLZ8bE+U9OpfMAOwGaoIVpPtAQU0SEiK1omBdViqIZ9LBuqd8t9rrFCh2eWC7CNgX7chC2NzDbIcZEULQDK7qkYk03MSnQTE0numHbbp9peQZ2VI0oKqbQQ+jI6unJAYQbmUZoh+jRfYmyofECWr+5ShSNSIohyoi20h8FGfGSLkiIIgoaXbC7OwOwIwhhOMjsuWYkbZNPypwo5VUhr/J5mecUPq9Kksbl1SwrZbNiNiNwmZSYSetKdw/duYmhstvZ/mGWndALJw6dU+ThTjTURYYPkqEEGYqLlf1HzsZP1LoHLnf21lJa7WRm9BRb69ibZWAHAyGw93WtHq89PfTw0YFnWvEFjLwO3HwTmHsbuP0yeHEFVt/Bk/fweA1W1oJ33u6dfJP0XkWTs4GwDEz8D9ho5VVb0axbAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"alt_text\"\n        title=\"Configuration Settings\"\n        src=\"/static/f016dd6a06c70393c083fd179a10651a/e5715/configure.png\"\n        srcset=\"/static/f016dd6a06c70393c083fd179a10651a/a6d36/configure.png 650w,\n/static/f016dd6a06c70393c083fd179a10651a/e5715/configure.png 768w,\n/static/f016dd6a06c70393c083fd179a10651a/9f82e/configure.png 820w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Step 4.Wait until your Gradle build finishes successfully and find your java and .xml file from folders of the app, as shown in the given image.</strong>\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAKCAIAAAA7N+mxAAAACXBIWXMAAA7DAAAOwwHHb6hkAAAAxElEQVQoz53R23LCIBCA4X0ZiLAc04AGSCGjttX3fyAhtk4uanrY+YYr/gEG8CFru5faVco4bb2yziqlTC/NC6GUkO/QBnx+T6erHQu62AxBDMFqZQXXShpjOCL93LwgXyshcH77KPNxmkqa8qKEmFFogVxKiSjYjnVPBkIqMdVyfqgxR0naCW265wPrbB1vZz/GpOvoNojLtdcO4bW+mTHOGG6DPJ+O50trxsnv053z8TdgcGPN+uFge/9XgMK0j5HmH26hjnDssBAWpwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"alt_text\"\n        title=\"First Page\"\n        src=\"/static/1ea0588ff9250141230c684953afbe7d/e5715/gradle.png\"\n        srcset=\"/static/1ea0588ff9250141230c684953afbe7d/a6d36/gradle.png 650w,\n/static/1ea0588ff9250141230c684953afbe7d/e5715/gradle.png 768w,\n/static/1ea0588ff9250141230c684953afbe7d/53ac9/gradle.png 1287w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Step 5. Click onto your .xml file to see the initial layout of the file like the given image. You can drag and drop from the palette's items and change your layout by dragging and dropping.</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 37.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"alt_text\"\n        title=\"Layout\"\n        src=\"/static/02ab2b7c0393a9b386a619d2a1fccee7/e5715/xml.png\"\n        srcset=\"/static/02ab2b7c0393a9b386a619d2a1fccee7/a6d36/xml.png 650w,\n/static/02ab2b7c0393a9b386a619d2a1fccee7/e5715/xml.png 768w,\n/static/02ab2b7c0393a9b386a619d2a1fccee7/62a6a/xml.png 1122w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Step 6. At last, Run your file by the run button on the top right corner in your emulator configured.</strong>\n<strong>And hurray! You created your First Android Application!</strong></p>\n<h3 id=\"closing-thoughts\" style=\"position:relative;\"><a href=\"#closing-thoughts\" aria-label=\"closing thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Closing Thoughts</h3>\n<p>This article introduces Android, including just enough hands-on dragging and dropping to hopefully get you excited to know more about the Android platform. As we dig deeper, we can explore the capabilities of this great platform.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 30, 2020","updated_date":null,"description":"Getting Started with Android Studio and making your first app.","title":"Introduction to Android Studio","tags":["Android Studio","Android App"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/1ec6b3a597f04e058a2ab0da07091b0e/ee604/cover.png","srcSet":"/static/1ec6b3a597f04e058a2ab0da07091b0e/69585/cover.png 200w,\n/static/1ec6b3a597f04e058a2ab0da07091b0e/497c6/cover.png 400w,\n/static/1ec6b3a597f04e058a2ab0da07091b0e/ee604/cover.png 800w,\n/static/1ec6b3a597f04e058a2ab0da07091b0e/f3583/cover.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Prithviraj Biswas","github":"prithvirajbytes","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":660,"currentPage":111,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}