{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/129","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"The online gambling industry is one of the potential sectors that may make it through the pandemic with the least possible damage. In fact…","fields":{"slug":"/identity/online-casino-and-gambling-cyber-threat/"},"html":"<p>The online gambling industry is one of the potential sectors that may make it through the pandemic with the least possible damage. In fact, according to a study by the GrandViewResearch, online gambling is about to witness massive growth, and in the US alone, it will reach a value of <a href=\"https://www.grandviewresearch.com/industry-analysis/online-gambling-market?utm_source=prnewswire.com&#x26;utm_medium=referral&#x26;utm_campaign=PRN_Aug27_onlinegambling_ICT_RD1&#x26;utm_content=Content\">$102.9 billion by 2025</a>.</p>\n<p><em>No wonder the online gambling ecosystem is at its finest phase!</em> </p>\n<p>With the COVID-19 situation confining people to their homes, there's a lot more population playing on the internet. They have even outperformed their physical counterparts by massive numbers.</p>\n<p>In an environment where gambling occurs online, thousands of billions of casino money are transacted via credit and debit cards, wire transfers, and e-wallets. It is no surprise that gambling companies are one of the most favorable targets for scammers and hackers.</p>\n<p><a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">Cybercriminals target their resources</a> in two major ways: one they steal the <em>obvious -</em> money and the other they look for confidential data shared by gamblers online.</p>\n<p>Needless-to-say, the online gambling industry, therefore, needs to take the necessary steps to build safe and secure platforms for casino operators and consumers at large.</p>\n<h2 id=\"online-casino-a-multi-billion-dollar-industry--whats-about-to-change\" style=\"position:relative;\"><a href=\"#online-casino-a-multi-billion-dollar-industry--whats-about-to-change\" aria-label=\"online casino a multi billion dollar industry  whats about to change permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Online Casino, a Multi-Billion Dollar Industry- What's About to Change</h2>\n<p>The online gambling industry has undergone various changes over the past decades and is simultaneously expected to exhibit numerous transformations in the years to come. </p>\n<p>For example, the online gambling market is expected to grow at a compound annual growth rate (CAGR) of 11.5% from 2020 to 2027. That's huge!</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 600px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"usa online gambling market size\"\n        title=\"usa online gambling market size\"\n        src=\"/static/106a3a03959a84668cd55fac09ed2789/0a47e/usa-online-gambling-market-size.png\"\n        srcset=\"/static/106a3a03959a84668cd55fac09ed2789/0a47e/usa-online-gambling-market-size.png 600w\"\n        sizes=\"(max-width: 600px) 100vw, 600px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: www.grandviewresearch.com</p>\n<p>This also means almost every player in the industry will compete to sustain in the competition, software developers will create more innovative games, and casinos will incorporate new <a href=\"https://www.loginradius.com/blog/2020/01/improving-customer-experience-in-the-gaming-industry/#:~:text=Online%20Gaming%20Industry%20Growth,around%2080%25%20of%20this%20revenue.\">ideas to improve customer experience</a>. So, what are these new ideas? </p>\n<p>Here are five key trends that could change the entire casino and gambling landscape.</p>\n<h3 id=\"1-rise-of-cryptocurrency-transactions-in-casinos\" style=\"position:relative;\"><a href=\"#1-rise-of-cryptocurrency-transactions-in-casinos\" aria-label=\"1 rise of cryptocurrency transactions in casinos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Rise of Cryptocurrency Transactions in Casinos</h3>\n<p>Cryptocurrencies are no longer the future. The majority of online gambling and casino operators have already switched to Bitcoin and other cryptocurrencies as their standard mode of payment. Clearly, they see many advantages. Some of which include:</p>\n<ul>\n<li>All operations are automatically recorded within the game, which is why nothing goes unnoticed. All settlement between players and casinos are entirely transparent. </li>\n<li>Gamblers need not enter their data during deposits. Also, it is virtually impossible to hack blockchain systems.</li>\n<li>Cryptocurrency payment transaction fees are either zero or considerably smaller than in paper currency transactions.</li>\n<li>Replenishment of deposits and withdrawals would require comparatively lesser time than the traditional payment method.</li>\n<li>Players can execute all transactions anonymously by replenishing casino accounts using cryptocurrencies.</li>\n</ul>\n<h3 id=\"2-adoption-of-ar-and-vr-in-casinos\" style=\"position:relative;\"><a href=\"#2-adoption-of-ar-and-vr-in-casinos\" aria-label=\"2 adoption of ar and vr in casinos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Adoption of AR and VR in Casinos</h3>\n<p><a href=\"https://www.cnbc.com/2016/10/10/virtual-reality-gambling-expected-to-grow-800-percent-by-2021-driven-by-high-rollers.html\">Virtual reality (VR) is another dimension</a> that has been working its way into the gaming industry - with many casinos already integrating it into their environment.</p>\n<p>What this technology does is it designs an entirely new environment, a whole new reality. An example of this is poker, where multiple players share one environment, adding to the experience.</p>\n<p>Similar to virtual reality, there is another technology called augmented reality (AR). Unlike VR, however, AR supplements the current environment with computer overlays. Heard of Pokémon Go? It uses AR, and now it is gearing up to enter the gambling industry.</p>\n<p>Considering that this technology improves an already established environment, live gaming is expected to become even more captivating.</p>\n<h3 id=\"3-customers-evolving-gambling-habits\" style=\"position:relative;\"><a href=\"#3-customers-evolving-gambling-habits\" aria-label=\"3 customers evolving gambling habits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Customer's Evolving Gambling Habits</h3>\n<p>It is no brainer that the customer's habit evolves with time. Social gambling and the rising popularity of gambling applications are some of the biggest indicators in this regard. Players can now easily compete on leaderboards and participate in social slots, whenever they want to.</p>\n<p><a href=\"https://www.casino.org/features/gambling-statistics/\">Mobile technology</a> has been a massive influence on people with a huge percentage of the world's population owning a smartphone. Casinos are more than ever investing in gaming applications and creating mobile-friendly games. It seems like mobile games will soon take over their desktop competition.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 600px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAKCAIAAAA7N+mxAAAACXBIWXMAAAsTAAALEwEAmpwYAAABgElEQVQoz41QO0vDUBQOKA4Ogovg7OYDRRcVpSAUOwiK4GOpjwrFWRCkILpVnPoHnF1UqBQXsSgipQhCVbDQ1sQmfSS5iU3SpGlubq5pSotDK358HC7nnO/ccz4iFAhbGEMD6brxmaK/yDyZpu1HJpWl0jSVZrJkjqYKWTKfp9lMkiowHDRMEyKbxNtzSlarkqLbZDlJFtWqCrUKFASFK5YAJwNOEnhZ4KRvoNi0GzRFt1lRdAI3YDkxyfIX0fjt1UNZVmtJC/8BwnLq9Xj58jF8EBzfCIx0za1N7zJUAdcugoqDFuLmn0zF2oyJ7rMbl/9opm9xgJg69J/aecOAHMezxWJrMXLU9zxciWvb72g9FJns9Yx1u5cndgzdQBjnWB4A/i9xomSuxhTvK9wKp2b7lwY7XL75vdraCPGCKElSm7UbCCa1hXjFe1cY7fEMdbqikafaaBO1Ney31WUTn+fRcULa951Erx+bRtZHtxDLsiyKIrBvAkAEvGXoCP8XP/E4EpRBd3ObAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"europe online gambling market share\"\n        title=\"europe online gambling market share\"\n        src=\"/static/2c6d0a3f840707d36a4a2d7b127b9c3c/0a47e/europe-online-gambling-market-share.png\"\n        srcset=\"/static/2c6d0a3f840707d36a4a2d7b127b9c3c/0a47e/europe-online-gambling-market-share.png 600w\"\n        sizes=\"(max-width: 600px) 100vw, 600px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>Source: www.grandviewresearch.com</em></p>\n<h3 id=\"4-stricter-casinos--gambling-regulations\" style=\"position:relative;\"><a href=\"#4-stricter-casinos--gambling-regulations\" aria-label=\"4 stricter casinos  gambling regulations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Stricter Casinos &#x26; Gambling Regulations</h3>\n<p>The world is getting pretty serious about gambling. Some countries have already legalized online gambling, while others are looking forward to making a move in 2020. </p>\n<p>For example, Belarus legalized online casinos in 2019, Ukraine introduced a bill to legalize gaming. Russia has simplified the identification procedure required in betting, and even the UK accepted the obligatory requirements related to customer identification. </p>\n<h3 id=\"5-evolution-of-live-casinos\" style=\"position:relative;\"><a href=\"#5-evolution-of-live-casinos\" aria-label=\"5 evolution of live casinos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Evolution of Live Casinos</h3>\n<p>Another milestone in online gambling is probably the rapid evolution of live casinos. Games are carried out by dealers with professional lighting and sound equipment from exclusive studios. </p>\n<p>Then, cameras are mounted at various room angles, so players can witness everything that's happening inside the studio. Going forward, the concept of a live casino will gain even more popularity.</p>\n<h2 id=\"why-is-online-gambling-and-casino-security-so-crucial\" style=\"position:relative;\"><a href=\"#why-is-online-gambling-and-casino-security-so-crucial\" aria-label=\"why is online gambling and casino security so crucial permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Is Online Gambling and Casino Security So Crucial</h2>\n<p>In 2020, reducing the effects of cyber attacks and online fraud is crucial to sustaining the online gambling industry. Hackers are becoming extremely advanced, using tools and implementing sophisticated techniques like signal manipulation through fake apps and app-based hacking to breach data and break down online security protocols.</p>\n<p>Besides, Statista.com estimates that the global online gambling market will be valued at more than <a href=\"https://www.statista.com/statistics/270728/market-volume-of-online-gaming-worldwide/\">$94 billion USD in 2024</a> - meaning more the figure, more the risk of cybercrime.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 74.46153846153845%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAPCAYAAADkmO9VAAAACXBIWXMAAAsTAAALEwEAmpwYAAACQklEQVQ4y4VTyW4TQRCdv0GKkIAkhEUQ8gcc4AB/gCBAcIhYzqBIIIQEF5D4AS4Ewicg9ps93u2xx0ts4/ESx9iz9TyqemacCZi4pVJNVb1+/aaqW8kWytD0GkqVOvKajlxRR0GrQE0XkEjnkc5pSGWLKJQq0hfLVZQIz5738R7GNlsGeClGdxe1Rhud3gDd/gD1poFWuwvTsuG6QprjuORDExBCwPO8SZ3jMKeEIPacDL+5KNiE538H/u98WPNzAop/kk8mF8Xw9sFRY5xtO7CmmOOQUV2R7BHJh5llWfBcm051/jHXsahuE2FE4WFkPs5GuTnE90wfP7I9fIq38DPbl3GzM6K64/eQ5c5S57rUCrh4tlXHkWtxnIypmF9TsXhHxdyNON59bsu6wmSmaR5QMml8JA4JX37cwQIRrTxIYfl+ChfILxH59jdjOiFNJLBw+XFI+GJ7ByduJyTZuXspnCfPKj9MI+QBmbagqQnsDccYmY6MbYeukphB+DXyy6PRWGrRGmNc2szj6tMCLm9mcOVJDhcf5fD4bT1Q6wSE6n8IBV8b/zLzSldHOE6nc0+W1pM4fTeJuetxrL4qB4Szfln414afFvcpWxvjzEYSy0HDVx6msUDg2Bv9oEIaCg+DCRm3GGPCiEIhvInC+bUEKVNxal0lchVHV+O4+bo0IXz+vi5zZzcCDGGP3Upg68uvfUJPqrQxoEFkKrvIVQdQtQ4yep/iAfTmHr0CExYNr2EMZY5riaIhsbzH6P2WHH8ANGkuunVzCGYAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"online gambling market 2017 2024 1 1024x763\"\n        title=\"online gambling market 2017 2024 1 1024x763\"\n        src=\"/static/2e8bcf67c1f60144382c72094228925f/e5715/online-gambling-market-2017-2024-1-1024x763.png\"\n        srcset=\"/static/2e8bcf67c1f60144382c72094228925f/a6d36/online-gambling-market-2017-2024-1-1024x763.png 650w,\n/static/2e8bcf67c1f60144382c72094228925f/e5715/online-gambling-market-2017-2024-1-1024x763.png 768w,\n/static/2e8bcf67c1f60144382c72094228925f/2bef9/online-gambling-market-2017-2024-1-1024x763.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: statista</p>\n<p>More than ever now is the time when cyber protection will play a critical role in the continued development and success of this revolutionary online gambling industry.</p>\n<h2 id=\"recent-cyber-attacks-in-online-gambling-sites\" style=\"position:relative;\"><a href=\"#recent-cyber-attacks-in-online-gambling-sites\" aria-label=\"recent cyber attacks in online gambling sites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Recent Cyber Attacks in Online Gambling Sites</h2>\n<p>The primary <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">threat to cybersecurity</a> that online casinos face is hacking. It may include targeted attacks forcing servers to get swamped with bot traffic, or it may consist of more sophisticated tactics designed to gain access to confidential customer data. </p>\n<p>Here are a few instances of recent breaches that will help you understand its severity in today's online gambling threat landscape. </p>\n<ul>\n<li>A group of professional Chinese hackers has officially confirmed that they have been <a href=\"https://www.zdnet.com/article/chinese-hackers-have-breached-online-betting-and-gambling-sites/\">hacking into gambling companies</a> and online betting websites in Southeast Asia since 2019. </li>\n<li>According to what is believed to be one of the biggest breaches of government data, betting companies acquired <a href=\"https://www.dailymail.co.uk/news/article-7904287/Betting-firms-granted-access-database-28-MILLION-children.html\">28 million children's database</a> in England, Wales, and Northern Ireland. The news surfaces in January 2020. </li>\n<li>SBTech, a popular supplier of sports betting and iGaming platform solutions, suffered a <a href=\"https://egr.global/intel/news/sbtech-partners-experience-72-hour-downtime-after-cybersecurity-attack/\">ransomware attack in March 2020</a>. Following which, it shut down its global datacentres. For more than 72 hours, clients were left without a consumer-facing website. Luckily, no data breach was recorded. </li>\n</ul>\n<h2 id=\"types-of-attacks-on-online-casino-betting-and-gambling-sites\" style=\"position:relative;\"><a href=\"#types-of-attacks-on-online-casino-betting-and-gambling-sites\" aria-label=\"types of attacks on online casino betting and gambling sites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Attacks on Online Casino, Betting and Gambling Sites </h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"online gambling, casino and betting sectors\"\n        title=\"online gambling, casino and betting sectors\"\n        src=\"/static/26529451dea558b794559117c0816437/e5715/online-gambling-casino-and-betting-sectors.png\"\n        srcset=\"/static/26529451dea558b794559117c0816437/a6d36/online-gambling-casino-and-betting-sectors.png 650w,\n/static/26529451dea558b794559117c0816437/e5715/online-gambling-casino-and-betting-sectors.png 768w,\n/static/26529451dea558b794559117c0816437/d0143/online-gambling-casino-and-betting-sectors.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Online gambling and casino sites face security threats from several sources. For starters, some external hackers launch attacks to commit fraud from the comfort of their home or anywhere (for that matter). Next, some insiders hold administrative positions inside the business itself and <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">steal customer details</a>. </p>\n<p>Anyway, let's understand some of the major types of cyberattacks impacting the gambling industry. </p>\n<h3 id=\"expediting\" style=\"position:relative;\"><a href=\"#expediting\" aria-label=\"expediting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Expediting </h3>\n<p>Expediting gameplay abuse is not new to the casino and online gambling industry. It is an automated threat that utilizes bots to speed up time-consuming actions, mostly to offer unfair advantages to players by violating rules in the gameplay. </p>\n<p>Expediting attacks decline user appeal, result in loss of subscription revenue, and may even risk your reputation as an online game service provider.</p>\n<h3 id=\"ddos-attack\" style=\"position:relative;\"><a href=\"#ddos-attack\" aria-label=\"ddos attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>DDoS Attack</h3>\n<p>In Distributed Denial of Service (DDoS) attacks, hackers flood gambling sites with an unexpected surge of traffic, leading to insignificant delays in loading times or completely crashing your website. </p>\n<p>Most naturally, players lose interest in the gambling company and jump off to their competitors.</p>\n<h3 id=\"scraping\" style=\"position:relative;\"><a href=\"#scraping\" aria-label=\"scraping permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Scraping </h3>\n<p>Scraping is another automated attack where hackers use bots to steal data from APIs, websites, and databases and consequently use those to exploit gambling operations. </p>\n<p>Scrapers often lead to increased risk of latency on gambling sites using excessive bandwidth with their requests, making legitimate customers suffer from long load times.</p>\n<h3 id=\"account-takeover-attacks\" style=\"position:relative;\"><a href=\"#account-takeover-attacks\" aria-label=\"account takeover attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Account Takeover Attacks</h3>\n<p><a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">Account takeover attack</a> is a complex challenge for the online gambling industry. Hackers gain illegal access to a genuine user profile to perform payment or identity fraud. </p>\n<p>In the gambling space, they steal players' resources and sell them on the dark market. They lure victims into accepting malicious friend requesting or by clicking on infected links. </p>\n<h3 id=\"sql-injection\" style=\"position:relative;\"><a href=\"#sql-injection\" aria-label=\"sql injection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SQL Injection </h3>\n<p>A Structured Query Language (SQL) injection attack happens when a hacker feeds infected SQL statements to take over the database server and add, modify, or delete data according to their will. </p>\n<p>By breaking into application security measures, hackers can easily pass through validation and approval checkpoints. This method of attack is mostly used by attackers to gain access over personal data, intellectual properties of gamblers, customer information, gaming secrets, and more.</p>\n<h2 id=\"how-loginradius-can-enhance-the-experience-of-online-gaming-with-advance-security\" style=\"position:relative;\"><a href=\"#how-loginradius-can-enhance-the-experience-of-online-gaming-with-advance-security\" aria-label=\"how loginradius can enhance the experience of online gaming with advance security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Can Enhance the Experience of Online Gaming With Advance Security</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How LoginRadius Can Enhance the Experience of Online Gaming\"\n        title=\"How LoginRadius Can Enhance the Experience of Online Gaming\"\n        src=\"/static/569c23acf120c7a7f73a522b7f8d6c6f/e5715/How-LoginRadius-Can-Enhance-the-Experience-of-Online-Gaming.png\"\n        srcset=\"/static/569c23acf120c7a7f73a522b7f8d6c6f/a6d36/How-LoginRadius-Can-Enhance-the-Experience-of-Online-Gaming.png 650w,\n/static/569c23acf120c7a7f73a522b7f8d6c6f/e5715/How-LoginRadius-Can-Enhance-the-Experience-of-Online-Gaming.png 768w,\n/static/569c23acf120c7a7f73a522b7f8d6c6f/2bef9/How-LoginRadius-Can-Enhance-the-Experience-of-Online-Gaming.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius is a powerful <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management (CIAM)</a> platform that protects online gamblers' identity and prevents even the most sophisticated bots from infecting the gaming provider. It detects and blocks automated threats, including expediting, scraping, account takeover, DDoS, and more.</p>\n<p>Here's how the LoginRadius platform protects the gaming industry from malicious bot attacks and significantly improving customer experience.</p>\n<ul>\n<li><strong>Multi-Factor Authentication</strong>: The platform adds additional layers of protection by enabling two-factor or <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multifactor authentication</a> on both player and admin accounts. It also offers real-time fraud analysis and data management features. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/fixing-broken-authentication-with-adaptive-mfa/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"adaptive-mfa\"\n        title=\"adaptive-mfa\"\n        src=\"/static/38581e51de794ee73778cc943c5b9537/e5715/adaptive-mfa.png\"\n        srcset=\"/static/38581e51de794ee73778cc943c5b9537/a6d36/adaptive-mfa.png 650w,\n/static/38581e51de794ee73778cc943c5b9537/e5715/adaptive-mfa.png 768w,\n/static/38581e51de794ee73778cc943c5b9537/63ff0/adaptive-mfa.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>Passwordless Login</strong>: Eliminating the <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">use of passwords</a> altogether can surprisingly improve gamblers' retention and loyalty because there will be no passwords to hack in the first place. Also, there is a one-touch login feature where customers login with a magic link or OTP.</li>\n<li><strong>Security Compliance</strong>: LoginRadius is <a href=\"https://www.loginradius.com/compliances/\">compliant with international regulatory standards</a> like COPPA, CCPA, and GDPR. The platform does not allow minor users to register.</li>\n<li><strong>360-Degree View</strong>: Gambling service providers can enjoy a comprehensive view of their customer demographics and detect abnormal user activity. The objective is to help them understand the players' behavior and offer <a href=\"https://www.loginradius.com/customer-experience-solutions/\">them better experiences</a>. </li>\n<li><strong>Consent Management</strong>: It is another popular addition to the LoginRadius identity platform. The feature manages the consent of gamblers about data collection, storage, and communication. If need be, they can also <a href=\"https://www.loginradius.com/blog/2020/05/consent-management/\">change existing permissions</a>.  </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Adhering to the COVID situation and keeping social distancing in mind, more and more people are turning to the multi-billion dollar gambling industry to find solace. Protecting online casinos, betting, and gambling site from malicious bots is a big deal. </p>\n<p>With the ongoing pandemic situation, gambling providers should primarily focus on ensuring that gambling is fair, crime-free, and protects minors. A <a href=\"https://www.loginradius.com/blog/identity/perfect-ciam-platform/\">CIAM platform</a> can help you tap all these touchpoints.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 25, 2020","updated_date":null,"description":"The online gambling industry, needs to take the necessary steps to build safe and secure platforms for casino operators and consumers.","title":"Online Casino and Gambling Industry Is Gaining Momentum, So Is the Cyber Threat","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/157f70b02980957b8bc5f126cabcac29/c3e3a/Online-Casino-and-Gambling-Industry.jpg","srcSet":"/static/157f70b02980957b8bc5f126cabcac29/f836f/Online-Casino-and-Gambling-Industry.jpg 200w,\n/static/157f70b02980957b8bc5f126cabcac29/2244e/Online-Casino-and-Gambling-Industry.jpg 400w,\n/static/157f70b02980957b8bc5f126cabcac29/c3e3a/Online-Casino-and-Gambling-Industry.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Idx-Auto-Tester is LoginRadius Identify Experience Automation Framework which refers to IEF Automation, is an open-source automation…","fields":{"slug":"/engineering/introduction-of-idx-auto-tester/"},"html":"<p><a href=\"https://github.com/LoginRadius/idx-auto-tester\">Idx-Auto-Tester</a> is LoginRadius Identify Experience Automation Framework which refers to IEF Automation, is an open-source automation framework built-in Nightwatch| Node.js tool with delivering all the standard authentication cases of LoginRadius Identity Experience.\nThis automation framework has been created for <a href=\"https://www.loginradius.com/docs/libraries/identity-experience-framework/overview/#identity-experience-framework\">The LoginRadius Identity Experience Framework</a> which is a ready-to-use solution that provides predefined layouts for all necessary authentication actions. It has all of the user accounts flows available, such as login, registration, forgotten password, and profile management.</p>\n<h2 id=\"technology-used-to-create-idx-auto-tester\" style=\"position:relative;\"><a href=\"#technology-used-to-create-idx-auto-tester\" aria-label=\"technology used to create idx auto tester permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Technology used to create Idx-Auto-Tester</h2>\n<p>We used Nightwatch.js end-to-end testing framework to create our Idx-Auto-Tester. This framework relies on Selenium and provides several commands and assertions within the framework to perform operations on DOM elements. It internally uses the powerful W3C Webdriver API or the Selenium Webdriver and simplifies writing end-to-end automated tests in Node.js and effortlessly sets up for Continuous Integration.</p>\n<p>Nightwatch uses JavaScript language (Node.js) and CSS/XPath to identify an element. It has Built-in command-line test runner which can run the tests either sequentially or in parallel, together, by group, tags, or by single.</p>\n<h2 id=\"installation\" style=\"position:relative;\"><a href=\"#installation\" aria-label=\"installation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Installation</h2>\n<p>Step 1: <a href=\"http://www.oracle.com/technetwork/java/javase/downloads/index.html\">Download and Install Java</a>.</p>\n<p>Step 2: <a href=\"https://nodejs.org/en/\">Install Node.js</a>.</p>\n<p>Step 3: Install Nightwatch. In the command line, navigate to any directory and type</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  npm install -g nightwatch (here ‘g’ is for installing globally).</span></code></pre>\n<p>Step 4: Create a folder structure as shown below where Project is the root.</p>\n<p><img src=\"https://lh6.googleusercontent.com/ELzKfQlR5jHkRzeVW_9S0VxLD8vSfo2hJCvQxf37DZjwaod1Me05BzIs2Vk9unKneDda1PpI6TdmhvH7KnqFgCP0cRhIxORM9sfTn9RSTlTC40pwScwLLprVX2uu6sltu3kClQsc\"></p>\n<p>Step 5. Now it is required to install selenium-server-standalone.jar and chromedriver.exe along with other dependencies to execute test cases.</p>\n<p>As all the dependencies are added in nightwatch.json, so by executing below command, these will be added in node_modules folder</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  npm install</span></code></pre>\n<h2 id=\"configuring-and-setting-up-nightwatchjs\" style=\"position:relative;\"><a href=\"#configuring-and-setting-up-nightwatchjs\" aria-label=\"configuring and setting up nightwatchjs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Configuring and Setting up Nightwatch.js</h2>\n<p>Now we have installed all the dependencies and configuration setup for the automation framework. Nightwatch.js offers an in-built test runner which expects a JSON configuration file to be passed. The default configuration file is nightwatch.json which should be present in the project’s root directory.</p>\n<p>Step 6. In the root folder, create “nightwatch.js” file and place the following line:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"javascript\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">require</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;nightwatch/bin/runner.js&quot;</span><span class=\"mtk1\">)</span></span></code></pre>\n<p>Step 7. Now create <code>nightwatch.json</code> configuration file with the configurations mentioned as below code snippet for testing with Selenium and JavaScript.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"json\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;src_folders&quot;</span><span class=\"mtk1\">: [</span><span class=\"mtk8\">&quot;test&quot;</span><span class=\"mtk1\">],</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;output_folder&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;tests_output&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;custom_commands_path&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;helpers/custom-commands&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;custom_assertions_path&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;page_objects_path&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;globals_path&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;test_workers&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;enabled&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">false</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;workers&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk7\">3</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  },</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;selenium&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;start_process&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">true</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;server_path&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;node_modules/selenium-server-standalone-jar/jar/selenium-server-standalone-3.13.0.jar&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;log_path&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;host&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;127.0.0.1&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;port&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk7\">4444</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;cli_args&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;webdriver.chrome.driver&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;node_modules/chromedriver/lib/chromedriver/chromedriver.exe&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;webdriver.ie.driver&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  },</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">&quot;test_settings&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;default&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;skip_testcases_on_fail&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">false</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;launch_url&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;http://localhost&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;selenium_port&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk7\">4444</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;selenium_host&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;127.0.0.1&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;silent&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">true</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;screenshots&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;enabled&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">true</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;path&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;screenshots&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      },</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;desiredCapabilities&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;browserName&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;chrome&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;javascriptEnabled&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">false</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;acceptSslCerts&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">false</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;chromeOptions&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          </span><span class=\"mtk12\">&quot;args&quot;</span><span class=\"mtk1\">: [</span><span class=\"mtk8\">&quot;--headless-none&quot;</span><span class=\"mtk1\">]</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    },</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;firefox&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;desiredCapabilities&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;browserName&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;firefox&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;javascriptEnabled&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">true</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;acceptSslCerts&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">true</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;cli_args&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          </span><span class=\"mtk12\">&quot;globals&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">            </span><span class=\"mtk12\">&quot;env&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;fire  fox&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    },</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;ie&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">&quot;desiredCapabilities&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;browserName&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;internet explorer&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;javascriptEnabled&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">true</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;acceptSslCerts&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">true</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">&quot;cli_args&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          </span><span class=\"mtk12\">&quot;globals&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">            </span><span class=\"mtk12\">&quot;env&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;ie&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>Step 8. Now its time to design test case of any scenario, same as created in our <a href=\"https://github.com/LoginRadius/idx-auto-tester\">Idx-Auto-Tester</a> Framework under <strong>test</strong> folder named as <strong>TC<em>01</em>UserLogin</strong></p>\n<p>To create functions/methods, we used nightwatch custom commands approach to create commands for all the required functions under custom-commands folder, like as there is command created for <strong>createUser.js</strong> which used to create the user and call it under test case.</p>\n<blockquote>\n<p>Note: We are using 'Function-style commands' of Nightwatch to create command to resolve the asynchronous queueing system problem while running the test case.</p>\n</blockquote>\n<p>Step 9. The final thing we are required to do is to execute the tests from the base directory of the project using the command:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">npm test</span></code></pre>\n<blockquote>\n<p>Important Tip : A script has been added in package.json to define test execution command:</p>\n</blockquote>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"json\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk8\">&quot;scripts&quot;</span><span class=\"mtk1\">:</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;test&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;node nightwatch.js --reporter html-reporter.js test&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span></code></pre>\n<p>This command will validate the tests and dependencies and then execute the test suite, which will open up the mentioned browser and execute the desired test steps.</p>\n<h2 id=\"parallel-testing-with-nightwatchjs-in-selenium-webdriver\" style=\"position:relative;\"><a href=\"#parallel-testing-with-nightwatchjs-in-selenium-webdriver\" aria-label=\"parallel testing with nightwatchjs in selenium webdriver permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Parallel Testing with Nightwatch.js in Selenium WebDriver</h2>\n<p>It is required to update the configuration to execute the tests in parallel by enabling the test_workers as true. This will enable parallel execution and execute all tests on a defined number of workers.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"json\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;test_workers&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;enabled&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">true</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">&quot;workers&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk7\">3</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  },</span></span></code></pre>\n<h2 id=\"this-is-all-about-idx-auto-tester-framework-implementation\" style=\"position:relative;\"><a href=\"#this-is-all-about-idx-auto-tester-framework-implementation\" aria-label=\"this is all about idx auto tester framework implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>This is all about Idx-Auto-Tester Framework Implementation</h2>\n<p>In this framework design, we have covered various flows of LoginRadius Identity Experience Automation testing with Selenium Javascript. I hope we are now clear about the approach for an end-to-end automation testing with Selenium JavaScript using Nightwatch.js with the reference of Idx-Auto-Tester. We are aware of all the prerequisites required for setting up Nightwatch.js. It automates the entire test suite quickly with minimal configuration and is readable as well as easy to update. Our framework is also capable to use the best feature provided by Nightwatch.js framework which is the parallel testing of cases that proves to be time-efficient. The test results can directly be read from the terminal and also stored at a specified output folder.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n</style>","frontmatter":{"date":"June 22, 2020","updated_date":null,"description":null,"title":"Introduction of Idx-Auto-Tester","tags":["Automation","Idx-Auto-Tester"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/0081dfe350298b300d58aa44264cb5e8/ee604/idx-auto-tester.png","srcSet":"/static/0081dfe350298b300d58aa44264cb5e8/69585/idx-auto-tester.png 200w,\n/static/0081dfe350298b300d58aa44264cb5e8/497c6/idx-auto-tester.png 400w,\n/static/0081dfe350298b300d58aa44264cb5e8/ee604/idx-auto-tester.png 800w,\n/static/0081dfe350298b300d58aa44264cb5e8/f3583/idx-auto-tester.png 1200w,\n/static/0081dfe350298b300d58aa44264cb5e8/e4d72/idx-auto-tester.png 1280w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Himanshi Sharma","github":"Himanshi0512","avatar":null}}}},{"node":{"excerpt":"Authenticity, accountability, and excellent customer experience are the building blocks that sustain customer loyalty in the long run…","fields":{"slug":"/identity/consumer-data-privacy-security/"},"html":"<p>Authenticity, accountability, and excellent customer experience are the building blocks that sustain customer loyalty in the long run. Businesses need to be vocal about how responsible they are when it comes to consumer data privacy and security.</p>\n<p>Needless-to-say, brands that put consumers in charge of how their data is collected and used can reduce customer churn by a considerable margin.</p>\n<p>Following the popularity of the EU's General Data Protection Regulation (GDPR) that went live in May 2018, other countries worldwide have been catching up and taking action.</p>\n<p>2020 started in the right direction with the <a href=\"https://www.loginradius.com/blog/2019/05/ccpa-introduction/\">California Consumer Privacy Act (CCPA)</a>. This year we should expect even more stringent legislation concerning data protection rights for consumers.</p>\n<p>Next in line is the <a href=\"http://www.mainelegislature.org/legis/bills/getPDF.asp?paper=SP0275&#x26;item=9&#x26;snum=129\">privacy law of Maine</a>, which is scheduled to come into force in July 2020. The legislation would mandate broadband internet service providers (ISPs) to receive explicit, affirmative consent from a customer before accessing their personal data, including their browsing history.</p>\n<p><em>A question arises.</em></p>\n<h2 id=\"what-does-the-latest-data-privacy-inclusions-say-about-consumers\" style=\"position:relative;\"><a href=\"#what-does-the-latest-data-privacy-inclusions-say-about-consumers\" aria-label=\"what does the latest data privacy inclusions say about consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Does the Latest Data Privacy Inclusions Say About Consumers</h2>\n<p>There is a common belief among consumers that today's data protection is more complicated than it was in the past. Here are a few statistics that highlight the statement.</p>\n<ul>\n<li>84% of <a href=\"https://www.cisco.com/c/dam/global/en_uk/products/collateral/security/cybersecurity-series-2019-cps.pdf\">Cisco Consumer Privacy Survey</a> respondents showed that they care about the privacy of their data, as well as other users' data, and want more control over how their data is being used. 80% of this group also said they were willing to act to protect it.</li>\n<li>48% of consumer data privacy respondents suggested that they had already changed organizations or providers because of their data policies or data sharing activities, in the same report.</li>\n<li>According to the <a href=\"https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/\">Pew Research Center</a>, 79% of respondents said they are very or somewhat worried about how companies use the data they collect. In contrast, 64 percent said they have the same degree of concern about the collection of government data.</li>\n<li>81% of respondents feel they have no control over the collected data in the same report. </li>\n<li>According to another <a href=\"https://www.salesforce.com/company/news-press/stories/2019/06/061219-g/\">research by Salesforce</a>, 46% of respondents feel they have completely lost control over their own data.</li>\n<li>A ground-breaking reality is that today consumers trust companies far less than they used to in the past. 79% of Americans are not sure how companies will respond when it comes to handling and protecting their personal information.</li>\n<li>Approximately seven-in-ten or more say they are either not too confident or not at all that companies will take responsibility when their data is compromised or misused, states the Pew Research Center.</li>\n</ul>\n<h2 id=\"biggest-data-privacy-pain-points-of-consumers\" style=\"position:relative;\"><a href=\"#biggest-data-privacy-pain-points-of-consumers\" aria-label=\"biggest data privacy pain points of consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biggest Data Privacy Pain Points of Consumers</h2>\n<p>This goes without saying that consumer data privacy is broadly transforming businesses today, and it is the responsibility of companies to manage the information they collect. Consumers are becoming more and more conscious about what kinds of data they share — and with whom.</p>\n<p>Stakes are high for companies that handle data. Even consumers who aren't directly affected pay attention to the way such companies <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">respond to the data breach</a>. They are majorly concerned about the following pain points.</p>\n<h3 id=\"misuse-of-sensitive-data\" style=\"position:relative;\"><a href=\"#misuse-of-sensitive-data\" aria-label=\"misuse of sensitive data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Misuse of sensitive data</strong></h3>\n<p>Data breaches have a greater reputational and financial consequence when sensitive personal data is involved. This contains information relating to political opinion, ethnic or racial origin, religious beliefs, genetic data, and biometric data.</p>\n<p>Misuse of sensitive data can cause far more harm than the names, addresses, and financial information.</p>\n<h3 id=\"trading-of-personal-data\" style=\"position:relative;\"><a href=\"#trading-of-personal-data\" aria-label=\"trading of personal data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Trading of personal data</strong></h3>\n<p>The controversial corner of the web, called the \"<a href=\"https://en.wikipedia.org/wiki/Dark_web\">dark web</a>,\" is widely known for trading stolen data, which can only be accessed via specific browsers. Hackers may be searching simply for a way into the networks of customers. </p>\n<p>They can attack computers/phones by imitating popular brands and stealing personal information without people even realizing it!</p>\n<h3 id=\"data-breach-due-to-human-error\" style=\"position:relative;\"><a href=\"#data-breach-due-to-human-error\" aria-label=\"data breach due to human error permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Data breach due to human error</strong></h3>\n<p>There is a well-documented history of human error, causing data breaches. Sadly, it is often people who allow access to encrypted channels and sensitive information for attackers. An attacker can undoubtedly take advantage of zero-day vulnerabilities to break into a network, but in most cases, their performance requires capitalizing human error.</p>\n<p>According to Verizon's <a href=\"https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf\">2019 Data Breach Investigations Report</a> (DBIR), 21% of breaches were a result of casual events like misdelivery, loss, and other kinds of human-initiated errors.</p>\n<h2 id=\"impact-of-consumer-data-privacy-on-businesses\" style=\"position:relative;\"><a href=\"#impact-of-consumer-data-privacy-on-businesses\" aria-label=\"impact of consumer data privacy on businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Impact of Consumer Data Privacy on Businesses</h2>\n<p>Today, consumers are more mindful of the effect data privacy has on their personal lives than ever before. But how do companies respond to this change in consumer thinking — and more relevantly, how does it impact the way they do business?</p>\n<p>New consumer data privacy regulations have been affecting every aspect of a business. Organizations must manage consumer interactions with privacy demands, develop new organizational positions to manage regulatory interactions, and educate employees on the current regulations.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-CCPA-consumer-identity\"\n        title=\"WP-CCPA-consumer-identity\"\n        src=\"/static/1481383a8bd729cb7a04ba68067f96b3/e5715/WP-CCPA-consumer-identity.png\"\n        srcset=\"/static/1481383a8bd729cb7a04ba68067f96b3/a6d36/WP-CCPA-consumer-identity.png 650w,\n/static/1481383a8bd729cb7a04ba68067f96b3/e5715/WP-CCPA-consumer-identity.png 768w,\n/static/1481383a8bd729cb7a04ba68067f96b3/81501/WP-CCPA-consumer-identity.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>In general, consumer data privacy laws have three different impacts on every organization.</p>\n<ul>\n<li><strong>Operational Impact</strong> – What are the new ways to conduct business to comply with new privacy laws?</li>\n<li><strong>Technology Impact</strong> – What are the new capabilities to enable compliance and minimize risk to reputation?</li>\n<li><strong>Organizational Impact</strong> – Are there any new roles that need to be created to enable data privacy?</li>\n</ul>\n<p>The laws regulating data privacy are in the preliminary stages, with more revisions and iterations to come. The new compliance requirements offer organizations the opportunity to evaluate other data opportunities and build more robust data management strategies.</p>\n<h2 id=\"impact-of-data-privacy-on-consumers\" style=\"position:relative;\"><a href=\"#impact-of-data-privacy-on-consumers\" aria-label=\"impact of data privacy on consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Impact of Data Privacy on Consumers</h2>\n<p>Consumers are starting to realize that data is the currency that allows free or near-free services, and they are carefully thinking about the drawbacks of sharing personal data.</p>\n<p>Data regulations like <a href=\"https://www.loginradius.com/blog/2019/09/ccpa-vs-gdpr-the-compliance-war/\">GDPR and CCPA</a> surfaced and were enacted because companies were not as cautious as they needed to be when it came to consumer data security. </p>\n<p>Here's how data regulations are leveling-up their customer experience game:</p>\n<ul>\n<li><strong>Trust and transparency</strong>: When consumers understand the specifics of who, what, where, when, and why data collection strategies, it's much simpler to have them on board and create the trust for brand loyalty.</li>\n<li><strong>First-party relationships</strong>: Consumers are the gatekeepers at this stage in the evolution of marketing. It takes transparency, strong tactics, and reliable marketing tools for brands to obtain customer consent.</li>\n<li><strong>Data review rights</strong>: Speaking of more vibrant and more dynamic customer experience, brands are inclining towards implementing data privacy - improving the consumer relationship through the purchaser's journey on multiple levels.</li>\n</ul>\n<p>Consumers have the authority to set a brand apart from its competitors. So, when they see that efforts are made to keep their personal information safe and secure, they appreciate it.</p>\n<h2 id=\"list-of-popular-data-privacy-laws-and-acts-around-the-world\" style=\"position:relative;\"><a href=\"#list-of-popular-data-privacy-laws-and-acts-around-the-world\" aria-label=\"list of popular data privacy laws and acts around the world permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>List of Popular Data Privacy Laws and Acts Around the World</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 59.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAAAsSAAALEgHS3X78AAACEElEQVQoz1WSa1PaYBCF+QB5X0gAhYTb9MJECMr9DrlBIAkhAtpOAaWiaLHT6f//Az0B0enMfiBhz549z8YXlLT/qqB7dXokOYWvWXzd9osKKY4DZVtoTuNVk+RU/Ov7kOVVmpOJ2CcXMs2r7+9TLYe7HCS1Ja8uw/1lqGKnmpNjw5uY5hR6aXD161jvVmjPIldDzzavsgVdaNjxmiVq39JtVxwuSV5Lt6cfYijZupuwXhL2PmI8sfqDoN+lO260PAqIMpzR/VVZfOrNMh03UjQSTYccxTSvsGU75bxy+oO/syS9dVC5J/KG1mfplpNqTaGEjK/Z0ZJxXhlnOtehExQfciYH95y+DXRXjPbIDXe8ucsu/iZGj1TSYHhsjVXNz/05ZjEIeCLiwzxh8NPfXRNty4xeUX55k53/yUx+MZIeq4xjVQvMAxdyuGh8kRcwB7+3zNHiMK6tA7010Z888fg3o26T1gvtruDscfYSKsAGCmeV8WFz9/xwLc+Zb88gpvKGDHbB4Q6ZBXtPa27wMD7RmECAEd7CJQvXBi2QBzkfkAp1iylapLvkzee0sxfM54S2QlRsCxnuBH1IUmnJBEXamNPCIHzlbeQLSbibG5RUrmRkjbuk/D3TX2AcUqGSLceD0rDPyqOsegNbtmSJ6i1sPfFxPDCilZUOdcCL9yAMMbYV6jZaJeMHPtX3HzjePyccfN76vjwvAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Different data privacy laws and acts\"\n        title=\"Different data privacy laws and acts\"\n        src=\"/static/685317f890756a0a9ef749f27a48c7f4/e5715/Different-data-privacy-laws-and-acts.png\"\n        srcset=\"/static/685317f890756a0a9ef749f27a48c7f4/a6d36/Different-data-privacy-laws-and-acts.png 650w,\n/static/685317f890756a0a9ef749f27a48c7f4/e5715/Different-data-privacy-laws-and-acts.png 768w,\n/static/685317f890756a0a9ef749f27a48c7f4/2bef9/Different-data-privacy-laws-and-acts.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h4 id=\"the-european-unions-data-privacy-laws\" style=\"position:relative;\"><a href=\"#the-european-unions-data-privacy-laws\" aria-label=\"the european unions data privacy laws permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>The European Union's Data Privacy Laws</strong></h4>\n<ul>\n<li><strong>GDPR 2018</strong>: A regulation requiring companies to protect EU citizens' personal data and privacy for transactions conducted within the EU member states.</li>\n</ul>\n<h4 id=\"the-us-data-privacy-laws\" style=\"position:relative;\"><a href=\"#the-us-data-privacy-laws\" aria-label=\"the us data privacy laws permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>The US Data Privacy Laws</strong></h4>\n<ul>\n<li><strong>COPAA 2000</strong>: A regulation imposing requirements on website operators or online services that collected children's personal data under the age of 13.</li>\n<li><strong>CCPA 2020</strong>: A law allowing users to request a copy of their data, delete it when they no longer want companies to have it, and mandate that companies do not sell their data to third parties.</li>\n<li><strong>US Privacy Act of 1974</strong>: A law imposing restrictions on data held by government agencies. </li>\n</ul>\n<h4 id=\"data-privacy-in-healthcare\" style=\"position:relative;\"><a href=\"#data-privacy-in-healthcare\" aria-label=\"data privacy in healthcare permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Data Privacy in Healthcare</strong></h4>\n<ul>\n<li><strong>HIPAA 1996:</strong> A law protecting patients' sensitive healthcare information from being disclosed without consent.</li>\n</ul>\n<h4 id=\"data-privacy-for-financial-institutions\" style=\"position:relative;\"><a href=\"#data-privacy-for-financial-institutions\" aria-label=\"data privacy for financial institutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Data Privacy for Financial Institutions</strong></h4>\n<ul>\n<li><strong>GLBA 1999</strong>: A law protecting financial nonpublic personal information and requiring financial institutions to explain how they share personal information of customers.</li>\n</ul>\n<h4 id=\"other-data-privacy-laws\" style=\"position:relative;\"><a href=\"#other-data-privacy-laws\" aria-label=\"other data privacy laws permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Other Data Privacy Laws</strong></h4>\n<ul>\n<li><strong>Privacy rule 2000</strong>: A law fortifying HIPPA and protecting the private healthcare information of the public. </li>\n<li><strong>SOX 2002</strong>: A law protecting individuals from unconstitutional practices by corporations. </li>\n<li><strong>FISMA 2002</strong>: A comprehensive framework protecting government data, operations and assets from unlawful use</li>\n<li><strong>ISO 27001 2013</strong>: A regulatory framework imposing security on any kind of digital information.</li>\n</ul>\n<h2 id=\"proactive-steps-for-companies-to-prevent-privacy-hack\" style=\"position:relative;\"><a href=\"#proactive-steps-for-companies-to-prevent-privacy-hack\" aria-label=\"proactive steps for companies to prevent privacy hack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Proactive Steps for Companies to Prevent Privacy Hack</h2>\n<p><a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">Cyber-attacks have become</a> a harsh reality for virtually every consumer and organization today. It doesn't matter anymore who the victim is, or what is the size of the organization that has fallen prey, the looming threat metrics about hackers' intention to steal data is real.</p>\n<p>What actions can companies take to prevent hackers and protect consumer assets?</p>\n<h3 id=\"take-data-mapping-seriously\" style=\"position:relative;\"><a href=\"#take-data-mapping-seriously\" aria-label=\"take data mapping seriously permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Take data mapping seriously</strong></h3>\n<p>Companies need to know what customer data they need to get the job done. Because it so happens that companies do not use the data they collect from customers - not for analytics or even to address any future need. </p>\n<p>It is only reasonable for companies not to collect any unnecessary data. No wonder, a lot of companies are considering re-writing <a href=\"https://www.loginradius.com/security/\">their security policies</a>. </p>\n<h3 id=\"timely-risk-assessment\" style=\"position:relative;\"><a href=\"#timely-risk-assessment\" aria-label=\"timely risk assessment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Timely risk assessment</strong></h3>\n<p>Stay up-to-date on new risks and vulnerabilities in the data storage environment. Carry out regular assessments of all the significant aspects of the workplace environment - from remote access for employees to data storage to security policies. Make sure all procedures are adequate and current. </p>\n<h3 id=\"periodic-data-security-training\" style=\"position:relative;\"><a href=\"#periodic-data-security-training\" aria-label=\"periodic data security training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Periodic data security training</strong></h3>\n<p>Train your team according to industry-approved security practices. Make them understand how crucial is consumer data privacy and security to your business and what necessary steps can prevent breaches. Conduct periodical awareness training for the entire organization instead of confining to a particular group. </p>\n<h3 id=\"invest-in-data-compliance\" style=\"position:relative;\"><a href=\"#invest-in-data-compliance\" aria-label=\"invest in data compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Invest in data compliance</strong></h3>\n<p>As we move into the fourth industrial age, investing in consumer data privacy and compliance has become a top business priority. It is high time, organizations understand the value of data itself. This is where <a href=\"https://www.loginradius.com/blog/2020/05/consent-management/\">regulations like the GDPR</a> and CCPA comes into play. </p>\n<h3 id=\"optimal-infrastructure\" style=\"position:relative;\"><a href=\"#optimal-infrastructure\" aria-label=\"optimal infrastructure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Optimal infrastructure</strong></h3>\n<p>Organizations are working to build technology environments that can easily handle the growing amounts of data collected and engage in technical developments. A good practice is to store data based on the data type or classification. Reduced system footprints decrease the risk of breaches.</p>\n<h2 id=\"how-loginradius-keeps-your-customer-data-private-and-secure\" style=\"position:relative;\"><a href=\"#how-loginradius-keeps-your-customer-data-private-and-secure\" aria-label=\"how loginradius keeps your customer data private and secure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Keeps Your Customer Data Private and Secure</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How LoginRadius keeps your customer data private and secure\"\n        title=\"How LoginRadius keeps your customer data private and secure\"\n        src=\"/static/9880f09fa900c48477bbdbe850648f7a/e5715/customer-data-private-and-secure.png\"\n        srcset=\"/static/9880f09fa900c48477bbdbe850648f7a/a6d36/customer-data-private-and-secure.png 650w,\n/static/9880f09fa900c48477bbdbe850648f7a/e5715/customer-data-private-and-secure.png 768w,\n/static/9880f09fa900c48477bbdbe850648f7a/2bef9/customer-data-private-and-secure.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>One crucial aspect of an organization is the protection of the confidentiality and integrity of consumer data. LoginRadius provides layered security by limiting and monitoring access to consumer's data. The platform offers seamless security with <a href=\"https://www.loginradius.com/data-governance/\">features like data management</a> and real-time fraud analysis to improve customer experience and detect fraud attempts at the entrance.</p>\n<p>The <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">CIAM solution ensures</a> that fewer employees can access customer data and handle it. This further reduces the chance of accidental data leaks and secures consumer data privacy. Some of the global standards it adheres to include the GDPR in the EU and the <a href=\"https://www.loginradius.com/blog/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">CCPA in California</a>.</p>\n<p>The LoginRadius is an identity management system that continues to support <a href=\"https://www.loginradius.com/compliances/\">global regulatory compliance</a> in the fight against data breaches, which are essential for delivering zero friction customer experience. A few of the common ones include:</p>\n<ul>\n<li><strong>PCI DSS</strong>-<strong>PCI SSC</strong> administered standard for payment transactions.</li>\n<li><strong>ISO 27001:2013</strong> – Information security management system.</li>\n<li><strong>ISO 27017:2015</strong> – Information security for cloud services.</li>\n<li><strong>ISO/IEC 27018:2019</strong> – PII Protection.</li>\n<li><strong>US Privacy Shield</strong> - Complaint resolution for EEA citizens.</li>\n<li><strong>NIST Cybersecurity Framework</strong> – Standardized security framework to manage and reduce cybersecurity risk.</li>\n<li><strong>ISAE 3000</strong> – International attestation standard for assurance over non-financial information.</li>\n<li><strong>AICPA SOC 2 (Type II)</strong> – System-level controls for Trust Services Criteria – security, availability, process integrity, confidentiality, and privacy.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Your consumer data privacy and security plan should comply with the rapid development of technology and the increasing cyber-attacks. Consider investing in compliance with the latest regulations to future-proof your consumer data protection plan.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 17, 2020","updated_date":null,"description":"The building blocks that sustain customer loyalty in the long run are authenticity, accountability and excellent customer experience. Organizations need to be clear about how cautious they are when it comes to the privacy and protection of customer data.","title":"How LoginRadius Future-Proofs Consumer Data Privacy and Security","tags":["data privacy","cx","compliance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/c4e876b92b334fdf733dc1931f887963/33aa5/consumer-data-privacy.jpg","srcSet":"/static/c4e876b92b334fdf733dc1931f887963/f836f/consumer-data-privacy.jpg 200w,\n/static/c4e876b92b334fdf733dc1931f887963/2244e/consumer-data-privacy.jpg 400w,\n/static/c4e876b92b334fdf733dc1931f887963/33aa5/consumer-data-privacy.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"In this blog, we’ll be implementing authentication via Twitter in a Golang web application. For this, we’ll be using Goth, a social…","fields":{"slug":"/engineering/twitter-authentication-with-golang-and-goth/"},"html":"<p>In this blog, we’ll be implementing authentication via Twitter in a Golang web application. For this, we’ll be using Goth, a social authentication middleware for Golang.</p>\n<p>Pre-requisites: </p>\n<ul>\n<li>Basic knowledge of HTML/Golang</li>\n<li>Golang should be installed in your system</li>\n</ul>\n<p><strong>Firstly</strong>, We need to create a new Twitter App using its <a href=\"https://apps.twitter.com/\">Application Management</a>. Twitter does not seem to work nicely with it if \"localhost\" is given in the callback URL field. To overcome this limitation, you could use the special loopback address or <strong>\"127.0.0.1\"</strong> in place of <strong>\"localhost\"</strong>.</p>\n<p>Step 1. First, create a directory structure as below for your Go Application :</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">TwitterAuthenticationGoth</span>\n<span class=\"grvsc-line\">-templates</span>\n<span class=\"grvsc-line\">--index.html</span>\n<span class=\"grvsc-line\">--success.html</span>\n<span class=\"grvsc-line\">-main.go</span></code></pre>\n<p>Step 2. Add the following code in <strong>index.html</strong> for creating <strong>LoginUI</strong>:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"html\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">&lt;!</span><span class=\"mtk12\">doctype</span><span class=\"mtk1\"> </span><span class=\"mtk12\">html</span><span class=\"mtk1\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">html</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">head</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">title</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Twitter SignIn</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">title</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css&quot;</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> &lt;!-- load bulma css --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css&quot;</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> &lt;!-- load fontawesome --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">style</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        body        </span><span class=\"mtk4\">{</span><span class=\"mtk1\"> </span><span class=\"mtk12\">padding</span><span class=\"mtk1\">-</span><span class=\"mtk12\">top</span><span class=\"mtk1\">:70</span><span class=\"mtk12\">px</span><span class=\"mtk1\">; </span><span class=\"mtk4\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">style</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">head</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">body</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;container&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;jumbotron text-center text-success&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">h1</span><span class=\"mtk17\">&gt;&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;fa fa-lock&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> Social Authentication</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">h1</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">p</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Login or Register with:</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">p</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">a</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;/auth/twitter&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;btn btn-danger&quot;</span><span class=\"mtk17\">&gt;&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;fa fa-twitter&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> SignIn with Twitter</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">a</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">body</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">html</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> </span></span></code></pre>\n<p>Step 3 Add the following code in <strong>success.html</strong> for creating <strong>ProfileUI</strong>:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"html\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">&lt;!</span><span class=\"mtk12\">doctype</span><span class=\"mtk1\"> </span><span class=\"mtk12\">html</span><span class=\"mtk1\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">html</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">head</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">title</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Twitter SignIn</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">title</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css&quot;</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> &lt;!-- load bulma css --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css&quot;</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> &lt;!-- load fontawesome --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">style</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          body        </span><span class=\"mtk4\">{</span><span class=\"mtk1\"> </span><span class=\"mtk12\">padding</span><span class=\"mtk1\">-</span><span class=\"mtk12\">top</span><span class=\"mtk1\">:70</span><span class=\"mtk12\">px</span><span class=\"mtk1\">; </span><span class=\"mtk4\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">style</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">head</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">body</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;container&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;jumbotron&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">h1</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;text-success  text-center&quot;</span><span class=\"mtk17\">&gt;&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;fa fa-user&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> Profile Information</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">h1</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;row&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">            </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;col-sm-6&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;well&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                        </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">p</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                            </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Id</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">{</span><span class=\"mtk1\">{.</span><span class=\"mtk12\">UserID</span><span class=\"mtk1\">}</span><span class=\"mtk4\">}</span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">br</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                            </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Email</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">{</span><span class=\"mtk1\">{.</span><span class=\"mtk12\">Email</span><span class=\"mtk1\">}</span><span class=\"mtk4\">}</span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">br</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                            </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Name</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">{</span><span class=\"mtk1\">{.</span><span class=\"mtk12\">Name</span><span class=\"mtk1\">}</span><span class=\"mtk4\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                        </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">p</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">            </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">body</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">html</span><span class=\"mtk17\">&gt;</span></span></code></pre>\n<p>Step 4. Add the following code in <strong>main.go</strong> for importing <strong>Goth</strong> and other packages :</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">import</span><span class=\"mtk1\"> (</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;fmt&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;html/template&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;log&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;net/http&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;sort&quot;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;github.com/gorilla/pat&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;github.com/markbates/goth&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;github.com/markbates/goth/gothic&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;github.com/markbates/goth/providers/twitter&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">)</span></span></code></pre>\n<p>Now we are ready to implement Twitter Authentication in our app</p>\n<p>Step 5. Setup the twitter configuration by adding the following code in <strong>main.go</strong> :</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">goth.</span><span class=\"mtk11\">UseProviders</span><span class=\"mtk1\">(</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        twitter.</span><span class=\"mtk11\">New</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;TWITTER_KEY&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;TWITTER_SECRET&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;http://127.0.0.1:3000/auth/twitter/callback&quot;</span><span class=\"mtk1\">),</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    )</span></span></code></pre>\n<p>Step 6. For adding all routes and functionality you just need to add following code in <strong>main.go</strong> :</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk4\">type</span><span class=\"mtk1\"> </span><span class=\"mtk10\">ProviderIndex</span><span class=\"mtk1\"> </span><span class=\"mtk4\">struct</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     Providers[]</span><span class=\"mtk14\"> </span><span class=\"mtk10\">string</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     ProvidersMap </span><span class=\"mtk4\">map</span><span class=\"mtk1\">[</span><span class=\"mtk10\">string</span><span class=\"mtk1\">] </span><span class=\"mtk10\">string</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> }</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk4\">func</span><span class=\"mtk1\"> </span><span class=\"mtk11\">main</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     goth.</span><span class=\"mtk11\">UseProviders</span><span class=\"mtk1\">(</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         twitter.</span><span class=\"mtk11\">New</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;TWITTER_KEY&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;TWITTER_SECRET&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;http://127.0.0.1:3000/auth/twitter/callback&quot;</span><span class=\"mtk1\">),</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         </span><span class=\"mtk3\">// If you&#39;d like to use authenticate instead of authorize in Twitter provider, use this instead.</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         </span><span class=\"mtk3\">// twitter.NewAuthenticate(os.Getenv(&quot;TWITTER_KEY&quot;), os.Getenv(&quot;TWITTER_SECRET&quot;), &quot;http://localhost:3000/auth/twitter/callback&quot;),</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     )</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     m: = </span><span class=\"mtk11\">make</span><span class=\"mtk1\">(</span><span class=\"mtk4\">map</span><span class=\"mtk1\">[</span><span class=\"mtk10\">string</span><span class=\"mtk1\">] </span><span class=\"mtk10\">string</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     m[</span><span class=\"mtk8\">&quot;twitter&quot;</span><span class=\"mtk1\">] = </span><span class=\"mtk8\">&quot;Twitter&quot;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     </span><span class=\"mtk4\">var</span><span class=\"mtk1\"> keys[]</span><span class=\"mtk14\"> </span><span class=\"mtk10\">string</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     </span><span class=\"mtk15\">for</span><span class=\"mtk1\"> k: = </span><span class=\"mtk15\">range</span><span class=\"mtk1\"> m {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         </span><span class=\"mtk12\">keys</span><span class=\"mtk1\"> = </span><span class=\"mtk11\">append</span><span class=\"mtk1\">(keys, k)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     sort.</span><span class=\"mtk11\">Strings</span><span class=\"mtk1\">(keys)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     providerIndex: = & ProviderIndex {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         Providers: keys,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         ProvidersMap: m</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     }</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     p: = pat.</span><span class=\"mtk11\">New</span><span class=\"mtk1\">()</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     p.</span><span class=\"mtk11\">Get</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;/auth/{provider}/callback&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk4\">func</span><span class=\"mtk1\">(res http.ResponseWriter, req * http.Request) {</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         user, err: = gothic.</span><span class=\"mtk11\">CompleteUserAuth</span><span class=\"mtk1\">(res, req)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> err != </span><span class=\"mtk4\">nil</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">             fmt.</span><span class=\"mtk11\">Fprintln</span><span class=\"mtk1\">(res, err)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">             </span><span class=\"mtk15\">return</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         t, _: = template.</span><span class=\"mtk11\">ParseFiles</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;templates/success.html&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         t.</span><span class=\"mtk11\">Execute</span><span class=\"mtk1\">(res, user)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     })</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     p.</span><span class=\"mtk11\">Get</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;/logout/{provider}&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk4\">func</span><span class=\"mtk1\">(res http.ResponseWriter, req * http.Request) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         gothic.</span><span class=\"mtk11\">Logout</span><span class=\"mtk1\">(res, req)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         res.</span><span class=\"mtk11\">Header</span><span class=\"mtk1\">().</span><span class=\"mtk11\">Set</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;Location&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;/&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         res.</span><span class=\"mtk11\">WriteHeader</span><span class=\"mtk1\">(http.StatusTemporaryRedirect)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     })</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     p.</span><span class=\"mtk11\">Get</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;/auth/{provider}&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk4\">func</span><span class=\"mtk1\">(res http.ResponseWriter, req * http.Request) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         </span><span class=\"mtk3\">// try to get the user without re-authenticating</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> gothUser, err: = gothic.</span><span class=\"mtk11\">CompleteUserAuth</span><span class=\"mtk1\">(res, req);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         err == </span><span class=\"mtk4\">nil</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">             t, _: = template.</span><span class=\"mtk11\">ParseFiles</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;templates/success.html&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">             t.</span><span class=\"mtk11\">Execute</span><span class=\"mtk1\">(res, gothUser)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         } </span><span class=\"mtk15\">else</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">             gothic.</span><span class=\"mtk11\">BeginAuthHandler</span><span class=\"mtk1\">(res, req)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     })</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     p.</span><span class=\"mtk11\">Get</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;/&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk4\">func</span><span class=\"mtk1\">(res http.ResponseWriter, req * http.Request) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         t, _: = template.</span><span class=\"mtk11\">ParseFiles</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;templates/index.html&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">         t.</span><span class=\"mtk11\">Execute</span><span class=\"mtk1\">(res, providerIndex)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     })</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     log.</span><span class=\"mtk11\">Println</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;listening on localhost:3000&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     log.</span><span class=\"mtk11\">Fatal</span><span class=\"mtk1\">(http.</span><span class=\"mtk11\">ListenAndServe</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;:3000&quot;</span><span class=\"mtk1\">, p))</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> }</span></span></code></pre>\n<p>Now you just need to run the project by using the following command and try logging by using the Twitter button.</p>\n<p>Step 7. Run the project :</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"> go run main.go</span></code></pre>\n<p>Step 8. Visit the browser with the URL <code>http://127.0.0.1:3000</code>.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 25.846153846153847%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAFCAYAAABFA8wzAAAACXBIWXMAAAsTAAALEwEAmpwYAAAA2klEQVQY02WQ2Y7CIBSGff8XMHNpfJeZK5cLt8Ylbh0KtLVaq7EUfs8BmzEOycc5wMdh6YCacw61aVDXhqLx0dDYNYA1lnCBJuAd8+dy5BrcOtxZGqisgFAZhM4h9QkHKTE7brASRyxkIBJ7RPEOv+Ql5DG8R6UnWPtRUOdnL0haVGmBg5KYxGss9isMxz8YjL4x3UaYiy0dmnmvRefF/4LvN+SYqBxpUSGZrxF/9RF3e5CTJTTNeY/WW1d+3pDff63uuFwr4vaC8pKoKH/UAc7Ldyd4Jc23f/gEVVZ84B76xwwAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Login\"\n        title=\"Login\"\n        src=\"/static/1091ef65b568901c5a3905a0bc54dcde/e5715/login.png\"\n        srcset=\"/static/1091ef65b568901c5a3905a0bc54dcde/a6d36/login.png 650w,\n/static/1091ef65b568901c5a3905a0bc54dcde/e5715/login.png 768w,\n/static/1091ef65b568901c5a3905a0bc54dcde/e0202/login.png 1395w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>We need to click on <strong>Authorize button</strong>, which will redirect us to google login page  </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 48.61538461538462%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAKCAYAAAC0VX7mAAAACXBIWXMAAAsTAAALEwEAmpwYAAABJklEQVQoz5WS606EMBCF9/3fxIcxmmj2z25UAhSQcmkpLbSF49AogV3NrpMMJZn2mzM9PczzjG3SB8rSguuYpmld61bCWgvrXNj7c/5wBaToOomyyFHXNXhVQQgBrU2o8UaClVX4vzwbgGv7DTBOYzy+HnF+OyFjjBooeO9DLclLHM/RuncrZIkLhWEgvEQxHp4TPL1/YPLDbmxjDBpSrHpNTaYdcKdwWzBaoOIRqpqhbEq0bQshJcE99GgherOD3QR2qkfKCsocWZaDsYzuUQYDrJvQDw7+26D7gF2HOEmRpClBGfLiEz2NOI7jbvy7FfZaBwjnFaTsKGUY21r3q6qbQKUUSs7pDmu0ZMDisrXj+g7/DdSLk00TgAvMmAGj85vnhT+BX5btDqblzarnAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Auth\"\n        title=\"Auth\"\n        src=\"/static/8bdcd51ad3b4cf6ec56a1ea6dcb532a8/e5715/auth.png\"\n        srcset=\"/static/8bdcd51ad3b4cf6ec56a1ea6dcb532a8/a6d36/auth.png 650w,\n/static/8bdcd51ad3b4cf6ec56a1ea6dcb532a8/e5715/auth.png 768w,\n/static/8bdcd51ad3b4cf6ec56a1ea6dcb532a8/35252/auth.png 1204w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>After login with our twitter credentials, it will redirect back to our application and on the success page, we can see the details of the logged-in user and can save this detail in the database for future use also.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 26.307692307692303%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAFCAYAAABFA8wzAAAACXBIWXMAAAsTAAALEwEAmpwYAAAAuklEQVQY022QiQ6DIAxA/f/f22Hm1HnhAeiU6eYBdgUXFzebPErT5tFgAYaaZ3j1wx9yVIZpkAt4HzH/zvXDCDM6dFj6mKSEgt83ZKyEQ+wabBIYzokP1zSCgmGfljhTmaznpVJfocLCDxNwvAAJISI5pJTDiXhwRC5paLDJDdwsBsrrzeOsqo1jFWq744dGqMVaSHIGnAsD480KZfWyHa0+7GyoC9E+NzSPDmrR7qJ7K1iLtsMNlz98A+Y1fQ6eNSIpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Profile\"\n        title=\"Profile\"\n        src=\"/static/6d22d851c81ed5411de7ec1098eeb2e7/e5715/profile.png\"\n        srcset=\"/static/6d22d851c81ed5411de7ec1098eeb2e7/a6d36/profile.png 650w,\n/static/6d22d851c81ed5411de7ec1098eeb2e7/e5715/profile.png 768w,\n/static/6d22d851c81ed5411de7ec1098eeb2e7/e40ed/profile.png 1378w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As we have seen it is fairly easy to build a twitter social authentication system with Go  and Goth, You can found the complete code used in this tutorial on our<a href=\"https://github.com/LoginRadius/engineering-blog-samples/tree/master/GoLang/TwitterAuthenticationGoth\"> Github Repo</a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk17 { color: #808080; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk10 { color: #4EC9B0; }\n  .dark-default-dark .mtk14 { color: #F44747; }\n  .dark-default-dark .mtk3 { color: #6A9955; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n</style>","frontmatter":{"date":"June 15, 2020","updated_date":null,"description":null,"title":"Twitter authentication with Go Language and Goth","tags":["Go","SocialLogin","Oauth"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/128533caa8a4ba717d200f38198342e4/14b42/cover.jpg","srcSet":"/static/128533caa8a4ba717d200f38198342e4/f836f/cover.jpg 200w,\n/static/128533caa8a4ba717d200f38198342e4/2244e/cover.jpg 400w,\n/static/128533caa8a4ba717d200f38198342e4/14b42/cover.jpg 800w,\n/static/128533caa8a4ba717d200f38198342e4/47498/cover.jpg 1200w,\n/static/128533caa8a4ba717d200f38198342e4/0e329/cover.jpg 1600w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Ashish Sharma","github":"ashish8947","avatar":null}}}},{"node":{"excerpt":"In this blog, we’ll be implementing authentication via Google in a Go web application. For this, we’ll be using Goth - Multi-Provider…","fields":{"slug":"/engineering/google-authentication-with-golang-and-goth/"},"html":"<p>In this blog, we’ll be implementing authentication via Google in a Go web application. For this, we’ll be using <a href=\"https://github.com/markbates/goth\">Goth</a> - Multi-Provider Authentication Package for Go</p>\n<h2 id=\"before-you-get-started\" style=\"position:relative;\"><a href=\"#before-you-get-started\" aria-label=\"before you get started permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Before You Get Started</h2>\n<p>This tutorial assumes you have:</p>\n<ul>\n<li>Basic knowledge of HTML/CSS</li>\n<li>A basic understanding of Go Language</li>\n<li>Latest GoLang version installed on your system</li>\n</ul>\n<h3 id=\"step-1-create-a-google-client-id-and-client-secret\" style=\"position:relative;\"><a href=\"#step-1-create-a-google-client-id-and-client-secret\" aria-label=\"step 1 create a google client id and client secret permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 1: Create a Google client ID and client secret</h3>\n<p>We can create a  client ID and client secret using its <a href=\"https://console.developers.google.com/\">Google API Console</a>. You need to follow below steps once you open Google API Console</p>\n<ul>\n<li>From the project drop-down, select an existing project, or create a new one by selecting Create a new project</li>\n<li>In the sidebar under \"APIs &#x26; Services\", select Credentials</li>\n<li>In the Credentials tab, select the Create credentials drop-down list, and choose OAuth client ID.</li>\n<li>Under Application type, select Web application.</li>\n<li>In Authorized redirect URI use <code>http://localhost:3000/auth/google/callback</code></li>\n<li>Press the Create button and copy the generated client ID and client secret</li>\n</ul>\n<p><strong>Note:</strong> If Google doesn't support <code>http://localhost:3000</code>, then use <code>http://127.0.0.1:3000</code></p>\n<h3 id=\"step-2-initialize-a-go-project-using-go-modules\" style=\"position:relative;\"><a href=\"#step-2-initialize-a-go-project-using-go-modules\" aria-label=\"step 2 initialize a go project using go modules permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 2: Initialize a Go project using Go modules</h3>\n<p>First in an empty folder run the below command</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">go mod init googleauth</span></code></pre>\n<p><code>go mod init</code> creates a new go.mod file and automatically imports dependencies when you will run go program</p>\n<h3 id=\"step-3-writing-golang-server-code-to-accept-web-requests\" style=\"position:relative;\"><a href=\"#step-3-writing-golang-server-code-to-accept-web-requests\" aria-label=\"step 3 writing golang server code to accept web requests permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 3: Writing golang server code to accept web requests</h3>\n<p>Create a file <strong>main.go</strong> in the root folder of your app and add the following code: </p>\n<p>A small description for packages used in below code</p>\n<ul>\n<li><strong>gorilla/pat:</strong>  A lightweight HTTP router for Go</li>\n<li><strong>markbates/goth:</strong>  Multi-Provider Authentication Package for Go</li>\n<li><strong>gorilla/sessions:</strong>  To save information from google in session and use it on the success page</li>\n<li><strong>markbates/goth/providers/google:</strong>  Google authentication provider by Goth</li>\n<li><strong>html/template:</strong> Go package to parse Html files</li>\n</ul>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">package</span><span class=\"mtk1\"> main</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">import</span><span class=\"mtk1\"> (</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;fmt&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;html/template&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;net/http&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;log&quot;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;github.com/gorilla/pat&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;github.com/markbates/goth&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;github.com/markbates/goth/gothic&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;github.com/markbates/goth/providers/google&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;github.com/gorilla/sessions&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">func</span><span class=\"mtk1\"> </span><span class=\"mtk11\">main</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">key</span><span class=\"mtk1\"> := </span><span class=\"mtk8\">&quot;Secret-session-key&quot;</span><span class=\"mtk1\">  </span><span class=\"mtk3\">// Replace with your SESSION_SECRET or similar</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">maxAge</span><span class=\"mtk1\"> := </span><span class=\"mtk7\">86400</span><span class=\"mtk1\"> * </span><span class=\"mtk7\">30</span><span class=\"mtk1\">  </span><span class=\"mtk3\">// 30 days</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">isProd</span><span class=\"mtk1\"> := </span><span class=\"mtk4\">false</span><span class=\"mtk1\">       </span><span class=\"mtk3\">// Set to true when serving over https</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">store</span><span class=\"mtk1\"> := sessions.</span><span class=\"mtk11\">NewCookieStore</span><span class=\"mtk1\">([]</span><span class=\"mtk11\">byte</span><span class=\"mtk1\">(key))</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  store.</span><span class=\"mtk11\">MaxAge</span><span class=\"mtk1\">(maxAge)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">store.Options.Path</span><span class=\"mtk1\"> = </span><span class=\"mtk8\">&quot;/&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">store.Options.HttpOnly</span><span class=\"mtk1\"> = </span><span class=\"mtk4\">true</span><span class=\"mtk1\">   </span><span class=\"mtk3\">// HttpOnly should always be enabled</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">store.Options.Secure</span><span class=\"mtk1\"> = isProd</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">gothic.Store</span><span class=\"mtk1\"> = store</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  goth.</span><span class=\"mtk11\">UseProviders</span><span class=\"mtk1\">(</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    google.</span><span class=\"mtk11\">New</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;our-google-client-id&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;our-google-client-secret&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;http://localhost:3000/auth/google/callback&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;email&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk8\">&quot;profile&quot;</span><span class=\"mtk1\">),</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  )</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">p</span><span class=\"mtk1\"> := pat.</span><span class=\"mtk11\">New</span><span class=\"mtk1\">()</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  p.</span><span class=\"mtk11\">Get</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;/auth/{provider}/callback&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk4\">func</span><span class=\"mtk1\">(res http.ResponseWriter, req *http.Request) {</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">user</span><span class=\"mtk1\">, </span><span class=\"mtk12\">err</span><span class=\"mtk1\"> := gothic.</span><span class=\"mtk11\">CompleteUserAuth</span><span class=\"mtk1\">(res, req)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> err != </span><span class=\"mtk4\">nil</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      fmt.</span><span class=\"mtk11\">Fprintln</span><span class=\"mtk1\">(res, err)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk15\">return</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">t</span><span class=\"mtk1\">, </span><span class=\"mtk12\">_</span><span class=\"mtk1\"> := template.</span><span class=\"mtk11\">ParseFiles</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;templates/success.html&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    t.</span><span class=\"mtk11\">Execute</span><span class=\"mtk1\">(res, user)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  })</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  p.</span><span class=\"mtk11\">Get</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;/auth/{provider}&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk4\">func</span><span class=\"mtk1\">(res http.ResponseWriter, req *http.Request) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    gothic.</span><span class=\"mtk11\">BeginAuthHandler</span><span class=\"mtk1\">(res, req)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  })</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  p.</span><span class=\"mtk11\">Get</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;/&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk4\">func</span><span class=\"mtk1\">(res http.ResponseWriter, req *http.Request) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">t</span><span class=\"mtk1\">, </span><span class=\"mtk12\">_</span><span class=\"mtk1\"> := template.</span><span class=\"mtk11\">ParseFiles</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;templates/index.html&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    t.</span><span class=\"mtk11\">Execute</span><span class=\"mtk1\">(res, </span><span class=\"mtk4\">false</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  })</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  log.</span><span class=\"mtk11\">Println</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;listening on localhost:3000&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  log.</span><span class=\"mtk11\">Fatal</span><span class=\"mtk1\">(http.</span><span class=\"mtk11\">ListenAndServe</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;:3000&quot;</span><span class=\"mtk1\">, p))</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p><strong>Note:</strong> The callback URL in <code>google.New</code> should be the same as used in the google app configuration.</p>\n<p>If it is hard to understand the code, Here is the description of all the routes used in the code mentioned above</p>\n<ul>\n<li><strong>\"/\":</strong>  The root route will render the index.html page</li>\n<li><strong>/auth/{provider}:</strong>  When you click on SignIn button it will hit this route and <code>gothic.BeginAuthHandler</code> will redirect you to google authentication URL</li>\n<li><strong>/auth/{provider}/callback:</strong>  Once you have authenticated Google will send all the user details on this callback URL, and goth will save the info in session also which can be used in other routes also if needed</li>\n</ul>\n<h3 id=\"step-4-creating-a-login-and-profile-page\" style=\"position:relative;\"><a href=\"#step-4-creating-a-login-and-profile-page\" aria-label=\"step 4 creating a login and profile page permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 4: Creating a Login and Profile page</h3>\n<p>Create an html file under path <strong>templates/index.html</strong>, it will render into a nice looking social login page:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"html\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">&lt;!-- </span><span class=\"mtk12\">templates</span><span class=\"mtk1\">/</span><span class=\"mtk12\">index</span><span class=\"mtk1\">.</span><span class=\"mtk12\">html</span><span class=\"mtk1\"> --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">&lt;!</span><span class=\"mtk12\">doctype</span><span class=\"mtk1\"> </span><span class=\"mtk12\">html</span><span class=\"mtk1\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">html</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">head</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">title</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Google SignIn</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">title</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css&quot;</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> &lt;!-- load bulma css --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css&quot;</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> &lt;!-- load fontawesome --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">style</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        body        </span><span class=\"mtk4\">{</span><span class=\"mtk1\"> </span><span class=\"mtk12\">padding</span><span class=\"mtk1\">-</span><span class=\"mtk12\">top</span><span class=\"mtk1\">:70</span><span class=\"mtk12\">px</span><span class=\"mtk1\">; </span><span class=\"mtk4\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">style</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">head</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">body</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;container&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;jumbotron text-center text-success&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">h1</span><span class=\"mtk17\">&gt;&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;fa fa-lock&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> Social Authentication</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">h1</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">p</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Login or Register with:</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">p</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">a</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;/auth/google&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;btn btn-danger&quot;</span><span class=\"mtk17\">&gt;&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;fa fa-google&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> SignIn with Google</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">a</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">body</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">html</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> </span></span></code></pre>\n<p>After it we will create an Html file under path <strong>templates/success.html</strong>, it will be used to show the user profile information we will get after authenticated by google</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"html\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">&lt;!-- </span><span class=\"mtk12\">templates</span><span class=\"mtk1\">/</span><span class=\"mtk12\">success</span><span class=\"mtk1\">.</span><span class=\"mtk12\">html</span><span class=\"mtk1\"> --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">&lt;!</span><span class=\"mtk12\">doctype</span><span class=\"mtk1\"> </span><span class=\"mtk12\">html</span><span class=\"mtk1\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">html</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">head</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">title</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Google SignIn</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">title</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css&quot;</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> &lt;!-- load bulma css --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css&quot;</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> &lt;!-- load fontawesome --&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">style</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          body        </span><span class=\"mtk4\">{</span><span class=\"mtk1\"> </span><span class=\"mtk12\">padding</span><span class=\"mtk1\">-</span><span class=\"mtk12\">top</span><span class=\"mtk1\">:70</span><span class=\"mtk12\">px</span><span class=\"mtk1\">; </span><span class=\"mtk4\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">style</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">head</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">body</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;container&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;jumbotron&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">h1</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;text-success  text-center&quot;</span><span class=\"mtk17\">&gt;&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;fa fa-user&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\"> Profile Information</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">h1</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">          </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;row&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">            </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;col-sm-6&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">div</span><span class=\"mtk1\"> </span><span class=\"mtk12\">class</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;well&quot;</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                        </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">p</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                            </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Id</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">{</span><span class=\"mtk1\">{.</span><span class=\"mtk12\">UserID</span><span class=\"mtk1\">}</span><span class=\"mtk4\">}</span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">br</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                            </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Email</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">{</span><span class=\"mtk1\">{.</span><span class=\"mtk12\">Email</span><span class=\"mtk1\">}</span><span class=\"mtk4\">}</span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">br</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                            </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Name</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">strong</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">: </span><span class=\"mtk4\">{</span><span class=\"mtk1\">{.</span><span class=\"mtk12\">Name</span><span class=\"mtk1\">}</span><span class=\"mtk4\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                        </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">p</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">            </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">div</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">body</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">html</span><span class=\"mtk17\">&gt;</span></span></code></pre>\n<p><strong>Note:</strong> Here we are also using bootstrap and font-awesome css to make our web pages look good. </p>\n<p>We have finished building our social login page, let's run the application by below command</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">go run main.go</span></code></pre>\n<p>Once our server is running, we can see our social login page on <code>http://localhost:3000/</code></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 26.153846153846157%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Social Authentication Page\"\n        title=\"Social Authentication Page\"\n        src=\"/static/e9fbab976c1381bbef6c74a7e927f413/212bf/go_google_login.jpg\"\n        srcset=\"/static/e9fbab976c1381bbef6c74a7e927f413/6aca1/go_google_login.jpg 650w,\n/static/e9fbab976c1381bbef6c74a7e927f413/212bf/go_google_login.jpg 768w,\n/static/e9fbab976c1381bbef6c74a7e927f413/e2731/go_google_login.jpg 1462w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>We need to click on <strong>SignIn with Google button</strong>, which will redirect us to the google login page.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 48.61538461538462%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Google Login\"\n        title=\"Google Login\"\n        src=\"/static/50f7a7ff4ae46578ee72084f50d31297/212bf/google_login.jpg\"\n        srcset=\"/static/50f7a7ff4ae46578ee72084f50d31297/6aca1/google_login.jpg 650w,\n/static/50f7a7ff4ae46578ee72084f50d31297/212bf/google_login.jpg 768w,\n/static/50f7a7ff4ae46578ee72084f50d31297/68a11/google_login.jpg 1246w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>After login with our google credentials, it will redirect back to our application and on the success page, we can see the details of the logged-in user and can save this detail in a database for future use also.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 26.46153846153846%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAFABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAAIF/8QAFQEBAQAAAAAAAAAAAAAAAAAAAAH/2gAMAwEAAhADEAAAAdsJQX//xAAUEAEAAAAAAAAAAAAAAAAAAAAQ/9oACAEBAAEFAn//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAEDAQE/AT//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAECAQE/AT//xAAVEAEBAAAAAAAAAAAAAAAAAAAQMf/aAAgBAQAGPwKv/8QAGBAAAwEBAAAAAAAAAAAAAAAAAAERIWH/2gAIAQEAAT8hjr0Toj//2gAMAwEAAgADAAAAEHwP/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPxA//8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAgEBPxA//8QAGxAAAgIDAQAAAAAAAAAAAAAAAAEhQRExUZH/2gAIAQEAAT8QmmxOuCwt6LGz/9k='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Social Profile Info\"\n        title=\"Social Profile Info\"\n        src=\"/static/1c06a7df8d424efbab2c0a699a7549cd/212bf/go_google_profile.jpg\"\n        srcset=\"/static/1c06a7df8d424efbab2c0a699a7549cd/6aca1/go_google_profile.jpg 650w,\n/static/1c06a7df8d424efbab2c0a699a7549cd/212bf/go_google_profile.jpg 768w,\n/static/1c06a7df8d424efbab2c0a699a7549cd/e3298/go_google_profile.jpg 1473w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As we have seen it is fairly easy to build a google social authentication system with Go language and Goth package, You can found the complete code used in this tutorial on our <a href=\"https://github.com/LoginRadius/engineering-blog-samples/tree/master/GoLang/GoogleAuthenticationGoth\">Github Repo</a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk3 { color: #6A9955; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n  .dark-default-dark .mtk17 { color: #808080; }\n</style>","frontmatter":{"date":"June 11, 2020","updated_date":null,"description":"Learn how to implement Google OAuth2 Authentication in Golang using Goath","title":"Google OAuth2 Authentication in Golang","tags":["Go","SocialLogin","Oauth"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/cd7a60fb3610d7b93965f555bbdadc73/46604/google_golang.png","srcSet":"/static/cd7a60fb3610d7b93965f555bbdadc73/69585/google_golang.png 200w,\n/static/cd7a60fb3610d7b93965f555bbdadc73/497c6/google_golang.png 400w,\n/static/cd7a60fb3610d7b93965f555bbdadc73/46604/google_golang.png 500w","sizes":"(max-width: 500px) 100vw, 500px"}}},"author":{"id":"Puneet Singh","github":"puneetsingh24","avatar":null}}}},{"node":{"excerpt":"Introduction As enterprises advance towards digital maturity in the times of robust cloud-based systems and stringent online security…","fields":{"slug":"/identity/authentication-vs-authorization-infographic/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>As enterprises advance towards digital maturity in the times of robust cloud-based systems and stringent online security, <em>authentication</em> and <em>authorization</em> are used in conjunction (also, often interchangeably) with each other.</p>\n<p>Though both the terms sound similar, they refer to entirely different security processes. Within the scope of <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management (CIAM)</a>, authentication verifies a user's identity, while authorization validates if the user has access to perform a specific function.</p>\n<p>In other words, authentication is identifying users by confirming who they say they are, while authorization is the process of establishing the rights and privileges of a user.</p>\n<p>Both processes play equally important roles in securing sensitive data assets from breaches and unauthorized access.</p>\n<p>Here, we'll cover how they're defined and what distinguishes one from the other.</p>\n<h2 id=\"what-is-authentication\" style=\"position:relative;\"><a href=\"#what-is-authentication\" aria-label=\"what is authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authentication?</h2>\n<p>Authentication is the process of identifying users and validating who they claim to be. One of the most common and obvious factors to authenticate identity is a password. If the user name matches the password credential, it means the identity is valid, and the system grants access to the user.</p>\n<p>Interestingly, with enterprises going passwordless, many use modern authentication techniques like one-time passcodes (OTP) via SMS, or email, <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, multi-factor authentication (MFA) and biometrics, etc. to authenticate users and deploy security beyond what passwords usually provide.</p>\n<h2 id=\"types-of-authentication\" style=\"position:relative;\"><a href=\"#types-of-authentication\" aria-label=\"types of authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Authentication</h2>\n<p>Authentication is a crucial process that verifies the identity of users accessing a system, website, or application. There are several types of <a href=\"https://www.loginradius.com/authentication/\">authentication methods</a> employed in today's digital landscape to ensure secure access to sensitive data. The most common ones include:</p>\n<h3 id=\"password-based-authentication\" style=\"position:relative;\"><a href=\"#password-based-authentication\" aria-label=\"password based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password-based Authentication</h3>\n<p>This traditional method requires users to provide a unique combination of characters known only to them. While passwords are simple to implement, they are susceptible to security breaches if not managed properly.</p>\n<h3 id=\"multi-factor-authentication\" style=\"position:relative;\"><a href=\"#multi-factor-authentication\" aria-label=\"multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/benefits-of-mfa/\">MFA enhances security</a> by combining two or more authentication factors, such as passwords, biometrics (fingerprint or facial recognition), or one-time codes sent to a user's registered device. This layered approach significantly reduces the risk of unauthorized access.</p>\n<h3 id=\"two-factor-authentication\" style=\"position:relative;\"><a href=\"#two-factor-authentication\" aria-label=\"two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Two-Factor Authentication</h3>\n<p>2FA is a subset of MFA that employs two different authentication factors to verify user identity. Typically, this includes a password and a one-time code generated by a mobile app or sent via SMS.</p>\n<h3 id=\"biometric-authentication\" style=\"position:relative;\"><a href=\"#biometric-authentication\" aria-label=\"biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Authentication</h3>\n<p>This cutting-edge method uses unique biological traits like fingerprints, iris scans, or facial features to validate a user's identity. Biometrics offer a high level of security and convenience, but they may raise privacy concerns.</p>\n<h3 id=\"token-based-authentication\" style=\"position:relative;\"><a href=\"#token-based-authentication\" aria-label=\"token based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Token-based Authentication</h3>\n<p>Token-based systems use physical or virtual tokens to grant access. These tokens can be hardware devices or software applications that generate temporary codes for authentication.</p>\n<h2 id=\"advantages-of-authentication\" style=\"position:relative;\"><a href=\"#advantages-of-authentication\" aria-label=\"advantages of authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Authentication</h2>\n<p>Effective authentication protocols offer numerous benefits to individuals, organizations, and online platforms, ensuring a secure and seamless user experience.</p>\n<h3 id=\"enhanced-security\" style=\"position:relative;\"><a href=\"#enhanced-security\" aria-label=\"enhanced security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Security</h3>\n<p>Authentication prevents unauthorized access and protects sensitive data from falling into the wrong hands, reducing the risk of data breaches and cyberattacks.</p>\n<h3 id=\"user-trust-and-confidence\" style=\"position:relative;\"><a href=\"#user-trust-and-confidence\" aria-label=\"user trust and confidence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Trust and Confidence</h3>\n<p>Implementing robust authentication measures instills confidence in users, assuring them that their personal information is safe, thereby fostering trust in the platform or service.</p>\n<h3 id=\"regulatory-compliance\" style=\"position:relative;\"><a href=\"#regulatory-compliance\" aria-label=\"regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Regulatory Compliance</h3>\n<p>In many industries, adhering to specific <a href=\"https://www.loginradius.com/blog/identity/stay-compliant-with-data-privacy-laws-2023/\">data protection regulations</a> and standards is mandatory. Proper authentication procedures aid in meeting compliance requirements.</p>\n<h3 id=\"reduced-fraud-and-identity-theft\" style=\"position:relative;\"><a href=\"#reduced-fraud-and-identity-theft\" aria-label=\"reduced fraud and identity theft permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduced Fraud and Identity Theft</h3>\n<p>By requiring users to verify their identity through authentication, the likelihood of fraudulent activities and identity theft is significantly minimized.</p>\n<h3 id=\"customizable-access-control\" style=\"position:relative;\"><a href=\"#customizable-access-control\" aria-label=\"customizable access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customizable Access Control</h3>\n<p>Different authentication methods can be tailored to suit specific security needs, allowing organizations to grant appropriate levels of access to different user groups.</p>\n<h2 id=\"what-is-authorization\" style=\"position:relative;\"><a href=\"#what-is-authorization\" aria-label=\"what is authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authorization?</h2>\n<p>Authorization happens after a user’s identity has been successfully authenticated. It is about offering full or partial access rights to resources like database, funds, and other critical information to get the job done.</p>\n<p>In an organization, for example, after an employee is verified and confirmed via ID and password authentication, the next step would be defining what resources the employee would have access to.</p>\n<h2 id=\"types-of-authorization\" style=\"position:relative;\"><a href=\"#types-of-authorization\" aria-label=\"types of authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Authorization</h2>\n<p>Authorization is a crucial aspect of identity and access management, ensuring that individuals or entities are granted appropriate access to resources and actions within a system. There are several types of authorization mechanisms that organizations implement to control access and protect sensitive information.</p>\n<h3 id=\"role-based-authorization\" style=\"position:relative;\"><a href=\"#role-based-authorization\" aria-label=\"role based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Role-Based Authorization</h3>\n<p>In this approach, access rights are assigned based on predefined roles or job functions within the organization. Users are grouped into specific roles, and each role is granted a set of permissions that align with the responsibilities of that role. This <a href=\"https://www.loginradius.com/user-management/\">simplifies access management</a> and reduces administrative overhead, especially in large enterprises.</p>\n<h3 id=\"attribute-based-authorization\" style=\"position:relative;\"><a href=\"#attribute-based-authorization\" aria-label=\"attribute based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Attribute-Based Authorization</h3>\n<p>This type of authorization evaluates access requests based on specific attributes of the user, such as their department, location, or clearance level. Access is granted or denied depending on whether the user's attributes match the defined criteria for accessing certain resources or performing particular actions.</p>\n<h3 id=\"rule-based-authorization\" style=\"position:relative;\"><a href=\"#rule-based-authorization\" aria-label=\"rule based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Rule-Based Authorization</h3>\n<p>Rule-based authorization enforces access control based on predefined rules and conditions. These rules specify the circumstances under which access should be granted or denied. Organizations can define complex access policies using rule-based authorization to cater to unique business requirements.</p>\n<h3 id=\"mandatory-access-control-mac\" style=\"position:relative;\"><a href=\"#mandatory-access-control-mac\" aria-label=\"mandatory access control mac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mandatory Access Control (MAC)</h3>\n<p>MAC is a high-security authorization model commonly used in government and military settings. It operates on the principle of strict access controls determined by the system administrator. Access rights are assigned based on labels and categories, ensuring that users can only access information at or below their clearance level.</p>\n<h3 id=\"discretionary-access-control-dac\" style=\"position:relative;\"><a href=\"#discretionary-access-control-dac\" aria-label=\"discretionary access control dac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Discretionary Access Control (DAC)</h3>\n<p>In contrast to MAC, DAC allows users to control access to the resources they own. Each resource has an owner who can determine who else can access it and what level of access they have. DAC is commonly used in less secure environments where users have more control over their data.</p>\n<h3 id=\"role-based-access-control-rbac\" style=\"position:relative;\"><a href=\"#role-based-access-control-rbac\" aria-label=\"role based access control rbac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Role-Based Access Control (RBAC)</h3>\n<p>RBAC is a variation of role-based authorization that focuses on managing user access based on roles and their associated permissions. It simplifies access control by allowing administrators to grant or revoke permissions to entire groups of users through the management of roles.</p>\n<h2 id=\"advantages-of-authorization\" style=\"position:relative;\"><a href=\"#advantages-of-authorization\" aria-label=\"advantages of authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Authorization</h2>\n<p>Implementing robust authorization mechanisms offers various advantages that strengthen an organization's security posture and overall access management strategies.</p>\n<h3 id=\"enhanced-security-1\" style=\"position:relative;\"><a href=\"#enhanced-security-1\" aria-label=\"enhanced security 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Security</h3>\n<p>Authorization ensures that only authorized users can access specific resources and perform permitted actions. By enforcing proper access controls, organizations can significantly reduce the risk of data breaches, unauthorized access, and other security incidents.</p>\n<h3 id=\"granular-access-control\" style=\"position:relative;\"><a href=\"#granular-access-control\" aria-label=\"granular access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Granular Access Control</h3>\n<p>Authorization systems provide the flexibility to grant access on a granular level. This means administrators can define fine-grained access permissions for different users based on their roles, attributes, or other conditions. Granular access control allows for a more tailored and least privilege approach to access management.</p>\n<h3 id=\"compliance-and-auditing\" style=\"position:relative;\"><a href=\"#compliance-and-auditing\" aria-label=\"compliance and auditing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Compliance and Auditing</h3>\n<p>Many industries have specific compliance requirements regarding data access and protection. Authorization mechanisms help organizations comply with these regulations by monitoring and controlling access to sensitive information. Additionally, audit logs can track user activities, providing valuable data for security investigations and compliance reporting.</p>\n<h3 id=\"reduced-human-errors\" style=\"position:relative;\"><a href=\"#reduced-human-errors\" aria-label=\"reduced human errors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduced Human Errors</h3>\n<p>Implementing a structured authorization system reduces the likelihood of human errors in access control. Automated role-based or rule-based access assignment minimizes the chances of accidental misconfigurations and unauthorized access.</p>\n<h3 id=\"scalability-and-manageability\" style=\"position:relative;\"><a href=\"#scalability-and-manageability\" aria-label=\"scalability and manageability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Scalability and Manageability</h3>\n<p>As organizations grow, managing access rights can become challenging. Authorization systems, particularly role-based ones, offer <a href=\"https://www.loginradius.com/scalability/\">scalable solutions</a>, making it easier to add or remove users from different roles as the organization's structure evolves.</p>\n<h3 id=\"user-experience\" style=\"position:relative;\"><a href=\"#user-experience\" aria-label=\"user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Experience</h3>\n<p>A well-designed authorization system ensures that users can access the resources they need without unnecessary barriers. By providing a seamless and efficient user experience, employees can focus on their tasks without being impeded by access restrictions.</p>\n<h2 id=\"authentication-vs-authorization-understanding-the-techniques\" style=\"position:relative;\"><a href=\"#authentication-vs-authorization-understanding-the-techniques\" aria-label=\"authentication vs authorization understanding the techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication vs Authorization: Understanding the Techniques</h2>\n<p>When we talk about the difference between authentication and authorization, C IAM administrators should understand the core of utilizing both authentication and authorization, and how one differentiates from the other.</p>\n<p>For example, an organization will allow all its employees to access their workplace systems (that’s authentication!). But then, not everyone will have the right to access its gated data (that’s authorization!).</p>\n<p><a href=\"https://www.loginradius.com/authentication/\">Implementing authentication</a> with the right authorization techniques can protect organizations, while streamlined access will enable its workforce to be more productive.</p>\n<p>Here is the common authentication vs authorization techniques used by CIAM solutions to help you better understand the difference between authentication and authorization. However note that technologies like JWT, SAML, OpenID Authorization, and OAuth are used in both authentication and authorization.</p>\n<h3 id=\"popular-authentication-techniques\" style=\"position:relative;\"><a href=\"#popular-authentication-techniques\" aria-label=\"popular authentication techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Popular authentication techniques</strong></h3>\n<ul>\n<li><strong>Password-based authentication</strong> is a simple <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">method of authentication</a> that requires a password to verify the user's identity. </li>\n<li><strong>Passwordless authentication</strong> is <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">where a user is verified</a> through OTP or a magic link delivered to the registered email or phone number.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"passwordless-login\"\n        title=\"passwordless-login\"\n        src=\"/static/f4798092ec43235616eb2638cc648d3f/e5715/passwordless-login.png\"\n        srcset=\"/static/f4798092ec43235616eb2638cc648d3f/a6d36/passwordless-login.png 650w,\n/static/f4798092ec43235616eb2638cc648d3f/e5715/passwordless-login.png 768w,\n/static/f4798092ec43235616eb2638cc648d3f/63ff0/passwordless-login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>2FA/MFA</strong> requires <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">more than one security level</a>, like an additional PIN or security question, to identify a user and grant access to a system. </li>\n<li><strong>Single sign-on</strong> (SSO) allows users to access multiple applications with a single set of credentials. </li>\n<li><strong>Social authentication</strong> verifies and <a href=\"https://www.loginradius.com/social-login/\">authenticates users</a> with existing credentials from social networking platforms.</li>\n</ul>\n<h3 id=\"popular-authorization-techniques\" style=\"position:relative;\"><a href=\"#popular-authorization-techniques\" aria-label=\"popular authorization techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Popular authorization techniques</strong></h3>\n<ul>\n<li><strong>Role-based access controls</strong> (RBAC) can be implemented for system-to-system and user-to-system privilege management.</li>\n<li><strong>JSON web token</strong> (JWT) is an open standard for securely transmitting data between parties, and users are authorized using a public/private key pair.</li>\n<li><strong>SAML</strong> is a standard Single Sign-On format (SSO) where authentication information is exchanged through XML documents that are digitally signed.</li>\n<li><strong>OpenID authorization</strong> verifies user identity based on an authorization server's authentication.</li>\n<li><strong>OAuth</strong> allows the API to authenticate and access the requested system or resource.</li>\n</ul>\n<p>To learn more about the authentication vs authorization - concept, differences, and techniques, check out the infographic created by LoginRadius.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 670%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Authentication-Vs-Authorization-infographic\"\n        title=\"Authentication-Vs-Authorization-infographic\"\n        src=\"/static/2935024506705ba2636afa047daa36cb/e5715/Authentication-Vs-Authorization-1.png\"\n        srcset=\"/static/2935024506705ba2636afa047daa36cb/a6d36/Authentication-Vs-Authorization-1.png 650w,\n/static/2935024506705ba2636afa047daa36cb/e5715/Authentication-Vs-Authorization-1.png 768w,\n/static/2935024506705ba2636afa047daa36cb/4fa52/Authentication-Vs-Authorization-1.png 1241w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"implementing-identity-and-access-management-with-loginradius\" style=\"position:relative;\"><a href=\"#implementing-identity-and-access-management-with-loginradius\" aria-label=\"implementing identity and access management with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Identity and Access Management with LoginRadius </h2>\n<p>Centralized identity and access management solutions can play a major role in delivering robust authentication and authorization for users within the organizational framework. </p>\n<p>A cloud-based CIAM solution like LoginRadius verifies authoritative user identities and automates privileges and rights based on <a href=\"https://www.loginradius.com/role-management/\">pre-defined roles</a>. </p>\n<p>What more? Not having to manually define permissions saves time, reduces backlogs, and ensure hassle-free user experience.</p>\n<p>Furthermore, with LoginRadius, opportunities to streamline CIAM are endless. That also includes securing access to privileged resources and safeguarding IT infrastructure from <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">cyber attacks</a>.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1.  What are some real-world examples of authentication and authorization in use?</strong></p>\n<p>Logging into a social media account using a username/password (authentication) and setting privacy controls for posts (authorization).</p>\n<p><strong>2. How do authentication and authorization improve overall security?</strong></p>\n<p>Authentication ensures only legitimate users access resources, while authorization restricts their actions, reducing potential threats from unauthorized users.</p>\n<p><strong>3. How can businesses determine which solution is best for their needs?</strong></p>\n<p>Businesses should assess their security requirements, user base, and budget to choose between various authentication methods (e.g., password-based, multi-factor, biometrics).</p>\n<p><strong>4. What are some common authentication and authorization technologies in use today?</strong></p>\n<p>Common authentication technologies include OTPs, fingerprint recognition, and smart cards. For authorization, role-based access control (RBAC) and OAuth are prevalent.</p>\n<p><strong>5.  How can authentication and authorization help with compliance requirements?</strong></p>\n<p>Properly implemented authentication and authorization processes can ensure data privacy and access controls, aiding businesses in meeting compliance regulations like GDPR or HIPAA.</p>\n<p><strong>6.  What is the future of authentication and authorization?</strong></p>\n<p>The future likely involves more advanced biometrics, continuous authentication, and AI-driven security measures to combat evolving cyber threats and enhance user experience. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 11, 2020","updated_date":null,"description":"As companies progress towards digital maturity in times of robust cloud-based systems and stringent online security, authentication and authorization are used in conjunction with each other.","title":"Authentication and Authorization Defined: What's the Difference? [Infographic]","tags":["authentication","authorization","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/e0951469abdfc257c0fc40334d45e1eb/33aa5/authentication-vs-authorization.jpg","srcSet":"/static/e0951469abdfc257c0fc40334d45e1eb/f836f/authentication-vs-authorization.jpg 200w,\n/static/e0951469abdfc257c0fc40334d45e1eb/2244e/authentication-vs-authorization.jpg 400w,\n/static/e0951469abdfc257c0fc40334d45e1eb/33aa5/authentication-vs-authorization.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":768,"currentPage":129,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}