{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/137","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction When you respect your consumer's time, they will return the favor with even better involvement on your platform. The benefit of…","fields":{"slug":"/identity/benefits-single-sign-on/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>When you respect your consumer's time, they will return the favor with even better involvement on your platform. The benefit of SSO for enterprises runs on a similar concept. </p>\n<p>So, <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">what is SSO</a>, and why does the above statement hold true?</p>\n<p>Single Sign-On or SSO is an authentication process that allows consumers to log in to multiple independent applications with a single set of credentials. With SSO, users can access a suite of applications via one single login, irrespective of the platform, technology, or domain used. </p>\n<p>On a similar note, it is also a challenge for both users and IT administrators to secure thousands of accounts and related user data.</p>\n<p>For both users and IT administrators, securely handling thousands of accounts and related user data is challenging. Enterprises use single sign-on as a single strategy to improve IT security, improve user experience, and cut IT cost in one go. </p>\n<h2 id=\"understanding-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#understanding-single-sign-on-sso\" aria-label=\"understanding single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding Single Sign-On (SSO)</h2>\n<p>Single Sign-On (SSO) is an authentication method that allows users to access multiple applications or systems with a single set of credentials. Here's how SSO works and its key components:</p>\n<h3 id=\"1-authentication-process\" style=\"position:relative;\"><a href=\"#1-authentication-process\" aria-label=\"1 authentication process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Authentication Process</h3>\n<p>When a user attempts to access an application, they are redirected to the SSO system for authentication. The user provides their credentials (e.g., username and password) once to the SSO system.</p>\n<h3 id=\"2-authentication-token\" style=\"position:relative;\"><a href=\"#2-authentication-token\" aria-label=\"2 authentication token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Authentication Token</h3>\n<p>Upon successful authentication, the SSO system issues a secure authentication token or session identifier to the user's browser. This token serves as proof of authentication and grants access to authorized applications.</p>\n<h3 id=\"3-token-based-access\" style=\"position:relative;\"><a href=\"#3-token-based-access\" aria-label=\"3 token based access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Token-based Access</h3>\n<p>The user's browser presents the authentication token to each application they attempt to access within the SSO environment. If the token is valid and the user is authorized, they are granted access without the need to re-enter their credentials.</p>\n<h3 id=\"4-centralized-identity-management\" style=\"position:relative;\"><a href=\"#4-centralized-identity-management\" aria-label=\"4 centralized identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Centralized Identity Management</h3>\n<p>SSO systems typically include centralized identity management capabilities, allowing administrators to manage user accounts, access permissions, and authentication policies from a single console.</p>\n<h3 id=\"5-integration-protocols\" style=\"position:relative;\"><a href=\"#5-integration-protocols\" aria-label=\"5 integration protocols permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Integration Protocols</h3>\n<p>SSO implementations often utilize standard protocols such as Security Assertion Markup Language (SAML), OAuth, or OpenID Connect for integration with various applications and systems. These protocols facilitate secure communication and interoperability between the SSO system and supported applications.</p>\n<p>By adopting SSO, organizations can streamline access management, enhance security, and improve user experience, ultimately driving operational efficiency and productivity across the enterprise.</p>\n<h2 id=\"7-advantages-of-sso-that-every-enterprise-should-know\" style=\"position:relative;\"><a href=\"#7-advantages-of-sso-that-every-enterprise-should-know\" aria-label=\"7 advantages of sso that every enterprise should know permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>7 Advantages of SSO That Every Enterprise Should Know</strong></h2>\n<p>No matter what your role as an end-user might be, you probably don’t like memorizing unique credentials for multiple logins, right? For instance, when a customer calls IT about resetting passwords, an enterprise can lose hours, tech resources, and money. </p>\n<h3 id=\"1-it-increases-employee-and-it-productivity\" style=\"position:relative;\"><a href=\"#1-it-increases-employee-and-it-productivity\" aria-label=\"1 it increases employee and it productivity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. It increases employee and IT productivity.</h3>\n<p>By contrast, a single point of access will reduce wasted time and resources. Here’s how.</p>\n<p>With single sign-on, you can: </p>\n<ul>\n<li><strong>Reduce support calls</strong>: Users with just one password to access all their apps won't require assistance as often.</li>\n<li><strong>Improve user experience</strong>: Since there’s no need to hop between multiple login URLs, or reset passwords, users save between 5 to 15 seconds per login. </li>\n<li><strong>Mitigate security risks</strong>: Employees can use their SSO login credentials on any device, in any web browser, without risking security.</li>\n</ul>\n<p>As you can see, the ability to increase the productivity of end-users is one of the greatest single sign on benefits.  </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS LoginRadius Single Sign on 1024x310\"\n        title=\"DS LoginRadius Single Sign on 1024x310\"\n        src=\"/static/41cc8ea16144a85f22b499da107c16bf/e5715/DS-LoginRadius-Single-Sign-on-1024x310.png\"\n        srcset=\"/static/41cc8ea16144a85f22b499da107c16bf/a6d36/DS-LoginRadius-Single-Sign-on-1024x310.png 650w,\n/static/41cc8ea16144a85f22b499da107c16bf/e5715/DS-LoginRadius-Single-Sign-on-1024x310.png 768w,\n/static/41cc8ea16144a85f22b499da107c16bf/2bef9/DS-LoginRadius-Single-Sign-on-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"2-it-improves-security-capabilities\" style=\"position:relative;\"><a href=\"#2-it-improves-security-capabilities\" aria-label=\"2 it improves security capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. It improves security capabilities.</h3>\n<p>One misconception about using an SSO solution is that it weakens security. The argument rests on the premise that if a master password is stolen, all related accounts will be compromised. </p>\n<p>In theory, this appears to be true, but with common-sense practices, SSO can actually reduce password theft. How?</p>\n<p>Since users only need to remember one password for multiple applications, they’re more likely to create a stronger (harder to guess) passphrase, and less likely to write it down. These best practices reduce the risk of password theft. </p>\n<p>As explained in the next section, a single sign-on strategy can also be combined with <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multi-factor authentication (MFA)</a> for extra security.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 78.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Customer uses SSO while Hacker is blocked via Risk-Based Authentication.\"\n        title=\"Customer uses SSO while Hacker is blocked via Risk-Based Authentication.\"\n        src=\"/static/b5c31aa8f9ebdab327e8ee04fca47183/e5715/hacker-blocked-RBA-graphic-7-Benefits-SSO-1024x805.png\"\n        srcset=\"/static/b5c31aa8f9ebdab327e8ee04fca47183/a6d36/hacker-blocked-RBA-graphic-7-Benefits-SSO-1024x805.png 650w,\n/static/b5c31aa8f9ebdab327e8ee04fca47183/e5715/hacker-blocked-RBA-graphic-7-Benefits-SSO-1024x805.png 768w,\n/static/b5c31aa8f9ebdab327e8ee04fca47183/2bef9/hacker-blocked-RBA-graphic-7-Benefits-SSO-1024x805.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"3-it-combines-with-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#3-it-combines-with-risk-based-authentication-rba\" aria-label=\"3 it combines with risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. It combines with Risk-Based Authentication (RBA).</h3>\n<p>Here’s how combining RBA with Single Sign-on provides an extra layer of security. </p>\n<p>As mentioned earlier, SSO gives your customer or end-user one “key” to sign in to multiple web properties, mobile apps, and third-party systems using one single identity. </p>\n<p>For even more security, you can combine SSO with risk-based authentication (RBA). With RBA, you and your security team can monitor user habits. This way, if you see any unusual user behavior, such as the wrong IP, or multiple login failures, you can demand extra identification verification. If the user fails at this, you can block them from access. </p>\n<p>This powerful combination can prevent cybercriminals from stealing data, damaging your site, or draining IT resources. </p>\n<h3 id=\"4-it-reduces-password-fatigue\" style=\"position:relative;\"><a href=\"#4-it-reduces-password-fatigue\" aria-label=\"4 it reduces password fatigue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. It reduces password fatigue.</h3>\n<p>To prevent cybercrime, security professionals insist on unique passwords for every single application. This means that the average user must remember dozens of passwords for personal and office use. Unfortunately, this often leads to \"password fatigue.\" </p>\n<p>How does password fatigue hurt enterprises? In short, more passwords, more problems. If customers have a hard time signing in, they’ll leave your site or app before you can convert them.</p>\n<p>A <a href=\"https://baymard.com/blog/password-requirements-and-password-reset\">recent usability study</a> by Baymard Institute proves this point. In this study, Baymard tested existing account users at two e-commerce sites (Amazon and ASOS) and found that 18.75% of users abandon their carts due to forgotten passwords or password reset issues.  </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 28.923076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAAA/UlEQVQY022RQU/CQBCFe7MtUCToVUtoa2gpiSBKta3aIiEhBQyEA8GLR/7//Tk7bdc18fDl7Uxf3+7Oaob9gIubccUEOtVGha4oc6sy4W9mb8rU/2iiuPITXAcpuoMYLWcmsYhm/wmWW64tN6qYoe1F7BHBgjpYE8bidEbxdUa+/4afFAjftohWR9JPBOmGWCN83WK6OOA+32FE/fF8j/7jkjcQB5InNCi1MXiH6WeszSBHa5ijHX6wWuGcepnsC63RnRf0KNSnTf9c2fRiNLyEiGmdwHRj7klVcUuP8BtOhEu6eufuWc5TK5NpwDxkRe1/atUj5mb/PlD9MD+TMK4dUz9iGwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\" Single Sign-On reduces shopping cart abandonment.\"\n        title=\" Single Sign-On reduces shopping cart abandonment.\"\n        src=\"/static/8e2eb0f6718928ab232dc0c1dfd7aa72/e5715/CART-abandonment-7-Benefits-of-Single-Sign-On-V01.03-08-1024x296.png\"\n        srcset=\"/static/8e2eb0f6718928ab232dc0c1dfd7aa72/a6d36/CART-abandonment-7-Benefits-of-Single-Sign-On-V01.03-08-1024x296.png 650w,\n/static/8e2eb0f6718928ab232dc0c1dfd7aa72/e5715/CART-abandonment-7-Benefits-of-Single-Sign-On-V01.03-08-1024x296.png 768w,\n/static/8e2eb0f6718928ab232dc0c1dfd7aa72/2bef9/CART-abandonment-7-Benefits-of-Single-Sign-On-V01.03-08-1024x296.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The benefit of single sign-on is that it’s only one password for customers to remember, for all of your applications.</p>\n<h3 id=\"5-it-streamlines-the-user-experience\" style=\"position:relative;\"><a href=\"#5-it-streamlines-the-user-experience\" aria-label=\"5 it streamlines the user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. It streamlines the user experience.</h3>\n<p><a href=\"https://www.loginradius.com/customer-experience-solutions/\">Enhanced user experience</a> is one of the most valuable benefits of SSO. As repeated logins are no longer required, customers can enjoy a modern digital experience. The SSO benefits for enterprises include an increase in customer loyalty and higher conversion rates.</p>\n<h3 id=\"6-it-prevents-shadow-it\" style=\"position:relative;\"><a href=\"#6-it-prevents-shadow-it\" aria-label=\"6 it prevents shadow it permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. It prevents Shadow IT.</h3>\n<p>Shadow IT is not new to the world of cybersecurity. It refers to unauthorized <a href=\"https://www.csoonline.com/article/3239849/shadow-it-its-not-what-you-think.html\">downloads in the workplace</a>.</p>\n<p>In the past, Shadow IT was limited to employees purchasing software at office supply stores. But as cloud-based downloads become more popular, the potential for risk grows.</p>\n<p>To solve this issue, IT admins can leverage SSO to monitor what apps employees use. Thus, identity theft risks can be thwarted. </p>\n<p>Bonus: With a single platform, a company’s IT or compliance team can ensure that global and local compliance rules are being followed, as well.</p>\n<h3 id=\"7-it-increases-software-adoption-rates\" style=\"position:relative;\"><a href=\"#7-it-increases-software-adoption-rates\" aria-label=\"7 it increases software adoption rates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. It increases software adoption rates.</h3>\n<p>Have you ever given up on a new app because the customer access or sign-up process was a pain? If you have, that’s a “technology fail.”</p>\n<p>Technology should make our lives easier, not cause frustration. Making sign-up or login easier with SSO increases the chance that customers will adopt your technology, use your app, and keep returning for more.</p>\n<p>To help you achieve this, LoginRadius is 100% committed to providing the latest industry-standard authentication technology. </p>\n<p>If SSO sounds like a good choice for your company, here’s how to get started. </p>\n<ul>\n<li><strong>Web SSO</strong>  is a browser-based session management system that allows consumers to access any connected web properties with a single identity.</li>\n<li><strong>Mobile SSO</strong> works the same way as web SSO, except it unifies consumer sessions across multiple connected mobile applications. </li>\n<li><strong>Federated SSO</strong> utilizes IDPs to store and authenticate consumer identities to log in to third-party web portals, mobile applications, and more, depending on their configuration. Several identity protocols like SAML, JWT, OpenID Connect, OAuth, and Multipass are designed to authenticate consumers. </li>\n</ul>\n<p>See how the <a href=\"https://www.loginradius.com/single-sign-on/\">LoginRadius platform provides SSO</a> (and more) in one easy-to-use platform. Book a free demo with us today. </p>\n<h2 id=\"security-considerations-with-sso\" style=\"position:relative;\"><a href=\"#security-considerations-with-sso\" aria-label=\"security considerations with sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Considerations with SSO</h2>\n<p>While Single Sign-On (SSO) offers numerous benefits, it's essential to address potential security considerations:</p>\n<h3 id=\"1-centralized-access-point\" style=\"position:relative;\"><a href=\"#1-centralized-access-point\" aria-label=\"1 centralized access point permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Centralized Access Point</h3>\n<p>SSO creates a centralized access point for multiple applications, making it crucial to secure this entry point against unauthorized access. Implementing robust authentication mechanisms, such as multi-factor authentication (MFA) and risk-based authentication (RBA), can help mitigate risks.</p>\n<h3 id=\"2-credential-management\" style=\"position:relative;\"><a href=\"#2-credential-management\" aria-label=\"2 credential management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Credential Management</h3>\n<p>Since users rely on a single set of credentials for multiple applications, securing these credentials becomes paramount. Encourage users to create strong, unique passwords and regularly update them. Additionally, consider implementing password policies and enforcing password complexity requirements.</p>\n<h3 id=\"3-session-management\" style=\"position:relative;\"><a href=\"#3-session-management\" aria-label=\"3 session management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Session Management</h3>\n<p>Proper session management is vital to prevent unauthorized access to user accounts. Implement session timeout mechanisms to automatically log users out after a period of inactivity. Furthermore, consider implementing techniques such as session encryption and token-based authentication to enhance session security.</p>\n<h3 id=\"4-data-privacy-and-compliance\" style=\"position:relative;\"><a href=\"#4-data-privacy-and-compliance\" aria-label=\"4 data privacy and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Data Privacy and Compliance</h3>\n<p>Ensure compliance with data privacy regulations, such as GDPR and CCPA, when implementing SSO. Protect sensitive user data by implementing encryption protocols and access controls. Additionally, regularly audit access logs and monitor user activity to detect and respond to any suspicious behavior promptly.</p>\n<h3 id=\"5-vendor-security\" style=\"position:relative;\"><a href=\"#5-vendor-security\" aria-label=\"5 vendor security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Vendor Security</h3>\n<p>When choosing an SSO provider or solution, thoroughly assess their security measures and protocols. Ensure that the vendor follows industry best practices and complies with relevant security standards. Additionally, consider conducting security assessments and audits of the vendor's infrastructure and processes to verify their security posture.</p>\n<p>By addressing these security considerations proactively, businesses can maximize the benefits of SSO while maintaining robust security measures to protect user data and mitigate potential risks.</p>\n<h2 id=\"roi-analysis-of-sso-implementation\" style=\"position:relative;\"><a href=\"#roi-analysis-of-sso-implementation\" aria-label=\"roi analysis of sso implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>ROI Analysis of SSO Implementation</h2>\n<p>Implementing Single Sign-On (SSO) can yield significant returns on investment (ROI) for businesses:</p>\n<h3 id=\"1-cost-savings\" style=\"position:relative;\"><a href=\"#1-cost-savings\" aria-label=\"1 cost savings permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Cost Savings</h3>\n<p>SSO reduces IT support costs by minimizing password-related support calls and helpdesk inquiries. With fewer password resets and account lockouts, IT resources can be allocated more efficiently, resulting in cost savings for the organization.</p>\n<h3 id=\"2-productivity-gains\" style=\"position:relative;\"><a href=\"#2-productivity-gains\" aria-label=\"2 productivity gains permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Productivity Gains</h3>\n<p>By streamlining the authentication process and eliminating the need for multiple logins, SSO enhances user productivity. Employees spend less time managing credentials and navigating authentication processes, allowing them to focus on core tasks and projects.</p>\n<h3 id=\"3-security-enhancements\" style=\"position:relative;\"><a href=\"#3-security-enhancements\" aria-label=\"3 security enhancements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Security Enhancements</h3>\n<p>While security considerations are paramount, implementing SSO with robust authentication measures can enhance overall security posture. By reducing the risk of password-related vulnerabilities and enforcing stronger authentication methods, businesses can mitigate the potential costs associated with data breaches and security incidents.</p>\n<h3 id=\"4-improved-user-experience\" style=\"position:relative;\"><a href=\"#4-improved-user-experience\" aria-label=\"4 improved user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Improved User Experience</h3>\n<p>SSO enhances user experience by providing seamless access to multiple applications with a single set of credentials. This improves user satisfaction and loyalty, leading to increased engagement and retention rates.</p>\n<h3 id=\"5-compliance-benefits\" style=\"position:relative;\"><a href=\"#5-compliance-benefits\" aria-label=\"5 compliance benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Compliance Benefits</h3>\n<p>SSO facilitates centralized access control and authentication management, simplifying compliance with regulatory requirements. By enforcing consistent access policies and auditing user activity, businesses can demonstrate compliance with industry regulations and avoid non-compliance penalties.</p>\n<p>By conducting a comprehensive ROI analysis, businesses can quantify the financial benefits of SSO implementation and make informed decisions about investing in this technology to drive efficiency, productivity, and security across the organization.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What are the benefits of SSO and MFA?</strong></p>\n<p>SSO enhances user experience by allowing access to multiple applications with one login, while MFA adds an extra layer of security, reducing the risk of unauthorized access.</p>\n<p><strong>2. Why is SSO needed?</strong></p>\n<p>SSO simplifies access management by allowing users to use one set of credentials for multiple applications, streamlining authentication processes and enhancing productivity.</p>\n<p><strong>3. What is SSO between two applications?</strong></p>\n<p>SSO between two applications enables users to log in once and access both applications seamlessly without the need to re-enter credentials, enhancing user experience and efficiency.</p>\n<p><strong>4. What is the single sign-on method?</strong></p>\n<p>Single sign-on (SSO) is an authentication method that allows users to access multiple applications or systems with a single set of credentials, improving convenience and security.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 12, 2019","updated_date":null,"description":"Now that more enterprises are moving to the cloud, customers expect seamless access from anywhere, anywhere, and on any computer, to multiple applications. Likewise, as most large corporations have hundreds of touchpoints under different labels, trying to handle them all will strain their IT departments.","title":"7 Benefits of Single Sign-On (SSO) and Why Your Business Needs It","tags":["single sign on","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/70047ca07972d8bd1f9fc7d52e6b5946/33aa5/benefits-sso.jpg","srcSet":"/static/70047ca07972d8bd1f9fc7d52e6b5946/f836f/benefits-sso.jpg 200w,\n/static/70047ca07972d8bd1f9fc7d52e6b5946/2244e/benefits-sso.jpg 400w,\n/static/70047ca07972d8bd1f9fc7d52e6b5946/33aa5/benefits-sso.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"We're delightfully Announcing SDK Version 10.0.0.  This full-version release includes major changes with several improvements and…","fields":{"slug":"/engineering/sdk-version-10-0-0/"},"html":"<p>We're delightfully Announcing SDK Version 10.0.0. </p>\n<p>This full-version release includes major changes with several improvements and optimizations, the details have been given below. For complete information please visit <a href=\"https://www.loginradius.com/docs/api/\">LoginRadius API documents</a>.</p>\n<h3 id=\"new-features-added\" style=\"position:relative;\"><a href=\"#new-features-added\" aria-label=\"new features added permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>New Features Added:</strong></h3>\n<ul>\n<li><strong>Added PIN Authentication feature APIs.</strong> : We have added the PIN authentication feature. By enabling this feature Customer can provide PIN code for the authorization process. For more details please refer to the <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/authentication/pin-authentication/overview/\">PIN Authentication Document</a>.</li>\n<li><strong>Added Consent Management feature APIs. :</strong> The Consent Management feature allows collecting consent details from the new or existing customers so that you can further use that data.</li>\n<li><strong>Added Local SOTT generation (Secured one-time token):</strong> SOTT is used for LoginRadius user registration via the authentication API or via the Javascript Interfaces. Now SOTT can be generated from the SDK. More detail on SOTT Usage can be seen <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/sott-usage\">here</a>.</li>\n</ul>\n<h3 id=\"improvements-and-optimizations\" style=\"position:relative;\"><a href=\"#improvements-and-optimizations\" aria-label=\"improvements and optimizations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Improvements and optimizations:</strong></h3>\n<ul>\n<li>Added internal parameter validations in the API function.</li>\n<li>ApiKey and ApiSecret usage redundancy removed.</li>\n<li>All LoginRadius related features need to be defined once only and SDK will handle them automatically.</li>\n<li>Improved the naming conventions of API functions for better readability.</li>\n<li>Better Error and Exception Handling for LoginRadius API Response in SDK.</li>\n<li>Completely revamped each SDK and restructured them with the latest API function names and parameters.</li>\n<li>Added detailed description to API functions and parameters for better understanding.</li>\n<li>Updated the SDK demos according to the latest SDK changes.</li>\n</ul>\n<h3 id=\"new-apis\" style=\"position:relative;\"><a href=\"#new-apis\" aria-label=\"new apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>New APIs:</strong></h3>\n<p>We have added new APIs in this release, that will complement the existing ones.</p>\n<ul>\n<li>Update Phone ID by UID</li>\n<li>Upsert Email</li>\n<li>Role Context profile</li>\n<li>MFA Resend OTP</li>\n<li>User Registration By Captcha</li>\n<li>Get Access Token via Linkedin Token</li>\n<li>Get Access Token By Foursquare Access Token</li>\n<li>Get Active Session By Account Id</li>\n<li>Get Active Session By Profile Id</li>\n<li>Delete User Profiles By Email</li>\n<li>Verify Multifactor OTP Authentication</li>\n<li>Verify Multifactor Password Authentication</li>\n<li>Verify Multifactor PIN Authentication</li>\n<li>Update UID</li>\n<li>MFA Re-authentication by PIN</li>\n<li>Pin Login</li>\n<li>Forgot Pin By Email</li>\n<li>Forgot Pin By UserName</li>\n<li>Reset PIN By ResetToken</li>\n<li>Reset PIN By SecurityAnswer And Email</li>\n<li>Reset PIN By SecurityAnswer And Username</li>\n<li>Reset PIN By SecurityAnswer And Phone</li>\n<li>Forgot Pin By Phone</li>\n<li>Change Pin By Token</li>\n<li>Reset PIN by Phone and OTP</li>\n<li>Reset PIN by Email and OTP</li>\n<li>Reset PIN by Username and OTP</li>\n<li>Set Pin By PinAuthToken</li>\n<li>Invalidate Pin Session Token</li>\n<li>Submit Consent By ConsentToken</li>\n<li>Get Consent Logs</li>\n<li>Submit Consent By AccessToken</li>\n<li>Verify Consent By AccessToken</li>\n<li>Update Consent Profile By AccessToken</li>\n<li>Get Consent Logs By Uid</li>\n<li>Album With Cursor</li>\n<li>Audio With Cursor</li>\n<li>Check-In With Cursor</li>\n<li>Event With Cursor</li>\n<li>Following With Cursor</li>\n<li>Group With Cursor</li>\n<li>Like With Cursor</li>\n</ul>\n<h3 id=\"removed-apis\" style=\"position:relative;\"><a href=\"#removed-apis\" aria-label=\"removed apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Removed APIs:</strong></h3>\n<p>To cope up with the changes around the social platforms, we have removed some existing APIs as they are no longer supported by the social providers. Below are the details of those APIs.</p>\n<ul>\n<li><strong>GetCompanies API:</strong> This API was used to get the list of companies from social sites. we removed this API because it is not supported by the social providers</li>\n<li><strong>Getstatus API:</strong> This API was used to get the status from social sites.</li>\n</ul>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 31, 2019","updated_date":null,"description":null,"title":"SDK Version 10.0.0","tags":["Engineering","SDK","Version"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/88ba5be9965365e5417420f1910d9c33/497c6/SDK.png","srcSet":"/static/88ba5be9965365e5417420f1910d9c33/69585/SDK.png 200w,\n/static/88ba5be9965365e5417420f1910d9c33/497c6/SDK.png 400w","sizes":"(max-width: 400px) 100vw, 400px"}}},"author":{"id":"Indrasen Kumar","github":"indrasen715","avatar":null}}}},{"node":{"excerpt":"This blog is part 1 of a series on gRPC. Part 1 will go over some important concepts, part 2 will be a walkthrough of a client-server…","fields":{"slug":"/engineering/getting-started-with-grpc-part-1-concepts/"},"html":"<p><em>This blog is part 1 of a series on gRPC. Part 1 will go over some important concepts, part 2 will be a walkthrough of a client-server implementation in Go, and part 3 will be about LoginRadius' experience migrating to gRPC!</em></p>\n<p><strong>gRPC</strong></p>\n<p>gRPC, simply put, is just another way to send data across networks. It can be used to communicate between services in a microservice architecture, where a single service can interact with multiple others. Similarly, in client-server models, there can be multiple clients communicating with a common backend server.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 281px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 108.54092526690391%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Screen Shot 2019 10 30 at 1 31 52 PM\"\n        title=\"Screen Shot 2019 10 30 at 1 31 52 PM\"\n        src=\"/static/d43dcaf192be0d2c6332422eaa55f4f2/6b1e2/Screen-Shot-2019-10-30-at-1.31.52-PM.png\"\n        srcset=\"/static/d43dcaf192be0d2c6332422eaa55f4f2/6b1e2/Screen-Shot-2019-10-30-at-1.31.52-PM.png 281w\"\n        sizes=\"(max-width: 281px) 100vw, 281px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The gRPC framework was initially developed at Google and is now open-source. It is a modern implementation of the RPC (Remote Procedure Call) protocol, which has been around since the 80s. You will often see gRPC being compared to other technologies like SOAP, REST, and GraphQL.</p>\n<p>Some features:</p>\n<ul>\n<li>HTTP/2 based transport</li>\n<li>Unary calls: single request, single response</li>\n<li>Streaming calls: client, server, and bidirectional</li>\n<li>Layered design for further extension e.g. authentication, load balancing, logging</li>\n</ul>\n<p><em>How is it used to send data?</em></p>\n<p>gRPC is based on the idea of calling a remote procedure just like a local one. A procedure is like a function or a method. So, ideally developers can treat remote and local calls similarly. A great thing about gRPC is that developers do not need to know the details of the remote interaction.</p>\n<p>Here is a diagram from the official grpc <a href=\"https://grpc.io/docs/guides/\">docs</a> showing the flow:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.46153846153847%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Screen Shot 2019 10 30 at 1 35 45 PM 768x480\"\n        title=\"Screen Shot 2019 10 30 at 1 35 45 PM 768x480\"\n        src=\"/static/a8b70d1d23742fa9aae6c6d2791775c6/e5715/Screen-Shot-2019-10-30-at-1.35.45-PM-768x480.png\"\n        srcset=\"/static/a8b70d1d23742fa9aae6c6d2791775c6/a6d36/Screen-Shot-2019-10-30-at-1.35.45-PM-768x480.png 650w,\n/static/a8b70d1d23742fa9aae6c6d2791775c6/e5715/Screen-Shot-2019-10-30-at-1.35.45-PM-768x480.png 768w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Each client service will include a stub, which is like an interface containing the available remote procedures. These stubs are auto-generated files.</p>\n<p><em>But what does proto refer to? And what are stubs? How can we generate them?</em></p>\n<p>To answer these questions, we need to look at another technology called protocol buffers.</p>\n<p><strong>Protocol Buffers</strong></p>\n<p>Protocol buffers (protobufs), are a way to format data for storage and transport. gRPC uses protobufs to format data sent over the wire. It is comparable to other data serialization formats such as JSON, XML, and YAML.</p>\n<p>Some features:</p>\n<ul>\n<li>\n<p>Ability to generate interfaces (stubs) for many languages</p>\n<ul>\n<li>You can create proto definitions once (in a .proto file), and compile it into a variety of different languages including Go, Java, C#, and Python.</li>\n</ul>\n</li>\n<li>\n<p>Requires defining schemas - need to know expected data fields and types</p>\n<ul>\n<li>This is unlike JSON which is flexible.</li>\n</ul>\n</li>\n<li>\n<p>Binary format, meaning data is converted into binary when sent over the wire.</p>\n<ul>\n<li>Binary is smaller, and generally can be decoded faster compared to text-based formats such as JSON.</li>\n</ul>\n</li>\n</ul>\n<p><em>How is it used with gRPC?</em></p>\n<p>Step 1: Create proto definitions - methods, requests, responses.</p>\n<ul>\n<li>For example, in account.proto file, we define 3 rpc methods: Find, Update, and Delete.</li>\n<li>These are the remote procedures that can be called by clients.</li>\n</ul>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"protobuf\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">service AccountService {</span>\n<span class=\"grvsc-line\">  rpc Find(FindRequest) returns (FindResponse);</span>\n<span class=\"grvsc-line\">  rpc Update(UpdateRequest) returns (UpdateResponse);</span>\n<span class=\"grvsc-line\">  rpc Delete(DeleteRequest) returns (DeleteResponse);</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<ul>\n<li>Each method can have its own request and response schemas.</li>\n</ul>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"protobuf\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">message FindRequest {</span>\n<span class=\"grvsc-line\">  string Uid = 1;</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">message FindResponse {</span>\n<span class=\"grvsc-line\">  string Uid = 1;</span>\n<span class=\"grvsc-line\">  string Name = 2;</span>\n<span class=\"grvsc-line\">  int32 Age = 3;</span>\n<span class=\"grvsc-line\">  bool isVerified = 4;</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<ul>\n<li>Note that each field in a message has a unique number. These numbers are used to identify the fields when encoded into binary (recall that protobuf sends data over the wire as binary).</li>\n</ul>\n<p>Step 2: Compile proto file for auto-generated stubs in desired language.</p>\n<ul>\n<li>First, the compiler needs to be <a href=\"https://github.com/protocolbuffers/protobuf\">installed</a>. Refer to blog <em>part 2</em> for detailed instructions.</li>\n<li>The compiler is invoked by the protoc command. In this case, the file account.proto is compiled into Golang with a grpc plugin.</li>\n</ul>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"batch\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">protoc account.proto --go_out=plugins=grpc:.</span></span></code></pre>\n<ul>\n<li>Different languages may have different ways of compiling proto files. For instance with NodeJS, there are npm libraries which allow programmatically compiling proto files.</li>\n</ul>\n<p>Step 3: Use stubs in server and clients.</p>\n<p><strong>The Big Picture</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 387px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 92.24806201550389%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Screen Shot 2019 10 30 at 1 57 55 PM\"\n        title=\"Screen Shot 2019 10 30 at 1 57 55 PM\"\n        src=\"/static/729430686438f756b74979321b48537d/691c3/Screen-Shot-2019-10-30-at-1.57.55-PM.png\"\n        srcset=\"/static/729430686438f756b74979321b48537d/691c3/Screen-Shot-2019-10-30-at-1.57.55-PM.png 387w\"\n        sizes=\"(max-width: 387px) 100vw, 387px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Why gRPC?</strong></p>\n<p>One compelling reason to use gRPC is that it provides high performance</p>\n<ul>\n<li>HTTP/2: e.g. requests are multiplexed, so a single long-lived TCP connection can be used by multiple requests at once. This results in less connection overhead.</li>\n<li>Protobufs: e.g. as a binary format, it allows for quick encoding and decoding of data. </li>\n</ul>\n<p><em>How does it differ from REST?</em></p>\n<table>\n<thead>\n<tr>\n<th></th>\n<th><strong>gRPC</strong></th>\n<th><strong>REST</strong></th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>API</td>\n<td>Contract-based i.e. stubs</td>\n<td>Resource-based and relies on HTTP verbs i.e. GET/PUT/POST/DELETE</td>\n</tr>\n<tr>\n<td>Network protocol</td>\n<td>HTTP/2</td>\n<td>HTTP/1.1 or HTTP/2</td>\n</tr>\n<tr>\n<td>Data serialization format</td>\n<td>Protocol buffers</td>\n<td>JSON</td>\n</tr>\n<tr>\n<td>Streaming</td>\n<td>Built-in support for client, server, and bi-directional streaming</td>\n<td>REST on HTTP/1.1 does not allow streaming</td>\n</tr>\n</tbody>\n</table>\n<p><strong>Other Considerations</strong></p>\n<p>Here, we briefly go over a few other things to consider with gRPC. These will be covered in more detail in another blog.</p>\n<p><em>Management of proto files</em><br>\nIf you plan to have multiple proto files and client services, you need some way to manage them for distribution and version control. One solution is to keep all proto files in a central git repository, and maintain versions using git tags.</p>\n<p><em>Using proto2 vs. proto3</em><br>\nProtocol buffers have two syntax versions: proto2 and proto3.</p>\n<ul>\n<li>One key feature in proto2 is that it differentiates between required and optional fields, and supports nullable fields.</li>\n<li>In proto3, all fields are optional and nullable fields are no longer supported. If a field is unset, it will be set to a default value e.g. empty string for type string. Because of this, determining whether a field was intentionally set or not requires workarounds such as using wrappers.</li>\n</ul>\n<p><em>Load-Balancing</em><br>\nSomething to note about load-balancing gRPC is that HTTP/2 requires L7 (Application Layer) load-balancers. Recall that in HTTP/2, TCP connections are long-lived and requests are multiplexed. This makes L4 (Connection Layer) load-balancers ineffective. This differs from HTTP/1.1 where TCP connections get cycled and can benefit from L4 load-balancers. </p>\n<p>That's it for now! To learn more, check out the official <a href=\"https://grpc.io\">gRPC</a> and <a href=\"https://developers.google.com/protocol-buffers\">protobuf</a> docs.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n</style>","frontmatter":{"date":"October 30, 2019","updated_date":null,"description":null,"title":"Getting Started with gRPC - Part 1 Concepts","tags":["Engineering","gRPC"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/ceff66d5b341e58e4b85f5a6c3a7cbad/f006c/grpc.png","srcSet":"/static/ceff66d5b341e58e4b85f5a6c3a7cbad/69585/grpc.png 200w,\n/static/ceff66d5b341e58e4b85f5a6c3a7cbad/f006c/grpc.png 246w","sizes":"(max-width: 246px) 100vw, 246px"}}},"author":{"id":"Andy Yeung","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Cross-Site Request Forgery (CSRF) is a common web application attack where a victims’ authenticated session becomes compromised…","fields":{"slug":"/engineering/introduction-to-cross-site-request-forgery-csrf/"},"html":"<p><strong>Introduction</strong></p>\n<p>Cross-Site Request Forgery (CSRF) is a common web application attack where a victims’ authenticated session becomes compromised. This attack essentially tricks a victim into performing unintended tasks on a website they are authenticated in. There are variations to this attack, and a popular one we will discuss is utilizing authentication token to imitate api requests.</p>\n<p><strong>Context</strong></p>\n<p>In order to understand CSRF, it is important to know how cookies and authentication tokens are used for persisting user sessions. Cookies are information stored in the browser, and often used for managing state between HTTP requests. A key feature of cookies is that they are automatically passed as a header in HTTP requests. Authentication tokens are typically stored as cookies, and are a way to keep track of a users’ authenticated session. These tokens are set as cookies after a user successfully authenticates themselves by log in.</p>\n<p><strong>How it works</strong></p>\n<p>CSRF takes advantage of the storage of auth tokens in the browser, and constructs http requests to a target server on behalf of the user. Imitating http requests from the legitimate site requires research and preparation from the attacker beforehand, such as finding vulnerable websites and api’s suitable for the attack.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 606px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.76567656765676%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAALCAYAAAB/Ca1DAAAACXBIWXMAAAsTAAALEwEAmpwYAAABB0lEQVQoz4WTiQrEMAhE8/+/WSj0vu8jyxMmZLvLriBaY8bRWHddlz/P02NjH7nv2yzf67r64zjM7vtuPlaqM8cHINht24IvMAESQ4qisDwVlCLEnRLnefZN05hPNbEUIDFkGAYrGncgC1YAhO44jH8By7I00HgsXwGnafrJUHMCsK7rj7ZDywCRwGy6rgsHxBnDsiy+bVvf973lAUhhzuM5vzHkImAk4gMYJ+MTs7GMo7VMnjYD5ijFHQ5AeZ4bKAy4+HxlPQRMVTxJEp+mqVnFnfYKdBQmaDxDwDmDHW3DUPekoeV4qePlfq4EYFmWGYuqqmyuTzFA/0PiP0XM9VCMisJS5bwAS0depIUcuKgAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image2\"\n        title=\"image2\"\n        src=\"/static/b83e1bb3840acfc8b1162e6263c5df22/4d4a2/image2.png\"\n        srcset=\"/static/b83e1bb3840acfc8b1162e6263c5df22/4d4a2/image2.png 606w\"\n        sizes=\"(max-width: 606px) 100vw, 606px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Here is a high-level example of an CSRF attack. Note that some details are excluded for simplicity, but the key aspects are included.</p>\n<ol>\n<li>\n<p>John is authenticated on banking.io</p>\n<ul>\n<li>Auth token is set as a cookie on the browser.</li>\n</ul>\n</li>\n<li>\n<p>On another tab, John clicks on an advertisement for free money, which leads to a malicious site.</p>\n<ul>\n<li>Typically, some social engineering is necessary to lure victims to a malicious website.</li>\n</ul>\n</li>\n<li>\n<p>Malicious site makes a POST request to banking.io/setpassword, which is an api for setting a users password to anything.</p>\n<ul>\n<li>The malicious site will construct the POST request for setting password exactly like the legitimate site, and uses John’s authentication cookie.</li>\n<li>The password will be set to anything the attacker wants.</li>\n</ul>\n</li>\n<li>Victim is unable to authenticate with banking.io anymore, because the password was set to something else.</li>\n</ol>\n<p><strong>Mitigation</strong></p>\n<p>A common and effective way of mitigating CSRF is called the double submit cookie. Essentially the client will have two paired and encrypted tokens: one hidden in the page HTML and the other stored as a cookie.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 362px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 69.06077348066299%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image1\"\n        title=\"image1\"\n        src=\"/static/d77ad92ba64b2cbbd3e711289b8a6750/10600/image1.png\"\n        srcset=\"/static/d77ad92ba64b2cbbd3e711289b8a6750/10600/image1.png 362w\"\n        sizes=\"(max-width: 362px) 100vw, 362px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>When a request is made by the client, both tokens are sent to the server, and the server will then ensure the tokens are valid pairs before processing the request as normal. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 360px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61111111111111%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image3\"\n        title=\"image3\"\n        src=\"/static/849c7d576c91bbfd334eee6ffbdf0853/f21e7/image3.png\"\n        srcset=\"/static/849c7d576c91bbfd334eee6ffbdf0853/f21e7/image3.png 360w\"\n        sizes=\"(max-width: 360px) 100vw, 360px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Now the attacker will be unable to perform CSRF since they will not have access to the token hidden in the pages HTML, and the target server requires a valid token pair before processing the request.</p>\n<p>There are also many other mitigation techniques, such as using the Same-Site cookie attribute, and requiring user interaction such as CAPTCHA for requests. Learn more on the <a href=\"https://owasp.org/www-community/attacks/csrf\">OWASP wiki</a>).</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 30, 2019","updated_date":null,"description":null,"title":"Introduction to Cross-Site Request Forgery (CSRF)","tags":["CSRF"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/4a13eeb54334febf9c8db79b24424eb6/2244e/crosspath.jpg","srcSet":"/static/4a13eeb54334febf9c8db79b24424eb6/f836f/crosspath.jpg 200w,\n/static/4a13eeb54334febf9c8db79b24424eb6/2244e/crosspath.jpg 400w","sizes":"(max-width: 400px) 100vw, 400px"}}},"author":{"id":"Andy Yeung","github":null,"avatar":null}}}},{"node":{"excerpt":"Cybersecurity awareness helps protect enterprises, employees, and customers. That’s why, more than ever, enterprises are working hard to…","fields":{"slug":"/identity/cloud-computing-security-challenges/"},"html":"<p>Cybersecurity awareness helps protect enterprises, employees, and customers. That’s why, more than ever, enterprises are working hard to protect sensitive data against breaches and hacks. Likewise, consumers want to change unsafe habits, so they can better protect their personal and vulnerable information.</p>\n<p>One answer may be a cloud-based <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management (CIAM)</a> solution, like the one we have built at LoginRadius. This would enable more security features like single sign-on, <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless logins</a>, and multi-factor authentication. </p>\n<h2 id=\"5-cloud-security-challenges-that-businesses-face-today\" style=\"position:relative;\"><a href=\"#5-cloud-security-challenges-that-businesses-face-today\" aria-label=\"5 cloud security challenges that businesses face today permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Cloud Security Challenges that Businesses Face Today</h2>\n<h3 id=\"1-ddos-attacks\" style=\"position:relative;\"><a href=\"#1-ddos-attacks\" aria-label=\"1 ddos attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. DDoS attacks</h3>\n<p>DDoS or Denial-of-Service attacks are the number one concern of every cloud provider. These attacks cripple server performance and can take websites down for hours or days, hurting revenue and customer satisfaction. Meanwhile, attackers don’t need to invest in expensive hardware; they can relatively easily launch DDoS attacks over the internet.</p>\n<p>To combat cloud-based DDoS attacks, you'll need a responsive platform that can detect possible breaches, identify abnormal network behavior, and block DDoS attacks before they take down your website.</p>\n<h3 id=\"2-lack-of-cloud-security-architecture\" style=\"position:relative;\"><a href=\"#2-lack-of-cloud-security-architecture\" aria-label=\"2 lack of cloud security architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Lack of cloud security architecture</h3>\n<p>One of the main reasons organizations move to public clouds is the ability to seamlessly apply cloud security measures that are built into the cloud environment and take into account policies, identity, and compliance requirements.</p>\n<p>Cloud migration is a complex and challenging endeavor. Therefore, every aspect of the migration must be treated carefully in order to avoid critical business challenges such as data loss and security breaches.</p>\n<h3 id=\"3-data-breaches\" style=\"position:relative;\"><a href=\"#3-data-breaches\" aria-label=\"3 data breaches permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Data breaches</h3>\n<p>This is the most common adoption concern when it comes to moving to cloud infrastructure. After all, IT professionals have had full control of everything related to security when it comes to on-premises infrastructure. </p>\n<p>It is important that you choose a provider with a proven track record in implementing strong security protocols in their own data centers. This will ensure that the security controls you have in place today remain intact and that any new, vital security controls are added as well.</p>\n<h3 id=\"4-insecure-interfaces-and-apis\" style=\"position:relative;\"><a href=\"#4-insecure-interfaces-and-apis\" aria-label=\"4 insecure interfaces and apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Insecure interfaces and APIs</h3>\n<p>Cloud computing providers are expected to ensure the security of customer resources, even during times of high-volume system changes. This goal is particularly difficult because security must be built into the cloud API. Cloud API providers must rely on authentication and authorization tools to validate requests.</p>\n<h3 id=\"span-stylecolor-ff4500-poorly-designed-apis-may-lead-to-misuse-of-information-or-even-data-breaches-when-an-organization-makes-a-change-to-an-api-it-must-take-into-account-how-that-change-affects-both-internal-and-external-consumers-span\" style=\"position:relative;\"><a href=\"#span-stylecolor-ff4500-poorly-designed-apis-may-lead-to-misuse-of-information-or-even-data-breaches-when-an-organization-makes-a-change-to-an-api-it-must-take-into-account-how-that-change-affects-both-internal-and-external-consumers-span\" aria-label=\"span stylecolor ff4500 poorly designed apis may lead to misuse of information or even data breaches when an organization makes a change to an api it must take into account how that change affects both internal and external consumers span permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><span style=\"color: #FF4500\"> \"Poorly designed APIs may lead to misuse of information or even data breaches. When an organization makes a change to an API, it must take into account how that change affects both internal and external consumers.\" </span></h3>\n<h3 id=\"5-lack-of-proper-education\" style=\"position:relative;\"><a href=\"#5-lack-of-proper-education\" aria-label=\"5 lack of proper education permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Lack of proper education</h3>\n<p>To keep your cloud security as strong as possible, you need to prioritize education, not just around best practices for traditional security but also on industry trends. And this is what most enterprises lack today. </p>\n<p>Team members should have a good understanding of the basics to start. For example, what is cloud computing and why do they need it? Then the team should identify experts within the organization to teach their colleagues more advanced cloud security, such as industry best practices.</p>\n<h2 id=\"how-safe-is-cloud-computing\" style=\"position:relative;\"><a href=\"#how-safe-is-cloud-computing\" aria-label=\"how safe is cloud computing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How safe is cloud computing? </h2>\n<p>Cloud security (AKA cloud computing security) is a set of policies, technologies, applications, and controls used to protect data and other material that is stored or run in the cloud. </p>\n<p>It’s safe because your files are stored on servers all around the world. This is called a ‘distributed system.’ Your data is encrypted when it travels over the internet, so it’s completely private and protected from hackers and thieves.</p>\n<p>Luckily, SaaS companies like LoginRadius specialize in cloud security that keeps customer data secure and private. We also offer IDaaS with a number of user authentication services like multi-factor authentication, single sign-on, and identity management. </p>\n<h2 id=\"what-is-idaas\" style=\"position:relative;\"><a href=\"#what-is-idaas\" aria-label=\"what is idaas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is IDaaS?</h2>\n<p>IDaaS is a software platform that focuses on protecting and <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">managing digital identities</a>. At LoginRadius, cloud security is at the core of our customer identity and access management (CIAM) platform. Cloud security is built into the foundation of everything we do—and we have the credentials to prove it. </p>\n<h2 id=\"which-security-credentials-matter\" style=\"position:relative;\"><a href=\"#which-security-credentials-matter\" aria-label=\"which security credentials matter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Which security credentials matter?</h2>\n<p>LoginRadius has successfully passed multiple audits and earned several certifications in recognition of our commitment to security. These include SOC 2® and ISAE 3000 Type II audits, which we completed in July and August. The SOC 2, issued by the American Institute of CPAs, is considered to be the highest standard for ensuring the security, availability, processing integrity, and confidentiality of customer data. Meanwhile, the ISAE 3000, issued by the International Federation of Accountants, is a standard for assurance over non-financial information.</p>\n<p>In August, we also achieved the ISO 27001 Information Security Standard Accredited certification, which sets the international industry-standard for establishing, implementing, maintaining, and continually improving an information security management system.</p>\n<h3 id=\"span-stylecolor-ff4500-our-privacy-shield-compliance-certification-recognizes-our-compliance-with-data-protection-requirements-when-transferring-personal-data-from-the-eu-and-switzerland-to-the-us-span-\" style=\"position:relative;\"><a href=\"#span-stylecolor-ff4500-our-privacy-shield-compliance-certification-recognizes-our-compliance-with-data-protection-requirements-when-transferring-personal-data-from-the-eu-and-switzerland-to-the-us-span-\" aria-label=\"span stylecolor ff4500 our privacy shield compliance certification recognizes our compliance with data protection requirements when transferring personal data from the eu and switzerland to the us span  permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><span style=\"color: #FF4500\"> Our Privacy Shield <a href=\"https://www.loginradius.com/compliances/\">compliance certification</a> recognizes our compliance with data protection requirements when transferring personal data from the EU and Switzerland to the US. </span>  </h3>\n<p>In addition, we hold a Security Trust Assurance and Risk (STAR) certification issued by the Cloud Security Alliance (CSA). CSA describes the STAR program as the <a href=\"https://cloudsecurityalliance.org/wp-uploads/2015/04/CSA_STAR-Brochure_April_2015.pdf/\">most powerful cloud security assurance program</a>, \"encompassing key principles of transparency, rigorous auditing, and harmonization of standards.\"</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAMABQDASIAAhEBAxEB/8QAFwABAQEBAAAAAAAAAAAAAAAAAAECBf/EABUBAQEAAAAAAAAAAAAAAAAAAAAD/9oADAMBAAIQAxAAAAHk5KTqD//EABQQAQAAAAAAAAAAAAAAAAAAACD/2gAIAQEAAQUCX//EABQRAQAAAAAAAAAAAAAAAAAAABD/2gAIAQMBAT8BP//EABQRAQAAAAAAAAAAAAAAAAAAABD/2gAIAQIBAT8BP//EABQQAQAAAAAAAAAAAAAAAAAAACD/2gAIAQEABj8CX//EABcQAQEBAQAAAAAAAAAAAAAAAAEQQRH/2gAIAQEAAT8hAY8yZP/aAAwDAQACAAMAAAAQUA//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAEDAQE/ED//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAECAQE/ED//xAAaEAEAAgMBAAAAAAAAAAAAAAABABEQITGB/9oACAEBAAE/EAO+RKamzRrCqDH/2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Cloud Security Challenges Today V01 01 02 1024x621\"\n        title=\"Cloud Security Challenges Today V01 01 02 1024x621\"\n        src=\"/static/0a513b71797d2fe3fd0da3d3d6b2daea/212bf/Cloud-Security-Challenges-Today-V01.01_02-1024x621.jpg\"\n        srcset=\"/static/0a513b71797d2fe3fd0da3d3d6b2daea/6aca1/Cloud-Security-Challenges-Today-V01.01_02-1024x621.jpg 650w,\n/static/0a513b71797d2fe3fd0da3d3d6b2daea/212bf/Cloud-Security-Challenges-Today-V01.01_02-1024x621.jpg 768w,\n/static/0a513b71797d2fe3fd0da3d3d6b2daea/72e01/Cloud-Security-Challenges-Today-V01.01_02-1024x621.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"why-choose-cloud-computing\" style=\"position:relative;\"><a href=\"#why-choose-cloud-computing\" aria-label=\"why choose cloud computing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why choose cloud computing? </h2>\n<p><strong>Cost-effectiveness</strong></p>\n<p>Typically, on-premises security solutions require a substantial investment to engineer and maintain. </p>\n<p>By contrast, with cloud computing, you don't need to pay anything upfront. That's because cloud security tools are built and operated by a third-party vendor. You only pay for what you need or use through a monthly or annual subscription. </p>\n<p><strong>Maintenance</strong></p>\n<p>With cloud security, a third-party vendor is responsible for maintaining the system, not you. This vendor is the one spending their money and time on upgrading, integrating, and optimizing the system. The vendor also keeps the technology up-to-date, leaving you free to focus on growing your business. </p>\n<p><strong>Scalability</strong></p>\n<p>Cloud servers are made to support massive sign-ins and sudden, dramatic surges of user actions (during a major sports game or popular TV voting system). </p>\n<p>In fact, the LoginRadius Identity Platform was designed with service provider-class scale in mind. The distributed CIAM network has regularly experienced peak transaction volumes in excess of <a href=\"https://www.sdxcentral.com/articles/news/security-startups-loginradius-and-siemplify-score-millions-more-in-funding/2018/07/\">150,000 logins per second</a>, and typically handles 10,000 requests per second with less than 500 milliseconds latency. Check our <a href=\"https://status.loginradius.com/\">live status</a> to see more.</p>\n<p><strong>Compliance</strong></p>\n<p>Any enterprise that stores customer data must comply with global privacy regulations. These regulations govern how you seek customer consent to use their data and what you do with that data.</p>\n<p>The European Union's <a href=\"https://www.loginradius.com/blog/2019/09/ccpa-vs-gdpr-the-compliance-war/\">General Data Protection Regulation (GDPR)</a> is just one example of this kind of legislation. With cloud security, your third-party vendor is responsible for compliance and has the expertise to do so.</p>\n<h3 id=\"span-stylecolor-ff4500-at-loginradius-our-identity-platform-complies-with-all-significant-data-security-and-privacy-laws-and-with-the-terms-of-various-social-networks-we-monitor-these-laws-regularly-for-changes-or-updates-and-being-that-our-cloud-data-centers-are-in-over-35-locations-worldwide-you-can-choose-where-your-customer-data-is-stored-to-comply-with-local-data-regulationsspan\" style=\"position:relative;\"><a href=\"#span-stylecolor-ff4500-at-loginradius-our-identity-platform-complies-with-all-significant-data-security-and-privacy-laws-and-with-the-terms-of-various-social-networks-we-monitor-these-laws-regularly-for-changes-or-updates-and-being-that-our-cloud-data-centers-are-in-over-35-locations-worldwide-you-can-choose-where-your-customer-data-is-stored-to-comply-with-local-data-regulationsspan\" aria-label=\"span stylecolor ff4500 at loginradius our identity platform complies with all significant data security and privacy laws and with the terms of various social networks we monitor these laws regularly for changes or updates and being that our cloud data centers are in over 35 locations worldwide you can choose where your customer data is stored to comply with local data regulationsspan permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><span style=\"color: #FF4500\"> At LoginRadius, our Identity Platform complies with all significant data security and privacy laws and with the terms of various social networks. We monitor these laws regularly for changes or updates. And being that our cloud data centers are in over 35 locations worldwide, you can choose where your customer data is stored to comply with local data regulations. </span></h3>\n<p><strong>Secure Data Access</strong></p>\n<p>Customer access to their data is a requirement of the <a href=\"https://www.loginradius.com/blog/identity/ccpa-introduction/\">California Consumer Privacy Act (CCPA)</a>, and non-compliance can result in hefty fines. However, data stored on cloud services is instantly available to authorized users. On the cloud, centralized data can be backed up regularly and restored quickly in case <a href=\"https://searchdisasterrecovery.techtarget.com/definition/disaster-recovery\">disaster recovery</a> is ever necessary.</p>\n<p><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"SASE-approach\"\n        title=\"SASE-approach\"\n        src=\"/static/a164480ea3177cb0422ee6104202f8b3/e5715/SASE-approach.png\"\n        srcset=\"/static/a164480ea3177cb0422ee6104202f8b3/a6d36/SASE-approach.png 650w,\n/static/a164480ea3177cb0422ee6104202f8b3/e5715/SASE-approach.png 768w,\n/static/a164480ea3177cb0422ee6104202f8b3/63ff0/SASE-approach.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Better Performance</strong></p>\n<p>Just as cloud technology powers its way into transforming entire industries, so does its technology progressively cut down on latency times and work to improve overall performance.</p>\n<p>Moreover, a third-party data center provider can speed up your hardware refresh cycles and deliver the latest high-performance equipment. With a third-party data center provider, all you need to do is add more power or expand the floor space when you need it. You don’t have to worry about maintaining huge backup spares, or worry about the manufacturer’s end-of-life (EOL) replacement schedules.</p>\n<p><strong>Speed to Market</strong></p>\n<p>Cloud computing enables enterprises to provision resources for development and testing across a wide variety of environments. Once they are complete, applications can be rapidly deployed into an operational environment hosted on the cloud for a smooth launch. </p>\n<p>As these environments feature elastic scaling capabilities, organizations no longer need to worry about an incorrect capacity estimate impacting their ability to scale on demand.</p>\n<p><strong>Cloud Security Alliance</strong></p>\n<p>The Cloud Security Alliance is the world's leading organization dedicated to defining and raising awareness of cloud security best practices. </p>\n<p>LoginRadius is a member, along with other experts in cloud security. Together, CSA members share up-to-date developments about the cloud computing environment. We recognize emerging security risks so that we can improve cloud security for everyone. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/image5.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/image5.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/image5.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/image5.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 24, 2019","updated_date":null,"description":"For business owners and IT professionals around the world, security in the cloud is still a pressing concern. There are a lot of things you need to consider when moving your business to a cloud environment; from data protection, getting the right platform for your needs, how to protect data during transit, and more.","title":"Cloud Security Challenges Today: Expert Advice on Keeping your Business Safe","tags":["cloud computing","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7094017094017093,"src":"/static/b2a6a3684601fcdbc25d01fbaa991fb1/cd427/cloud-computing-security-challenges-cover.jpg","srcSet":"/static/b2a6a3684601fcdbc25d01fbaa991fb1/f836f/cloud-computing-security-challenges-cover.jpg 200w,\n/static/b2a6a3684601fcdbc25d01fbaa991fb1/2244e/cloud-computing-security-challenges-cover.jpg 400w,\n/static/b2a6a3684601fcdbc25d01fbaa991fb1/cd427/cloud-computing-security-challenges-cover.jpg 626w","sizes":"(max-width: 626px) 100vw, 626px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"When it comes to online security, the battle cry among experts lately is: “The future is passwordless!” So, why is passwordless…","fields":{"slug":"/identity/passwordless-authentication-the-future-of-identity-and-security/"},"html":"<p>When it comes to online security, the battle cry among experts lately is: “The future is passwordless!” So, why is passwordless authentication so important?</p>\n<p>Simple. Passwords are just too easy to guess, hack, or intercept. What’s more, the legacy of password reuse is leading to constant <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">attack and account vulnerabilities</a>.</p>\n<p>However, modern-day passwordless authentication security goes beyond the use of password and username credentials. </p>\n<p>So, whether your organization wants to replace passwords or is determined to keep using them, you must first <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">understand password weaknesses</a>. Here are a few:</p>\n<ul>\n<li>Users often create weak passwords that are vulnerable to phishing attacks.</li>\n<li>Hackers commonly use brute force attacks to hack password credentials. </li>\n<li>Users often reuse the same authentication credentials on different accounts.</li>\n<li>Password methods alone cannot keep hackers away.</li>\n</ul>\n<p>Remember that we’re not dealing with bored, out-of-work hackers playing for thrills. Rather, these are often well-established criminal organizations using high-end machine learning (for <em>big</em> profit). </p>\n<h2 id=\"what-is-passwordless-authentication\" style=\"position:relative;\"><a href=\"#what-is-passwordless-authentication\" aria-label=\"what is passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Passwordless Authentication?</h2>\n<p>A <a href=\"https://www.loginradius.com/passwordless-login/\">passwordless authentication</a> system is one that swaps the use of a traditional password with more secure factors. These extra-security methods may include a magic link, fingerprint, PIN, or a secret token delivered via email or text message.</p>\n<h2 id=\"why-do-we-need-passwordless-authentication\" style=\"position:relative;\"><a href=\"#why-do-we-need-passwordless-authentication\" aria-label=\"why do we need passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Do We Need Passwordless Authentication?</h2>\n<p>Most people have questions regarding the reliability of passwordless authentication and they always question themselves- is passwordless more secure? Well, passwordless login <a href=\"https://www.loginradius.com/passwordless-login/\">eliminates the need to generate passwords</a> altogether. There’s a lot of good in this new-age process for both users and organizations alike.</p>\n<p>For users, since one need not type passwords anymore, it leads to a better screen time experience. While for organizations, it will <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">lead to fewer breaches</a> and support costs.</p>\n<p>The good news is that the list doesn’t stop here. Let’s learn more. </p>\n<h2 id=\"comparative-analysis-passwordless-vs-traditional-authentication\" style=\"position:relative;\"><a href=\"#comparative-analysis-passwordless-vs-traditional-authentication\" aria-label=\"comparative analysis passwordless vs traditional authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Comparative Analysis: Passwordless vs Traditional Authentication</h2>\n<p>Let’s quickly compare passwordless and traditional authentication and learn how secure is passwordless authentication: </p>\n<h3 id=\"1-security\" style=\"position:relative;\"><a href=\"#1-security\" aria-label=\"1 security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Security</h3>\n<ul>\n<li><strong>Passwordless Authentication</strong>: Offers enhanced security by eliminating the risks associated with passwords, such as phishing, brute force attacks, and password reuse.</li>\n<li><strong>Traditional Authentication</strong>: Relies solely on passwords, which are susceptible to various cyber threats, making accounts vulnerable to unauthorized access.</li>\n</ul>\n<h3 id=\"2-user-experience\" style=\"position:relative;\"><a href=\"#2-user-experience\" aria-label=\"2 user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. User Experience</h3>\n<ul>\n<li><strong>Passwordless Authentication</strong>: Provides a seamless and user-friendly experience, as users do not need to remember complex passwords.</li>\n<li><strong>Traditional Authentication</strong>: Often results in password fatigue and the need to remember multiple passwords, leading to user frustration.</li>\n</ul>\n<h3 id=\"3-cost-effectiveness\" style=\"position:relative;\"><a href=\"#3-cost-effectiveness\" aria-label=\"3 cost effectiveness permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Cost-Effectiveness</h3>\n<ul>\n<li><strong>Passwordless Authentication</strong>: Can reduce costs associated with password management, such as password resets and support requests.</li>\n<li><strong>Traditional Authentication</strong>: May incur higher costs due to the need for password management systems and support for password-related issues.</li>\n</ul>\n<h3 id=\"4-vulnerabilities\" style=\"position:relative;\"><a href=\"#4-vulnerabilities\" aria-label=\"4 vulnerabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Vulnerabilities</h3>\n<ul>\n<li><strong>Passwordless Authentication</strong>: Reduces vulnerabilities such as password spraying, brute force attacks, spear phishing, and password sharing.</li>\n<li><strong>Traditional Authentication</strong>: Prone to common vulnerabilities like weak passwords, password dictionaries, and password patterns.</li>\n</ul>\n<h3 id=\"passwordless-login-for-businesses\" style=\"position:relative;\"><a href=\"#passwordless-login-for-businesses\" aria-label=\"passwordless login for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Login for Businesses</h3>\n<p>The use of passwordless authentication security in businesses is multifold. For example, you can go passwordless for internal security, online consumers, or even combine the two of them. </p>\n<p>A few use cases of passwordless authentication include:</p>\n<ul>\n<li>Sign up for a service, or get a subscription.</li>\n<li>Let consumers log in to their online accounts.</li>\n<li>Make a secure payment online.</li>\n</ul>\n<p>With passwordless login, it is much easier to keep information about your users safe and implement tighter <a href=\"https://www.loginradius.com/security/\">security measures for your employees</a>.</p>\n<h3 id=\"passwordless-login-for-non-profits\" style=\"position:relative;\"><a href=\"#passwordless-login-for-non-profits\" aria-label=\"passwordless login for non profits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Login for Non-Profits</h3>\n<p>Speaking of non-profit organizations, passwordless authentication can do wonders to the security of the donation process. </p>\n<p>Also, when a person donates to an NGO, they can have their payment information like name, card details, expiry dates etc. saved using passwordless options like email authentication. So the next time they plan to donate, they won't need to fill in the basic information. </p>\n<h2 id=\"benefits-of-passwordless-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-passwordless-authentication\" aria-label=\"benefits of passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Passwordless Authentication</h2>\n<p>We’ve learned how is passwordless more secure. Now let’s explore its benefits: </p>\n<ul>\n<li>\n<p><strong>Improved user experience</strong>: Be it fingerprint scanning, social media sign-in, <a href=\"https://www.loginradius.com/blog/2020/04/loginradius-pin-based-authentication/\">PIN authentication</a>, or email verification, you no longer need to memorize any credentials whatsoever.   </p>\n<p>Passwordless authentication only takes a few basic steps and works on both websites and mobile applications alike. </p>\n</li>\n<li>\n<p><strong>Increased cost-effectiveness</strong>: Passwords require constant maintenance. According to Forrester, the average cost of one password reset for a company is $70. For large enterprises, this figure reaches $1 million USD each year.   </p>\n<p>Needless to say, eliminating passwords will not just save time and productivity, but also a bulk load of expenses.</p>\n</li>\n<li>\n<p><strong>Stronger security</strong>: User-controlled passwords are vulnerable to attacks like phishing, credential stuffing, brute force attacks, <a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">corporate account takeover (CATO)</a>, and more.   </p>\n<p>So, when there is no password to hack in the first place, those vulnerabilities will automatically decrease.</p>\n</li>\n<li><strong>Greater convenience</strong>: Since users can authenticate without passwords, it becomes easier to sign in and access data from anywhere on the web.</li>\n<li>\n<p><strong>IT Gains Control and Visibility</strong>: Phishing, reuse, and password sharing are just a few of the issues related to password-based authentication.  </p>\n<p>So, when there is no need for passwords in the first place, IT can reclaim its purpose of having complete visibility over <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">identity and access management</a>.</p>\n</li>\n</ul>\n<h2 id=\"what-does-passwordless-authentication-prevent\" style=\"position:relative;\"><a href=\"#what-does-passwordless-authentication-prevent\" aria-label=\"what does passwordless authentication prevent permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Does Passwordless Authentication Prevent</h2>\n<p>With passwords out of the picture, the following are a few attacks that businesses can dodge by implementing passwordless authentication into their systems.</p>\n<ol>\n<li><strong>Password spraying</strong>: It is a method of cyber-attack that attempts to log in to a large number of accounts with commonly used password credentials.</li>\n<li><strong>Brute Force Attack</strong>: Hackers use the trial-and-error method to guess the login credentials or encryption keys. They try all the possible combinations until the account is hacked.</li>\n<li><strong>Spear phishing</strong>: It is an email spoofing attack that scams organizations and individuals to give away sensitive credentials for financial, military, or trade gains.</li>\n<li><strong>Social Engineering</strong>: Hackers use psychological manipulation and scam users into giving away sensitive information or granting access to critical resources.</li>\n<li><strong>Shoulder Surfing</strong>: It is a type of data theft where the intruder steals login credentials by peeking over the target's shoulder.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Passwordless Login Datasheet\"\n        title=\"Passwordless Login Datasheet\"\n        src=\"/static/4a7ab097b9cc29def32540d76bfac344/e5715/DS-Product-Passwordless-Login-1024x310.png\"\n        srcset=\"/static/4a7ab097b9cc29def32540d76bfac344/a6d36/DS-Product-Passwordless-Login-1024x310.png 650w,\n/static/4a7ab097b9cc29def32540d76bfac344/e5715/DS-Product-Passwordless-Login-1024x310.png 768w,\n/static/4a7ab097b9cc29def32540d76bfac344/2bef9/DS-Product-Passwordless-Login-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-safe-is-passwordless-authentication-as-compared-to-other-login-methods\" style=\"position:relative;\"><a href=\"#how-safe-is-passwordless-authentication-as-compared-to-other-login-methods\" aria-label=\"how safe is passwordless authentication as compared to other login methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Safe Is Passwordless Authentication as Compared to Other Login Methods</h2>\n<p>A common issue with using passwords for authentication lies in the fact that customers want the quickest way to log in to their accounts. After all, the longer it takes for a consumer to sign-up, or make a purchase, they will more likely tend to bounce. Other reasons why passwords bounce include:</p>\n<ul>\n<li><strong>Password complexity is weak</strong>: Passwords may meet the standard complexity, but they may be still weak because of\npassword dictionaries.</li>\n<li><strong>Password follow patterns</strong>: Because the majority of passwords follow a certain pattern, it is easier for hackers to commit data theft. </li>\n<li><strong>Passwords aren’t unique</strong>: People reuse passwords and newly leaked dictionaries contain previously leaked passwords.</li>\n</ul>\n<p>Due to <a href=\"https://www.loginradius.com/resource/infographic/death-of-passwords\">bad password practices</a>, chances are consumers may be putting their accounts at risk. This is one of the strongest reasons why passwordless authentication is preferred by consumers and enterprises as their preferred method of authentication.</p>\n<h2 id=\"types-of-passwordless-authentication\" style=\"position:relative;\"><a href=\"#types-of-passwordless-authentication\" aria-label=\"types of passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Passwordless Authentication</h2>\n<p>In a typical application, passwordless authentication can be implemented through different approaches. Here’s a list of the most common ones.</p>\n<h3 id=\"email-based-passwordless-authentication\" style=\"position:relative;\"><a href=\"#email-based-passwordless-authentication\" aria-label=\"email based passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Email-Based Passwordless Authentication</h3>\n<p>This is one of the most common login systems. The user is asked to enter the email address. A unique code (or magic link) is then created and sent to the associated email ID. When the user clicks on the link, the server triggers an action to verify if the code is valid within a certain timeframe (e.g. three minutes) and then swaps it for a long-time validation token. If the authentication is successful, the user is let in.</p>\n<h3 id=\"social-login-authentication\" style=\"position:relative;\"><a href=\"#social-login-authentication\" aria-label=\"social login authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social Login Authentication</h3>\n<p><a href=\"https://www.loginradius.com/social-login/\">Social login is the method of authentication</a> using a social network provider like Facebook, Twitter, or Google. The user enters your application and selects a social network provider. A login request is then sent to the provider and after the provider approves it, the user is allowed to access their application. There is no need for passwords at all.</p>\n<h3 id=\"sms-based-passwordless-login\" style=\"position:relative;\"><a href=\"#sms-based-passwordless-login\" aria-label=\"sms based passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SMS-Based Passwordless Login</h3>\n<p>Here’s a convenient, easy-to-implement way to onboard a user. SMS-based login eliminates the need to create additional credentials, thereby easing the basic authentication process. The steps are simple: A user must enter a valid phone number; then the server sends a single-use code to that number which the user must enter to log in to the service. </p>\n<h3 id=\"biometrics-based-or-passwordless-authentication-for-logged-in-users\" style=\"position:relative;\"><a href=\"#biometrics-based-or-passwordless-authentication-for-logged-in-users\" aria-label=\"biometrics based or passwordless authentication for logged in users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometrics-Based or Passwordless Authentication for Logged-In Users</h3>\n<p>Biometric authentication services focus on growing technologies like fingerprint, face, or iris scans. The technology works on smartphones where users press their thumbs on their smartphone scanners to authorize their identities and gain access to their accounts. Both Android and Apple offer biometric login options that are popular for their convenience.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAALCAYAAAB/Ca1DAAAACXBIWXMAAAsTAAALEwEAmpwYAAACFElEQVQoz21S2W7aUBD1bryCDch4wXYIUJYCdiCGNAmJSqNEahOlVftWqX3oJ/T/T+caAkHNw8j3ztUcz1k4/eQclXQBZ3CJ9Pwe7P66NHrTOyuIZgMcx1Hxuy8HgefheR4URdn3ODaktHOE+QYfvvxEtX8BNT7bg5WAdOYV/TC0K8u2kec5LMs6Bqz2LiBHOdxyyweYnYKA5gTEtitQiabgeGE7oBJwxYIgKhhYNhRVLfuyLG/fg9nHcrMw20CmTd9dPiIhUCl5obuE6vW3FKseDC+B47eheSlkvQaF+i2inWUZTNMExyhG+Sd4k1sMrp6QFg9QB3cIbn6hPn+EdlJAtj1wcgWmnyKJY4wnMwx6XXBOgLZuI3Ac1FwXkijS9skcUpRBCGbw3q/hTTdI7v5g9uMvnMU3aGSIwPTTbNSaPvqjCSS/h+l4CNGqkwTGsbZMQ0ZztH7G8Pqp3Nae3KOx/A69fwMtzsAJInhVA19roZPEWMzP4Ich0WshNWy4pKVuGODJdY7p1L34XEZGDGewuitMbr9unSZDVH94iIlJtOohzGYAyQ0h0HYGgbSjCMVyCYUZwwDZMCt2ZsDMIHY3TleQ6/FR/niJMqeapJ0FV5L2P9M07UC5DDdp6Q6vsH7+jcboeg8oGu5/+WOlaxXk5KxhvKHhS4gNotgcr2GeFrtQz8GTu28BSkQvSdNtVF71/wFIaRh+nHmxNQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image showing passwordless login is more secure and harder to hack\"\n        title=\"image showing passwordless login is more secure and harder to hack\"\n        src=\"/static/9bfcfc8dc698e67e55fa1ba355a8499b/e5715/Passwordless-Authentication-shield-image-1024x576.png\"\n        srcset=\"/static/9bfcfc8dc698e67e55fa1ba355a8499b/a6d36/Passwordless-Authentication-shield-image-1024x576.png 650w,\n/static/9bfcfc8dc698e67e55fa1ba355a8499b/e5715/Passwordless-Authentication-shield-image-1024x576.png 768w,\n/static/9bfcfc8dc698e67e55fa1ba355a8499b/2bef9/Passwordless-Authentication-shield-image-1024x576.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-does-passwordless-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-passwordless-authentication-work\" aria-label=\"how does passwordless authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Passwordless Authentication Work</h2>\n<p>The technology behind passwordless login is similar to that of digital certificates. There are <a href=\"https://en.wikipedia.org/wiki/Cryptographic_key_types\">cryptographic key pairs</a> that include a private and public key. </p>\n<p>To understand how this works, think of the public key as the padlock. The private key, on the other hand, is what unlocks the padlock. To sum up, there is only one key for the padlock and in return, one padlock for the key. </p>\n<p>This means that whenever a user wishes to create a secure account, a public-private key pair must be generated. This is usually done via tools like a mobile app or a browser extension. Here are the steps:</p>\n<ul>\n<li>A private key is stored on the local device of the user and linked to an authentication factor like a PIN, fingerprint or face recognition. </li>\n<li>The public key, on the other hand, goes to the website or application where the user wishes to log in. </li>\n</ul>\n<p>Today’s passwordless authentication follows the <a href=\"https://en.wikipedia.org/wiki/FIDO2_Project\">FIDO2 standard</a>. It includes WebAuthn and CTAP that help organizations keep their passwords secure.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.53846153846153%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"flowchart of Passwordless Login\"\n        title=\"flowchart of Passwordless Login\"\n        src=\"/static/f1d102336eda323f56d515de739c6d51/e5715/Passwordless-Login-Flowchart-1024x549.png\"\n        srcset=\"/static/f1d102336eda323f56d515de739c6d51/a6d36/Passwordless-Login-Flowchart-1024x549.png 650w,\n/static/f1d102336eda323f56d515de739c6d51/e5715/Passwordless-Login-Flowchart-1024x549.png 768w,\n/static/f1d102336eda323f56d515de739c6d51/2bef9/Passwordless-Login-Flowchart-1024x549.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Wondering how it works? </p>\n<p>Let’s assume you’re a service provider and you store customer public keys in “public”.</p>\n<p>That may sound risky, but here’s the catch. If a hacker obtains that public key, the data will be of no use without the private key that unlocks it. The best part is that the private key remains with the end-user.</p>\n<h2 id=\"emerging-trends-in-passwordless-security\" style=\"position:relative;\"><a href=\"#emerging-trends-in-passwordless-security\" aria-label=\"emerging trends in passwordless security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Emerging Trends in Passwordless Security</h2>\n<p>As the landscape of cybersecurity evolves, several emerging trends in passwordless security are reshaping how we protect digital identities:</p>\n<h3 id=\"1-biometric-authentication\" style=\"position:relative;\"><a href=\"#1-biometric-authentication\" aria-label=\"1 biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Biometric Authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-mob-biometric-authentication/\">Biometric authentication</a> methods, such as fingerprint scanning, facial recognition, or iris scans, are gaining traction. These methods offer a seamless and secure way to authenticate users without the need for traditional passwords.</p>\n<h3 id=\"2-magic-links-and-email-authentication\" style=\"position:relative;\"><a href=\"#2-magic-links-and-email-authentication\" aria-label=\"2 magic links and email authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Magic Links and Email Authentication</h3>\n<p>The use of <a href=\"https://www.loginradius.com/blog/identity/passwordless-magic-links/\">magic links</a> sent via email is becoming popular. Users can simply click on a unique link to access their accounts, eliminating the need to remember passwords. This method enhances user experience and streamlines the login process.</p>\n<h3 id=\"3-social-login-integration\" style=\"position:relative;\"><a href=\"#3-social-login-integration\" aria-label=\"3 social login integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Social Login Integration</h3>\n<p>Integrating social media accounts for authentication is a rising trend. Users can leverage their existing social media profiles to log in to various platforms, reducing the burden of creating and managing multiple passwords.</p>\n<h3 id=\"4-hardware-tokens-and-smart-cards\" style=\"position:relative;\"><a href=\"#4-hardware-tokens-and-smart-cards\" aria-label=\"4 hardware tokens and smart cards permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Hardware Tokens and Smart Cards</h3>\n<p>Hardware tokens and smart cards provide physical, secure methods of authentication. These devices generate unique codes or require physical presence for access, adding an extra layer of security to passwordless authentication.</p>\n<h2 id=\"implementing-passwordless-authentication-with-loginradius\" style=\"position:relative;\"><a href=\"#implementing-passwordless-authentication-with-loginradius\" aria-label=\"implementing passwordless authentication with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Passwordless Authentication with LoginRadius</h2>\n<p>The best way to provide seamless registration and authentication for your customers is with a passwordless login solution. This gives them a hassle-free way to access their accounts—with no passwords needed! </p>\n<p>The LoginRadius Identity Platform is an out-of-the-box way for you to do this easily. The identity and access management platform is fully customizable too, so you can <a href=\"https://www.loginradius.com/customer-experience-solutions/\">simplify your customer experience</a> to suit your company’s needs.</p>\n<p>Here’s how the platform works.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 49.23076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"activating passwordless login in loginradius dashboard\"\n        title=\"activating passwordless login in loginradius dashboard\"\n        src=\"/static/111586832f6816549e6ffa451532de6e/e5715/activating-passwordless-login-in-loginradius-1024x504.png\"\n        srcset=\"/static/111586832f6816549e6ffa451532de6e/a6d36/activating-passwordless-login-in-loginradius-1024x504.png 650w,\n/static/111586832f6816549e6ffa451532de6e/e5715/activating-passwordless-login-in-loginradius-1024x504.png 768w,\n/static/111586832f6816549e6ffa451532de6e/2bef9/activating-passwordless-login-in-loginradius-1024x504.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"passwordless-authentication-with-loginradius-is-a-three-fold-process\" style=\"position:relative;\"><a href=\"#passwordless-authentication-with-loginradius-is-a-three-fold-process\" aria-label=\"passwordless authentication with loginradius is a three fold process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless authentication with LoginRadius is a three-fold process. </h3>\n<p><strong>Step 1:</strong> On the website login page, a customer will be asked to enter the email address. It will act as their username too.</p>\n<p><strong>Step 2:</strong> LoginRadius will send a temporary verification link to the associated email address. You can custom-set the duration that link will remain active before it expires.</p>\n<p><strong>Step 3:</strong> The customer is prompted to click the verification link, which is then authenticated and redirected to the website the customer originated from.</p>\n<p>It’s as simple as that!</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Not only is remembering password characters a pain but logging in by password alone is not very secure. By removing passwords, you can reduce costs to your IT and customer service departments. The icing on the cake is that passwordless logins improve customer experience. That’s great for your brand reputation and your bottom line.</p>\n<p>If your company is not on board with passwordless authentication yet, the time to act is now.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p>Q: Is passwordless authentication safer?</p>\n<p>A: Yes, passwordless authentication is considered safer as it eliminates the vulnerabilities associated with traditional passwords, such as phishing and brute force attacks.</p>\n<p>Q: What is the difference between passwordless and OTP?</p>\n<p>A: Passwordless authentication eliminates the need for a password entirely, relying on methods like biometrics or magic links. OTP (One-Time Password) is a temporary code sent to a user's device, often used as a second factor in authentication.</p>\n<p>Q: What is the difference between passwordless and SSO?</p>\n<p>A: Passwordless authentication focuses on eliminating passwords, while Single Sign-On (SSO) allows users to access multiple applications with one set of login credentials.</p>\n<p>Q: What is 2FA or passwordless?</p>\n<p>A: 2FA (Two-Factor Authentication) requires two forms of verification for access. Passwordless authentication, on the other hand, allows users to log in without using a traditional password, using methods like biometrics or email links.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 11, 2019","updated_date":null,"description":"The war cry among experts lately when it comes to online safety is: The future is passwordless! So, why does passwordless authentication matter so much?","title":"The Role of Passwordless Authentication in Securing Digital Identity","tags":["passwordless authentication","digital identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4598540145985401,"src":"/static/8ee8c97fb9b13d9c5e764dee774047c6/ee604/passwordless-auth.png","srcSet":"/static/8ee8c97fb9b13d9c5e764dee774047c6/69585/passwordless-auth.png 200w,\n/static/8ee8c97fb9b13d9c5e764dee774047c6/497c6/passwordless-auth.png 400w,\n/static/8ee8c97fb9b13d9c5e764dee774047c6/ee604/passwordless-auth.png 800w,\n/static/8ee8c97fb9b13d9c5e764dee774047c6/a8378/passwordless-auth.png 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":816,"currentPage":137,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}