{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/139","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"In Part I of The History of Identity, we covered how identity began in ancient times. For Part II, we focus on current times, where personal…","fields":{"slug":"/identity/history-identity-part-2/"},"html":"<p>In Part I of The History of Identity, we covered how identity began in ancient times. For Part II, we focus on current times, where personal names are now considered fundamental to identity and dignity. </p>\n<h2 id=\"the-emergence-of-family-names\" style=\"position:relative;\"><a href=\"#the-emergence-of-family-names\" aria-label=\"the emergence of family names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The emergence of family names</h2>\n<p>The United Nations Convention on the Rights of the Child declares that every child “shall be registered immediately after birth and shall have the right from birth to a name.” Family names or surnames identify a person’s origins. Family names appear to have developed first in China, originally among the nobility, and then spread to commoners.</p>\n<p>Clan names that seem to indicate matrilineal heritage, called <em>xìng</em> (姓), emerged in China around 4000–3000 BC. Many of these names include the character for woman (女), and the character for <em>xìng</em> reads as “born of a woman.” People with the same <em>xìng</em> were not allowed to marry each other.</p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Lacquer_painting_from_Ch%27u_State.jpg\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 697px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 59.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAMABQDASIAAhEBAxEB/8QAGAAAAgMAAAAAAAAAAAAAAAAAAAMBAgT/xAAVAQEBAAAAAAAAAAAAAAAAAAAAAf/aAAwDAQACEAMQAAABy2SRIkP/xAAaEAABBQEAAAAAAAAAAAAAAAAAAQIRISJB/9oACAEBAAEFAiUHUcnLrX//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAEDAQE/AT//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAECAQE/AT//xAAZEAACAwEAAAAAAAAAAAAAAAAAEBEhMTL/2gAIAQEABj8C02jpQv/EABwQAQACAgMBAAAAAAAAAAAAAAEAESExQVFh0f/aAAgBAQABPyES/mNu/ipRgox0xwzc6xjnmNsZ/9oADAMBAAIAAwAAABA8L//EABYRAQEBAAAAAAAAAAAAAAAAAAEQEf/aAAgBAwEBPxANn//EABYRAQEBAAAAAAAAAAAAAAAAAAEQEf/aAAgBAgEBPxBcn//EABsQAQADAQADAAAAAAAAAAAAAAEAESExQVFh/9oACAEBAAE/EN5eDRfzHbNI2elVA1cFnb7B2NFL0i216YjG+4JW2gn/2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Human Identity\"\n        title=\"Human Identity\"\n        src=\"/static/69e746556fa530e1b00c6e62e271c9c4/721dc/image-1.jpg\"\n        srcset=\"/static/69e746556fa530e1b00c6e62e271c9c4/6aca1/image-1.jpg 650w,\n/static/69e746556fa530e1b00c6e62e271c9c4/721dc/image-1.jpg 697w\"\n        sizes=\"(max-width: 697px) 100vw, 697px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Lacquer painting from State of Ch'u (704–223 BC)</strong></p>\n<p>Another type of clan name appeared during the Zhou dynasty from 1046–256 BC. As society became more complex and patrilineal, the <em>shì</em> name (氏) allowed people to differentiate themselves from others with the same <em>xìng</em>.</p>\n<p>A person’s <em>shì</em> name might be derived from their state or fiefdom, their position within their family, or their profession.</p>\n<p>Chinese surnames were standardized in 221 BC under the first emperor of the Qin dynasty. The <em>xìng</em> and <em>shì</em> names, which people had been using interchangeably, were merged into the single concept of a family name.</p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/248783\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 133.3846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Human Identity\"\n        title=\"Human Identity\"\n        src=\"/static/60257791cd3c382056afa4a76beec6ed/212bf/image-2.jpg\"\n        srcset=\"/static/60257791cd3c382056afa4a76beec6ed/6aca1/image-2.jpg 650w,\n/static/60257791cd3c382056afa4a76beec6ed/212bf/image-2.jpg 768w,\n/static/60257791cd3c382056afa4a76beec6ed/8e1fc/image-2.jpg 900w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Marble portrait of the co-emperor Lucius Verus (130 - 169 AD).</strong> <strong>His name at birth was Lucius Ceionius Commodus, changed to Lucius Aelius Aurelius Commodus when he was adopted.</strong></p>\n<p>Family names first evolved in the Western world during the time of the Roman Empire, 750 BC to 500 AD. Romans developed <a href=\"https://heraldry.sca.org/names/roman.html\">a system of <em>tria</em> <em>nomina</em></a> (“three names”):</p>\n<ul>\n<li><em>Praenomen</em> (given name)—a personal name chosen by a child’s parents. Praenomen had standard abbreviations. i.e. Tiberius, abbreviated as Ti.</li>\n<li><em>Nomen</em> (clan name)—a public name that indicated social status, i.e. Valerius.</li>\n<li><em>Cognomen</em> (nickname)—a name describing physical or moral characteristic, i.e. Rufus, meaning “red-haired.”</li>\n</ul>\n<p>The Roman three-name system started with the aristocracy and spread to the general citizenry as the population grew and people needed more names to distinguish among themselves.</p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Jon_Ogmundsson_Icelandic_bishop.jpg\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 465px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 128.81720430107526%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAaABQDASIAAhEBAxEB/8QAGAAAAwEBAAAAAAAAAAAAAAAAAAECAwT/xAAXAQEBAQEAAAAAAAAAAAAAAAAAAQID/9oADAMBAAIQAxAAAAHoURw3sMhTKNSCv//EABoQAAICAwAAAAAAAAAAAAAAAAABEEICMUH/2gAIAQEAAQUC4hoy0MqorH//xAAUEQEAAAAAAAAAAAAAAAAAAAAg/9oACAEDAQE/AR//xAAUEQEAAAAAAAAAAAAAAAAAAAAg/9oACAECAQE/AR//xAAYEAACAwAAAAAAAAAAAAAAAAAAECEwYf/aAAgBAQAGPwIlZT//xAAcEAACAwEBAQEAAAAAAAAAAAAAAREhMUFRYXH/2gAIAQEAAT8hVSaUC7JOcojeDNx8WLUpvnw4vgseHomUvwdsmdFh/9oADAMBAAIAAwAAABAw8fz/xAAXEQADAQAAAAAAAAAAAAAAAAAAARAR/9oACAEDAQE/EMFf/8QAFBEBAAAAAAAAAAAAAAAAAAAAIP/aAAgBAgEBPxAf/8QAHRABAQACAwADAAAAAAAAAAAAAREAMSFBUWFxsf/aAAgBAQABPxAmiFXeXQgdI585wAGWYFjRWJDvhtsYXdKAr3kF6RV8+cltKn57loQGKXOyDUcQ5zlI/XmJjnrP/9k='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Human Identity\"\n        title=\"Human Identity\"\n        src=\"/static/26186d604b02cc067629b3dac5f40122/dbe2a/image-3.jpg\"\n        srcset=\"/static/26186d604b02cc067629b3dac5f40122/dbe2a/image-3.jpg 465w\"\n        sizes=\"(max-width: 465px) 100vw, 465px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Bishop</strong> <a href=\"https://commons.wikimedia.org/w/index.php?title=J%C3%B3n_%C3%96gmundsson&#x26;action=edit&#x26;redlink=1\"><strong>Jón Ögmundsson</strong></a> <strong>of Hólar, from the 19th century Icelandic manuscript JS 629 4to, now in the care of the Icelandic National Library</strong></p>\n<p>Surnames developed in the rest of Europe starting in the 11th century. Norman barons brought them to England after the invasion of 1066. Most of these surnames grew organically from one of the following characteristics.</p>\n<p><strong>Lineage</strong>: <em>Patronymic</em> and <em>matronymic</em> surnames originate from a father or mother’s name.</p>\n<p>Iceland developed a system where children receive a new surname based on their father’s name (or occasionally mother’s name). For example, Iceland's current prime minister is Jóhanna Sigurðardóttir. Her father’s name is Sigurður, so her surname becomes Sigurðardóttir, meaning “daughter of Sigurður.”</p>\n<p><a href=\"https://www.english-heritage.org.uk/learn/story-of-england/early-medieval/architecture/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 37.07692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAHABQDASIAAhEBAxEB/8QAFQABAQAAAAAAAAAAAAAAAAAAAAL/xAAWAQEBAQAAAAAAAAAAAAAAAAABAAT/2gAMAwEAAhADEAAAAagztBv/xAAZEAADAAMAAAAAAAAAAAAAAAAAAQIDERL/2gAIAQEAAQUC3Q8lI6bP/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPwE//8QAFhEBAQEAAAAAAAAAAAAAAAAAAAER/9oACAECAQE/AY2v/8QAGBAAAwEBAAAAAAAAAAAAAAAAAAEhAjL/2gAIAQEABj8ChdM6Z//EABoQAAICAwAAAAAAAAAAAAAAAAABESExofH/2gAIAQEAAT8hfcOKE4srPYf/2gAMAwEAAgADAAAAEIAP/8QAFREBAQAAAAAAAAAAAAAAAAAAABH/2gAIAQMBAT8QR//EABcRAQEBAQAAAAAAAAAAAAAAAAEAEWH/2gAIAQIBAT8QauXa/8QAGhABAAMBAQEAAAAAAAAAAAAAAQARITFhcf/aAAgBAQABPxAa0X3ASlFdDj7WxMDCWaJ//9k='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Human Identity\"\n        title=\"Human Identity\"\n        src=\"/static/75a5b7352d88cdd6dedb614a16e1db6b/212bf/image-4.jpg\"\n        srcset=\"/static/75a5b7352d88cdd6dedb614a16e1db6b/6aca1/image-4.jpg 650w,\n/static/75a5b7352d88cdd6dedb614a16e1db6b/212bf/image-4.jpg 768w,\n/static/75a5b7352d88cdd6dedb614a16e1db6b/47311/image-4.jpg 1080w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Part of Offa’s Dyke, an 8th-century earthwork boundary in Britain.</strong></p>\n<p><strong>Location</strong>: Many Anglophone names come from the names of towns or regions (Hamilton, Murray), local topology (Landon means “long hill”), or features (Dyke, Wood, Fields).</p>\n<p><a href=\"https://hausbuecher.nuernberg.de/75-Amb-2-279-81-v/data\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 133.3846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Human Identity\"\n        title=\"Human Identity\"\n        src=\"/static/bc4503fe5eea8875737a0c1f5dc56a0f/212bf/image-5.jpg\"\n        srcset=\"/static/bc4503fe5eea8875737a0c1f5dc56a0f/6aca1/image-5.jpg 650w,\n/static/bc4503fe5eea8875737a0c1f5dc56a0f/212bf/image-5.jpg 768w,\n/static/bc4503fe5eea8875737a0c1f5dc56a0f/8e1fc/image-5.jpg 900w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>A German tailor pictured in die Nürnberger Hausbücher, 1612.</strong></p>\n<p><strong>Profession</strong>: <a href=\"https://en.wikipedia.org/wiki/Surname#Occupational_surname\">Occupational names</a> are based on the work performed by that family. The German name Eisenhauer means “iron hewer,” Schneider means “tailor,” and Schmidt refers to a blacksmith. Occupational names were also taken by servants of masters in certain professions. There is speculation, for example, that the English surname Vickers would have been adopted by the servant of a vicar.</p>\n<h2 id=\"additional-names\" style=\"position:relative;\"><a href=\"#additional-names\" aria-label=\"additional names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Additional names</h2>\n<p><a href=\"https://www.rd.com/culture/why-do-we-have-middle-names/\">Middle names</a> have their origins in social class and religion. As mentioned earlier, more names indicated more respect during Roman times. Men had three names; women had two; their slaves had one. </p>\n<p>Aristocrats considered long names a show of their high place in society. Spanish and Arabic families would give their children paternal or maternal names from previous generations. This practice allowed them to keep track of the child’s family tree. </p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/451286?&#x26;searchField=All&#x26;sortBy=Relevance&#x26;when=A.D.+1600-1800&#x26;ft=royal+name&#x26;offset=0&#x26;rpp=20&#x26;pos=1\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 143.07692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Human Identity\"\n        title=\"Human Identity\"\n        src=\"/static/4fbab1f00d2a796e0a1a5ee63228629a/212bf/image-6.jpg\"\n        srcset=\"/static/4fbab1f00d2a796e0a1a5ee63228629a/6aca1/image-6.jpg 650w,\n/static/4fbab1f00d2a796e0a1a5ee63228629a/212bf/image-6.jpg 768w,\n/static/4fbab1f00d2a796e0a1a5ee63228629a/4f216/image-6.jpg 839w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>\"Rosette Bearing the Names and Titles of Shah Jahan,\" ca. 1645. The central inscription reads, “His Majesty Shihab al-Din Muhammad Shah Jahan, the king, the vanquisher, may God perpetuate his dominion and sovereignty.”</strong></p>\n<p>This tradition of middle names spread across Western cultures in the 1700s. But this time, three names were not exclusive to men. When faced with choosing between a family name and a saint name for their children, Europeans decided to go with both: given name first, baptismal (saint) name second, and surname third. The practice then spread to America through immigration.</p>\n<p>Today, many cultures use a beloved relative’s name for a child’s middle name. And some families may even have two middle names to reflect both maternal and paternal relatives. Practically speaking, middle names can help differentiate people who share common first and last names. For this reason, <a href=\"https://www.businessinsider.com/why-you-cant-board-flights-if-your-middle-name-isnt-on-your-ticket-2018-4\">middle names may be required</a> on important documents, such as flight tickets.</p>\n<h2 id=\"the-order-of-names\" style=\"position:relative;\"><a href=\"#the-order-of-names\" aria-label=\"the order of names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The order of names</h2>\n<p>The <a href=\"https://en.wikipedia.org/wiki/Personal_name#Name_order\">placement of surnames</a>, or family names, varies by country. </p>\n<p>Eastern name order is typical in East Asia, South Asia, Southeast Asia, and parts of India.</p>\n<p>The convention in China is to have the family name appear first, followed by the given name. For example, Gāo Xíngjiàn (高行健), who won the Nobel Prize for Literature in 2000, has the family name Gāo and the given name Xíngjiàn.</p>\n<p>Western name order is common throughout Europe, the Americas, Australia, and New Zealand. The given name comes first, and then the family name, although for alphabetized lists, the names are reversed and separated by a comma. </p>\n<p>When Eastern names are used in the West and vice versa, there can be some confusion about whether they are following their traditional name order or not. The cellist known as Yo-Yo Ma uses the Western ordering, even though his Chinese name is Ma Youyou (马友友). </p>\n<h2 id=\"identity-verification\" style=\"position:relative;\"><a href=\"#identity-verification\" aria-label=\"identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity verification</h2>\n<p>The need to confirm someone’s identity also goes back to ancient times. As society grew larger and political and financial systems developed, humans created ways to verify that a person’s identity was valid.</p>\n<p>Some civilizations developed stamps and seals that represented a person’s identity. </p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/321391?&#x26;searchField=All&#x26;sortBy=Relevance&#x26;ft=cylinder+seal&#x26;offset=0&#x26;rpp=20&#x26;pos=14\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 423px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 65.72104018912529%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Human Identity\"\n        title=\"Human Identity\"\n        src=\"/static/e8b9b8ac43b8df35cd966aef6c0dea04/b7bea/image-7.jpg\"\n        srcset=\"/static/e8b9b8ac43b8df35cd966aef6c0dea04/b7bea/image-7.jpg 423w\"\n        sizes=\"(max-width: 423px) 100vw, 423px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Modern impression of a Cypriot cylinder seal: female figure, ibex, lion, ca. 14th–13th century B.C.</strong></p>\n<p>Cylinder seals go back to the fourth millennium BC in Mesopotamia. These <a href=\"https://www.historyonthenet.com/mesopotamian-cylinder-seals\">carved cylinders</a> were rolled across wet clay to create an impression that signified ownership or identity. The seals were sometimes crafted from semi-precious stone such as carnelian or lapis lazuli and worn as jewellery. They were used by people from all strata of society to sign business deals, treaties, and marriage contracts.</p>\n<p>The earliest seals in China originated during the Shang Dynasty, 1600 to 1046 BC. Chinese seals known as <a href=\"https://www.thoughtco.com/chinese-chops-seals-2278409\">chops</a> were carved from jade, stone, or ivory and dipped in red paste to stamp a unique symbol on documents, letters, and artwork.</p>\n<p><a href=\"https://nl.wikipedia.org/wiki/Bestand:Chinese_seal_(Han_Dynasty).png#/media/Bestand:Chinese_seal_(Han_Dynasty).png\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 465px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 97.63440860215053%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Human Identity\"\n        title=\"Human Identity\"\n        src=\"/static/0fd2a5b28cb8e4dd2b6007ad735fb76a/9ff85/Chinese_seal_Han_Dynasty.png\"\n        srcset=\"/static/0fd2a5b28cb8e4dd2b6007ad735fb76a/9ff85/Chinese_seal_Han_Dynasty.png 465w\"\n        sizes=\"(max-width: 465px) 100vw, 465px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Chinese seal with Han and Manchu characters</strong> </p>\n<p>Other types of signature seals can also be found across East Asia. In Japan, signature ink stamps are called <a href=\"https://www.nippon.com/en/features/jg00077/hanko-and-inkan-japanese-stamps-and-personal-seals.html\"><em>hanko</em></a>. These are commonly accepted as a signature when validating documents and official forms. Hanko stamps can be made from wood, plastic, and other materials and again, the ink, is generally red.</p>\n<p>In the 5th century BC, the Romans started to write sentences and names at the bottom of documents, in addition to creating wax seals with <a href=\"https://www.thehistorypress.co.uk/articles/a-brief-history-of-signet-rings/\">signet rings</a>. The earliest surviving signature from a famous historical figure is that of Rodrigo Díaz de Vivar, a medieval Spanish nobleman known as El Cid, dated to 1098. </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Signature_of_El_Cid.svg\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 223px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 20.62780269058296%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAECAYAAACOXx+WAAAACXBIWXMAAAsTAAALEwEAmpwYAAAAkklEQVQY06XOsQqCYBSG4TOkFBJt0VKDUUOBUEMQDYJjQjfQ7O7QENQdKAi11A20hI0u3Vyv9OEN+MEzHM75/3PMzAKEGGGIjv2zwAwD1VMk2KrXxQEeduo79eAbL+Q44awFX5R4IsUHGSoccdGbGwpcVdseEzywRh9LbDCHjwh3Layv7GGl6wLNjvVPkxiutcwPzWESa6R3neMAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"223px Signature of El Cid svg \"\n        title=\"223px Signature of El Cid svg \"\n        src=\"/static/48247c19ce8a7af6a840acb33c4a2d8f/e92b6/223px-Signature_of_El_Cid.svg_.png\"\n        srcset=\"/static/48247c19ce8a7af6a840acb33c4a2d8f/e92b6/223px-Signature_of_El_Cid.svg_.png 223w\"\n        sizes=\"(max-width: 223px) 100vw, 223px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Autograph signature of Rodrigo Díaz, [also] called El Cid, Archive of the Cathedral of Salamanca.</strong> <strong>It reads in Latin: ego ruderico, \"I, Rodrigo\".</strong></p>\n<p>To see how modern society uses and abuses identity, be sure to read Part III of our History of Human Identity series next week.</p>\n<p>Learn how to create a unified digital identity for all of your customers. <a href=\"https://www.loginradius.com/book-a-demo/\">Book a demo</a> today with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 20, 2019","updated_date":null,"description":"We covered how identity started in ancient times in Part I of The History of Identity. We concentrate on present times for Part II, where personal names are now considered central to identification and integrity.","title":"A History of Human Identity in Pictures  Part 2","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/8b49cdc0796b03f97a3633f4e9353e67/c3e3a/history-identity-part-2.jpg","srcSet":"/static/8b49cdc0796b03f97a3633f4e9353e67/f836f/history-identity-part-2.jpg 200w,\n/static/8b49cdc0796b03f97a3633f4e9353e67/2244e/history-identity-part-2.jpg 400w,\n/static/8b49cdc0796b03f97a3633f4e9353e67/c3e3a/history-identity-part-2.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Portrait of Thakur Utham Ram, ca. 1760  Source - metmuseum The concept of human identity stretches back thousands of years into unrecorded…","fields":{"slug":"/identity/history-identity-part-1/"},"html":"<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 81.53846153846153%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/f5fd95875a6e0a9031783ad3179d6f51/212bf/image-1.jpg\"\n        srcset=\"/static/f5fd95875a6e0a9031783ad3179d6f51/6aca1/image-1.jpg 650w,\n/static/f5fd95875a6e0a9031783ad3179d6f51/212bf/image-1.jpg 768w,\n/static/f5fd95875a6e0a9031783ad3179d6f51/e5166/image-1.jpg 1200w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> Portrait of Thakur Utham Ram, ca. 1760 </p>\n<p>Source - <a href=\"https://www.metmuseum.org/art/collection/search/37876\">metmuseum</a></p>\n<p>The concept of human identity stretches back thousands of years into unrecorded history. </p>\n<p>Long before our identities were digitized and stored in databases, we used language, objects, and documents to represent and confirm our individuality.</p>\n<p>This pictorial history in 3 parts explores all the creative ways that we’ve developed to identify ourselves and each other over the millennia. </p>\n<h2 id=\"prehistoric-identity\" style=\"position:relative;\"><a href=\"#prehistoric-identity\" aria-label=\"prehistoric identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prehistoric identity</h2>\n<p>It’s impossible to know when humans first recognized that they had individual identities.</p>\n<p>We assume that early hominins knew each other by sight, sound, smell, and touch, as animals do. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 684px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 87.53846153846155%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/22b0bc43bf129b28789ef32dc44702ed/ada4d/image-2.jpg\"\n        srcset=\"/static/22b0bc43bf129b28789ef32dc44702ed/6aca1/image-2.jpg 650w,\n/static/22b0bc43bf129b28789ef32dc44702ed/ada4d/image-2.jpg 684w\"\n        sizes=\"(max-width: 684px) 100vw, 684px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> High school students in Binghamton NY, USA, holding replicas of hominin skulls. Photo by Carolyn WIlczynski </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Students_explore_hominid_evolution.jpg\">Students explore hominid evolution</a></p>\n<p>Presumably they could tell one Neanderthal from another by their faces, the noises they made, and the way they moved. </p>\n<p>There is even <a href=\"https://www.nature.com/articles/ncomms5800\">research</a> showing that human faces evolved in ways that made it easier for humans to recognize each other. The fact that facial recognition was supported by natural selection implies that it’s very important for social interaction and the success of the species. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity \"\n        title=\"human identity \"\n        src=\"/static/d0fe536984b9b459710b72fefa6428d5/212bf/image-3.jpg\"\n        srcset=\"/static/d0fe536984b9b459710b72fefa6428d5/6aca1/image-3.jpg 650w,\n/static/d0fe536984b9b459710b72fefa6428d5/212bf/image-3.jpg 768w,\n/static/d0fe536984b9b459710b72fefa6428d5/4b190/image-3.jpg 800w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> Hands, ca. 7300 BC, at the Cuevas de las Manos upon Río Pinturas, Argentina. Photo by Mariano Cecowski </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:SantaCruz-CuevaManos-P2210651b.jpg\">SantaCruz-CuevaManos-P2210651b</a></p>\n<p>For an example of written identity in prehistory, we can look at cave markings showing stencilled handprints. Archeologists disagree on the meaning behind cave handprints—they could be warning messages or part of shamanic practice—but to our modern eyes they look like signatures or graffiti tags, a way of saying, “I was here.” </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 399px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 150.12531328320802%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/1b9fcd61fc48e53b81a30958cbd7c426/01983/image-4.jpg\"\n        srcset=\"/static/1b9fcd61fc48e53b81a30958cbd7c426/01983/image-4.jpg 399w\"\n        sizes=\"(max-width: 399px) 100vw, 399px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> Forensic reconstruction of Oase 2 skull dating to 35,000 BC </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Neanderthaler,_Oase,_Rum%C3%A4nien_(Daniela_Hitzemann).jpg\">Homo sapiens sapiens, Oase, Rumänien (Daniela Hitzemann)</a></p>\n<p>Spoken language emerged 100,000 years ago. In fact, the structure of the brain and the size of the spinal cord of Cro-Magnon people suggests that they would have been capable of producing the <a href=\"https://australianmuseum.net.au/learn/science/human-evolution/how-do-we-know-if-they-could-speak/\">same sounds that we use in speech today</a>.</p>\n<p>But since we’ve only been writing for the last 6,000 years, we’ll never know if Cro-Magnons  developed names for one another, or if so, how these were chosen. </p>\n<h2 id=\"the-first-recorded-names\" style=\"position:relative;\"><a href=\"#the-first-recorded-names\" aria-label=\"the first recorded names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The first recorded names</h2>\n<p>The earliest known names go back to the dawn of ancient history, around 3000 BC. These were the names of royalty passed down through oral history and written down much later: <a href=\"https://en.wikipedia.org/wiki/Alulim\">Alulim, first king of Sumer</a>, and <a href=\"https://en.wikipedia.org/wiki/Narmer\">Narmer, an ancient Egyptian pharaoh</a>.</p>\n<p>The oldest artifacts with written names have more everyday origins. </p>\n<p>There are several candidates for the distinction of first recorded name. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 52.46153846153846%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/7d8b35b457e8914a344d86198cad034d/212bf/image-5.jpg\"\n        srcset=\"/static/7d8b35b457e8914a344d86198cad034d/6aca1/image-5.jpg 650w,\n/static/7d8b35b457e8914a344d86198cad034d/212bf/image-5.jpg 768w,\n/static/7d8b35b457e8914a344d86198cad034d/e5166/image-5.jpg 1200w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> A photo of the Kushim Tablet. © <a href=\"https://www.schoyencollection.com/24-smaller-collections/wine-beer/ms-1717-beer-inanna-uruk\">The Schøyen Collection, Oslo and London</a> </p>\n<p><a href=\"https://www.ancient-origins.net/artifacts-ancient-writings/leaving-mark-history-oldest-known-named-person-007882\">Leaving A Mark in History: The Oldest Known Named Person</a></p>\n<p>One is a Mesopotamian clay tablet, ca. 3100 BC, found in Iran that appears to document a business transaction. The receipt for barley delivery to the brewery at Inanna Temple is presumably signed with the name of Kushim, an accountant or record keeper.</p>\n<p>[caption id=\"attachment_5348\" align=\"aligncenter\" width=\"1684\"]<img src=\"https://www.loginradius.com/blog/wp-content/uploads/sites/4/2019/08/pic5.jpg\" alt=\"human identity\"> Jamdat Nasr administrative tablet, ca. 3100-2900 BC. Image copyright © The Metropolitan Museum of Art <a href=\"https://www.metmuseum.org/toah/works-of-art/1988.433.1/\">metmuseum</a></p>\n<p>The second is another Mesopotamian tablet from the same era that bears the name of a slaveholder, Gal-Sal, and two slaves, En-pap X and Sukkalgir.</p>\n<h2 id=\"the-origins-of-personal-names\" style=\"position:relative;\"><a href=\"#the-origins-of-personal-names\" aria-label=\"the origins of personal names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The origins of personal names</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/d19fecb4ce8961664df40673b0c7483c/212bf/image-6.jpg\"\n        srcset=\"/static/d19fecb4ce8961664df40673b0c7483c/6aca1/image-6.jpg 650w,\n/static/d19fecb4ce8961664df40673b0c7483c/212bf/image-6.jpg 768w,\n/static/d19fecb4ce8961664df40673b0c7483c/4b190/image-6.jpg 800w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> A Machiguenga woman dressed in traditional garb <a href=\"https://commons.wikimedia.org/wiki/File:Machiguenga_woman.jpg\">Machiguenga woman</a></p>\n<p>Almost every known society refers to individuals by a fixed personal name, but there are some exceptions. One is the Machiguenga of the Amazon, a small tribe that refers to others by their kin relationship, such as “sister.”</p>\n<p>Ancient cultures generally used single names, what we might now consider a first name or given name. Single names are also called <em>mononyms</em>. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 501px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 119.56087824351297%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/e0f747ee9fd9009e22d04a21f6bed0c8/305fc/image-7.jpg\"\n        srcset=\"/static/e0f747ee9fd9009e22d04a21f6bed0c8/305fc/image-7.jpg 501w\"\n        sizes=\"(max-width: 501px) 100vw, 501px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> Dead Sea Scroll, part of Isaiah Scroll (Isa 57:17 - 59:9), ca. 100 BC <a href=\"https://commons.wikimedia.org/wiki/File:1QIsa_b.jpg\">Dead Sea Scroll</a></p>\n<p>Most Biblical names are mononyms, for example. This fragment of the Hebrew Bible contains the name יַעֲקֹב (Jacob). </p>\n<p>Both the Hebrew and Christian scriptures give great significance to names within the narrative. The meanings of names are often described in the text: The man called his wife Eve [which probably means “living”] because she would be the mother of all the living.” People sometimes take or receive new names to indicate a change in their identity, such as when God renames Abram and Sarai to Abraham and Sarah as part of a promise to make them a great nation.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 406px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 147.5369458128079%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/0cb6a3a24f6eb23d3f4677e69742aecc/86db5/image-8.jpg\"\n        srcset=\"/static/0cb6a3a24f6eb23d3f4677e69742aecc/86db5/image-8.jpg 406w\"\n        sizes=\"(max-width: 406px) 100vw, 406px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> Zeno of Citium. Bust in the Farnese collection, Naples. Photo by Paolo Monti, 1969 <a href=\"https://commons.wikimedia.org/wiki/File:Paolo_Monti_-_Servizio_fotografico_(Napoli,_1969)_-_BEIC_6353768.jpg\">Paolo Monti</a></p>\n<p>The ancient Greeks used mononyms as well, although historians added qualifiers called <em>epithets</em> when they needed to distinguish between two people with the same name. Epithets might be descriptive of the person or refer to their home or ancestry, but they are not considered part of their official name. For example, we have Zeno the Stoic (also known as Zeno of Citium) and Zeno of Elea.</p>\n<p>For a history of identity in the modern world, read Part II of this series next week. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 706px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 102%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/5ef8ef00c8012cfda71912a2be813057/a77ef/image-9.jpg\"\n        srcset=\"/static/5ef8ef00c8012cfda71912a2be813057/6aca1/image-9.jpg 650w,\n/static/5ef8ef00c8012cfda71912a2be813057/a77ef/image-9.jpg 706w\"\n        sizes=\"(max-width: 706px) 100vw, 706px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> A newborn’s hospital name tag </p>\n<p><a href=\"https://pixabay.com/photos/baby-medicine-child-foot-care-3169975/\">Pixabay</a></p>\n<p>Learn how to create a unified digital identity for all of your customers. <a href=\"https://www.loginradius.com/book-a-demo/\">Book a demo</a> today with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 07, 2019","updated_date":null,"description":"The definition of human identity extends back to unrecorded history for thousands of years. We used language, artefacts, and records long before our identities were digitised and stored in databases to reflect and affirm our individuality.","title":"A History of Human Identity in Pictures - Part 1","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/cc5d14c48de430bb4070c658e7ab4c5a/c3e3a/history-identity-part-1.jpg","srcSet":"/static/cc5d14c48de430bb4070c658e7ab4c5a/f836f/history-identity-part-1.jpg 200w,\n/static/cc5d14c48de430bb4070c658e7ab4c5a/2244e/history-identity-part-1.jpg 400w,\n/static/cc5d14c48de430bb4070c658e7ab4c5a/c3e3a/history-identity-part-1.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"What is Web Accessibility? Web Accessibility (often stylized “a11y”), is the practice of ensuring that your websites and web applications…","fields":{"slug":"/engineering/introduction-to-web-accessibility-with-semantic-html5/"},"html":"<p><strong>What is Web Accessibility?</strong></p>\n<p>Web Accessibility (often stylized “a11y”), is the practice of ensuring that your websites and web applications are accessible by people with disabilities of many kinds.</p>\n<p>Some examples of common disabilities which we need to consider are: Blindness and visual impairment, deafness and hearing difficulties, motor skill impairment, and many more.</p>\n<p>The common categories of disabilities include:</p>\n<ul>\n<li>Auditory</li>\n<li>Cognitive, learning, and neurological</li>\n<li>Physical</li>\n<li>Speech</li>\n<li>Visual</li>\n</ul>\n<p><em>This list was taken from the W3C Web Accessibility Initiative (WAI). A link to their resources can be found at the bottom.</em></p>\n<p><strong>What is Semantic HTML? What is its correlation with Web Accessibility?</strong></p>\n<p>HTML semantics refers to conveying meaning through the use of HTML elements. An example of <em>semantic</em> HTML would be using <strong><code>&#x3C;header></code></strong>, <strong><code>&#x3C;main></code></strong>, <strong><code>&#x3C;footer></code></strong>, and other content-specific tags when applicable. <em>Unsemantic</em> HTML would be using <strong><code>&#x3C;div></code></strong> or <strong><code>&#x3C;span></code></strong> tags for every use-case.</p>\n<p><strong>Images and “alt” attributes</strong></p>\n<p>Users who are visually impaired may encounter trouble when the content of a website relies on an image. Luckily, there are precautions that we - as developers - can take to ensure that their user experience does not suffer because they are unable to see images.</p>\n<p>The easiest way to do this is to add an <strong>alt</strong> attribute to <strong>all</strong> of your <strong><code>&#x3C;img></code></strong> tags. This way, screen readers will be able to describe the image to the user. Here are a few suggestions and best practices for writing <strong>alt</strong> text:</p>\n<ul>\n<li>\n<p><strong>Do not include words like “image”, or “picture”.</strong> It is redundant, because the screen reader will notify the user that it’s an image. An exception to this would be if the image is of a painting, or an illustration. In this case, emphasizing that is fine, because you want the user to know that it’s specifically a painting, as opposed to any image.</p>\n<ul>\n<li>Example: <strong>alt=”Painted portrait of Albert Einstein”</strong></li>\n</ul>\n</li>\n<li>\n<p><strong>Always include the alt attribute</strong>, even if you don’t want the screen reader to read it. If you have a decorative image (one that is simply cosmetic, and not necessary for the site), then you can add an <strong>alt</strong> tag and assign it to an empty string. In this case, the image will be ignored by the screen reader. If this is neglected, the screen reader may read the file name instead, which may not be particularly helpful.</p>\n<ul>\n<li>Tip: you can also assign an attribute of <strong>role=”presentation”</strong> for decorative images. This can be done in addition to the alt attribute.</li>\n</ul>\n</li>\n<li><strong>Keep it concise.</strong> While there is no limit for length of <strong>alt</strong> text, some screen readers will cut off the alt text at around 125 characters. Either way, you don’t want to waste the user’s time by having their screen reader read a needlessly long description.</li>\n</ul>\n<p><strong>Form Labels and ARIA Labelling</strong></p>\n<p>Users with screen readers will need some way to differentiate between multiple inputs on a single form. Without labels, the user will have a difficult time figuring out what each input is for.</p>\n<p>The easiest way to implement form labelling is with the HTML <strong><code>&#x3C;label></code></strong> tag. The <strong><code>&#x3C;label></code></strong> element uses an attribute called <code>for</code> in order to form a relationship with the ID of the <strong><code>&#x3C;input></code></strong> tag.</p>\n<p>Another way to give context to a screen reader is with the ARIA <strong><code>aria-labelledby</code></strong> attribute. This attribute can be placed on (but not limited to) <strong><code>&#x3C;input></code></strong> tags, and then reference the <strong>id</strong> of the label. You can use <strong><code>&#x3C;label for=””></code></strong> in conjunction with <strong><code>&#x3C;input aria-labelledby=””></code></strong> in order to provide extra support and maximize compatibility.</p>\n<p><strong>Buttons and Tabindices</strong></p>\n<p>Buttons should use <strong><code>&#x3C;button></code></strong> tags (or <strong><code>&#x3C;input type=”submit”></code></strong> if applicable), rather than <strong><code>&#x3C;a></code></strong>, <strong><code>&#x3C;span></code></strong>, <strong><code>&#x3C;div></code></strong>, or anything else that doesn’t have semantic meaning for clickable buttons. Often people choose to use these tags, because they want to clear all styling and not have default <strong><code>&#x3C;button></code></strong> styling. This is ill-advised because <strong><code>&#x3C;button></code></strong> tags come with a ton of functionality built-in, an important part being its <strong><code>tabindex</code></strong>. A user who isn’t able to use a mouse, and must navigate the site with their keyboard, will press the <strong><code>tab</code></strong> key to jump through interactive elements. Standard <strong><code>&#x3C;div></code></strong> tags are not tabbable by default, and assigning a <strong><code>tabindex</code></strong> to it manually can break the flow of the natural tabindices of the page.</p>\n<p><strong>Other Semantic HTML tags</strong></p>\n<p>Other than images and forms, there are still many ways to provide the best accessibility possible. Semantic HTML tags are useful because they describe the content and the relationship with your overall page. Using appropriate, accurate tags such as <strong><code>&#x3C;article></code></strong>, <strong><code>&#x3C;aside></code></strong>, <strong><code>&#x3C;section></code></strong> will give screen readers an idea of what the role is for those sections.</p>\n<p>Other elements such as <strong><code>&#x3C;h1></code></strong> and other heading tags should be carefully planned before sprinkled throughout your webpage. The <strong><code>&#x3C;h1></code></strong> through <strong><code>&#x3C;h6></code></strong> tags should form direct relationships with each other in order to differentiate their meaning. Headings with lower importance (relative to the previous heading) can be used to start new subsections within its current section. Your different page sections can even use <strong><code>aria-labelledby</code></strong> to point to its corresponding heading in order to label your sections accurately.</p>\n<p>The full W3C specification on HTML semantics can be found at: <a href=\"https://www.w3.org/TR/2016/REC-html51-20161101/dom.html\">W3C Recommendation</a>.</p>\n<p>More information about the varying disabilities and barriers can be found at: <a href=\"https://www.w3.org/WAI/people-use-web/abilities-barriers/\">Diverse Abilities and Barriers</a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 24, 2019","updated_date":null,"description":null,"title":"Introduction to Web Accessibility with Semantic HTML5","tags":["HTML5","HTML","Web Accessibility","Semantic HTML5"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/f3092adaa3def7fb943a47f7a5c8be4c/ee604/handicapped.png","srcSet":"/static/f3092adaa3def7fb943a47f7a5c8be4c/69585/handicapped.png 200w,\n/static/f3092adaa3def7fb943a47f7a5c8be4c/497c6/handicapped.png 400w,\n/static/f3092adaa3def7fb943a47f7a5c8be4c/ee604/handicapped.png 800w,\n/static/f3092adaa3def7fb943a47f7a5c8be4c/a8378/handicapped.png 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Greg Sakai","github":null,"avatar":null}}}},{"node":{"excerpt":"A basic example of a JavaScript event Events, in JavaScript, are occurrences that can trigger certain functionality, and can result in…","fields":{"slug":"/engineering/javascript-events-bubbling-capturing-and-propagation/"},"html":"<p><strong>A basic example of a JavaScript event</strong></p>\n<p>Events, in JavaScript, are occurrences that can trigger certain functionality, and can result in certain behaviour. A common example of an event, is a “click”, or a “hover”. You can set listeners to watch for these events that will trigger your desired functionality.</p>\n<p><strong>What is “propagation”?</strong></p>\n<p>Propagation refers to how events travel through the Document Object Model (DOM) tree. The DOM tree is the structure which contains parent/child/sibling elements in relation to each other. You can think of propagation as electricity running through a wire, until it reaches its destination. The event needs to pass through every node on the DOM until it reaches the end, or if it is forcibly stopped.</p>\n<p><strong>Event Bubbling and Capturing</strong></p>\n<p>Bubbling and Capturing are the two phases of propagation. In their simplest definitions, <strong>bubbling</strong> travels from the <em>target</em> to the <em>root</em>, and <strong>capturing</strong> travels from the <em>root</em> to the <em>target</em>. However, that doesn’t make much sense without first defining what a target and a root is.</p>\n<p>The <em>target</em> is the DOM node on which you click, or trigger with any other event.</p>\n<p>For example, a button with a click event would be the event target.</p>\n<p>The <em>root</em> is the highest-level parent of the target. This is usually the <strong>document</strong>, which is a parent of the <strong><body></strong>, which is a (possibly distant) parent of your target element.</p>\n<p>Capturing is not used nearly as commonly as bubbling, so our examples will revolve around the bubbling phase. As an option though, <strong>EventTarget.addEventListener()</strong> has an optional third parameter - which takes its argument as a boolean - which controls the phase of the propagation. The parameter is called <strong>useCapture</strong>, and passing <strong>true</strong> will cause the listener to be on the capturing phase. The default is <strong>false</strong>, which will apply it to the bubbling phase.</p>\n<p>Once you trigger the event, it will <em>propagate</em> up to the root, and it will trigger every single event handler which is associated with the same type. For example, if your button has a click event, during the bubbling phase, it will bubble up to the root, and trigger every click event along the way.</p>\n<p>This kind of behaviour might not sound desirable - and it often isn’t - but there’s an easy workaround...</p>\n<p><strong>Event.stopPropagation()</strong></p>\n<p>These two methods are used for solving the previously mentioned problem regarding event propagation. Calling <strong>Event.stopPropagation()</strong> will prevent further propagation through the DOM tree, and only run the event handler from which it was called.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">&lt;!--</span><span class=\"mtk12\">Try</span><span class=\"mtk1\"> </span><span class=\"mtk12\">it</span><span class=\"mtk1\">--&gt;</span></span></code></pre>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">function</span><span class=\"mtk1\"> </span><span class=\"mtk11\">first</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk10\">console</span><span class=\"mtk1\">.</span><span class=\"mtk11\">log</span><span class=\"mtk1\">(</span><span class=\"mtk7\">1</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">function</span><span class=\"mtk1\"> </span><span class=\"mtk11\">second</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk10\">console</span><span class=\"mtk1\">.</span><span class=\"mtk11\">log</span><span class=\"mtk1\">(</span><span class=\"mtk7\">2</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">button</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">document</span><span class=\"mtk1\">.</span><span class=\"mtk11\">getElementById</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;button&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">container</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">document</span><span class=\"mtk1\">.</span><span class=\"mtk11\">getElementById</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;container&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">button</span><span class=\"mtk1\">.</span><span class=\"mtk11\">addEventListener</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;click&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">first</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">container</span><span class=\"mtk1\">.</span><span class=\"mtk11\">addEventListener</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;click&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">second</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>In this example, clicking the button will cause the console to print <strong>1, 2</strong>. If we wanted to modify this so that <em>only</em> the button’s click event is triggered, we could use <strong>Event.stopPropagation()</strong> to immediately stop the event from bubbling to its parent.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">function</span><span class=\"mtk1\"> </span><span class=\"mtk11\">first</span><span class=\"mtk1\">(</span><span class=\"mtk12\">event</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">event</span><span class=\"mtk1\">.</span><span class=\"mtk11\">stopPropagation</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk10\">console</span><span class=\"mtk1\">.</span><span class=\"mtk11\">log</span><span class=\"mtk1\">(</span><span class=\"mtk7\">1</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>This modification will allow the console to print <strong>1</strong>, but it will end the event chain right away, preventing it from reaching <strong>2</strong>.</p>\n<p><strong>How does this differ from <code>Event.stopImmediatePropagation()</code>? When would you use either?</strong></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">&lt;!--</span><span class=\"mtk12\">Try</span><span class=\"mtk1\"> </span><span class=\"mtk12\">it</span><span class=\"mtk1\">--&gt;</span></span></code></pre>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">function</span><span class=\"mtk1\"> </span><span class=\"mtk11\">first</span><span class=\"mtk1\">(</span><span class=\"mtk12\">event</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk10\">console</span><span class=\"mtk1\">.</span><span class=\"mtk11\">log</span><span class=\"mtk1\">(</span><span class=\"mtk7\">1</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">function</span><span class=\"mtk1\"> </span><span class=\"mtk11\">second</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk10\">console</span><span class=\"mtk1\">.</span><span class=\"mtk11\">log</span><span class=\"mtk1\">(</span><span class=\"mtk7\">2</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">function</span><span class=\"mtk1\"> </span><span class=\"mtk11\">third</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk10\">console</span><span class=\"mtk1\">.</span><span class=\"mtk11\">log</span><span class=\"mtk1\">(</span><span class=\"mtk7\">3</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">button</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">document</span><span class=\"mtk1\">.</span><span class=\"mtk11\">getElementById</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;button&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">container</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">document</span><span class=\"mtk1\">.</span><span class=\"mtk11\">getElementById</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;container&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">button</span><span class=\"mtk1\">.</span><span class=\"mtk11\">addEventListener</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;click&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">first</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">button</span><span class=\"mtk1\">.</span><span class=\"mtk11\">addEventListener</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;click&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">second</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">container</span><span class=\"mtk1\">.</span><span class=\"mtk11\">addEventListener</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;click&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">third</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>Let’s suppose we wanted to add a third function, which prints <strong>3</strong> to the console. In this scenario, we will also move the <strong>second</strong> function to also be on the button. We will apply <strong>third</strong> to the container now.</p>\n<p><strong>Long story short</strong>: we have two event handlers on the button, and clicking <strong>&#x3C;div#container></strong> will now print <strong>3</strong>.</p>\n<p>What will happen now? This will behave the same as before, and it will propagate through the DOM tree, and print <strong>1, 2, 3</strong>, in that order.</p>\n<p><strong>How does this tie in to <code>Event.stopPropagation()</code> and <code>Event.stopImmediatePropagation()</code>?</strong></p>\n<p>Adding <strong>Event.stopPropagation()</strong> to the first function, like so, will print <strong>1, 2</strong> to the console.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">function</span><span class=\"mtk1\"> </span><span class=\"mtk11\">first</span><span class=\"mtk1\">(</span><span class=\"mtk12\">event</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">event</span><span class=\"mtk1\">.</span><span class=\"mtk11\">stopPropagation</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk10\">console</span><span class=\"mtk1\">.</span><span class=\"mtk11\">log</span><span class=\"mtk1\">(</span><span class=\"mtk7\">1</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>This is because <strong>Event.stopPropagation()</strong> will immediately prevent all click events on the <em>parent</em> from being triggered, but it does <strong>not</strong> stop any <strong>other</strong> event handlers from being called.</p>\n<p>As you can see in our example, our button has two click handlers, and it <em>did</em> stop the propagation to its parents. If you wanted to stop <em>all</em> event handlers after the first, <em>that’s where</em> <strong>Event.stopImmediatePropagation()</strong> <em>comes in.</em></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">function</span><span class=\"mtk1\"> </span><span class=\"mtk11\">first</span><span class=\"mtk1\">(</span><span class=\"mtk12\">event</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk12\">event</span><span class=\"mtk1\">.</span><span class=\"mtk11\">stopImmediatePropagation</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk10\">console</span><span class=\"mtk1\">.</span><span class=\"mtk11\">log</span><span class=\"mtk1\">(</span><span class=\"mtk7\">1</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>Now, the first function <em>really will</em> stop the parent click handlers, and all other click handlers. The console will now print just <strong>1</strong>, whereas if we simply used <strong>Event.stopPropagation()</strong>, it would print <strong>1, 2</strong>, and not including either would print <strong>1, 2, 3</strong> .</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk10 { color: #4EC9B0; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n</style>","frontmatter":{"date":"July 22, 2019","updated_date":null,"description":null,"title":"JavaScript Events: Bubbling, Capturing, and Propagation","tags":["JavaScript","JavaScript Events"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/ec578c09d831dd93165ad9409178344c/c0886/bubbles.png","srcSet":"/static/ec578c09d831dd93165ad9409178344c/69585/bubbles.png 200w,\n/static/ec578c09d831dd93165ad9409178344c/497c6/bubbles.png 400w,\n/static/ec578c09d831dd93165ad9409178344c/c0886/bubbles.png 772w","sizes":"(max-width: 772px) 100vw, 772px"}}},"author":{"id":"Greg Sakai","github":null,"avatar":null}}}},{"node":{"excerpt":"What is Multi Factor Authentication (MFA)? Multi Factor Authentication (MFA) is a security process that requires users to verify their…","fields":{"slug":"/identity/what-is-multi-factor-authentication/"},"html":"<h2 id=\"what-is-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#what-is-multi-factor-authentication-mfa\" aria-label=\"what is multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Multi Factor Authentication (MFA)?</h2>\n<p>Multi Factor Authentication (MFA) is a security process that requires users to verify their identity using two or more authentication factors before accessing an account, application, or system.</p>\n<p>Unlike traditional password-based logins, MFA adds an extra layer of security by demanding additional verification, reducing the risk of unauthorized access. For instance, a user must complete a second verification process after providing their username and password to access certain platforms or resources.</p>\n<p>MFA is widely used in various industries, including e-commerce, media &#x26; communication, healthcare, and finance, to protect user accounts from cyber threats. Hundreds of organizations have benefited by integrating MFA. See how to <a href=\"https://www.loginradius.com/docs/security/customer-security/multi-factor-authentication/overview/#integration-guide\">integrate MFA into security policies</a> to mitigate risks associated with credential theft and data breaches.</p>\n<h2 id=\"why-is-mfa-important\" style=\"position:relative;\"><a href=\"#why-is-mfa-important\" aria-label=\"why is mfa important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is MFA Important?</h2>\n<p>Cybercriminals are constantly exploiting weak credentials and gaining access to sensitive systems. Here’s where we get an answer to the question- Why is MFA important?</p>\n<ul>\n<li><strong>Enhanced Security</strong>: Even if a password is stolen, unauthorized access is blocked by requiring an additional authentication factor.</li>\n<li><strong>Prevention of Phishing Attacks</strong>: Since MFA requires multiple authentication steps, it significantly reduces the effectiveness of phishing attempts.</li>\n<li><strong>Regulatory Compliance</strong>: Many industries mandate MFA implementation to comply with security regulations such as GDPR, HIPAA, and PCI DSS.</li>\n<li><strong>Reduced Risk of Account Takeover</strong>: Cybercriminals find it harder to breach accounts that require multiple authentication steps.</li>\n<li><strong>Business Continuity</strong>: Companies using MFA can prevent operational disruptions caused by unauthorized access and cyber threats.</li>\n<li><strong>Cost Savings and Avoiding Liability Issues</strong>: Implementing MFA reduces the financial impact of security breaches, lowering potential fines, recovery costs, and helping organizations avoid legal liabilities related to data breaches.</li>\n</ul>\n<h2 id=\"how-does-mfa-work\" style=\"position:relative;\"><a href=\"#how-does-mfa-work\" aria-label=\"how does mfa work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does MFA Work?</h2>\n<p>Since we’ve learned what MFA is and why it’s important, let’s understand how it works. The MFA process is straightforward yet highly effective. Here’s how it works:</p>\n<ol>\n<li><strong>User Enters Credentials</strong>: The user inputs their username and password.</li>\n<li><strong>MFA Triggered</strong>: The system asks for an additional authentication factor if the credentials are correct.</li>\n<li><strong>Verification Step</strong>: The user provides the second factor (e.g., OTP, biometric scan, hardware token, or passkey).</li>\n<li><strong>Access Granted or Denied</strong>: Access is granted if the second factor is valid; otherwise, the login attempt is blocked.</li>\n</ol>\n<p>Understanding how MFA works is crucial for organizations implementing strong security policies.</p>\n<p>MFA can be implemented in various ways, and organizations can choose the most suitable method based on their security needs and user convenience.</p>\n<p><img src=\"/31897617f8cfd303cc4a03b4950ccab7/how-mfa-works.webp\" alt=\"A visual of the multi-factor authentication (MFA) process on a dark background. It shows a user logging in with email and password, then completing an extra security check using OTP, biometrics, or a security key. The final step confirms access with a green checkmark or denies it with a security alert.\"></p>\n<h2 id=\"types-of-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#types-of-multi-factor-authentication\" aria-label=\"types of multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Multi-Factor Authentication</h2>\n<p>Different MFA methods provide varying levels of security and convenience. Here are the most commonly used types of multi-factor authentication:</p>\n<h3 id=\"time-based-one-time-password-totp\" style=\"position:relative;\"><a href=\"#time-based-one-time-password-totp\" aria-label=\"time based one time password totp permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Time-Based One-Time Password (TOTP)</h3>\n<p>A TOTP is a temporary passcode generated by an authentication app (e.g., Google Authenticator or Microsoft Authenticator). The code expires shortly, reducing the risk of unauthorized access.</p>\n<h3 id=\"push-notifications\" style=\"position:relative;\"><a href=\"#push-notifications\" aria-label=\"push notifications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Push Notifications</h3>\n<p>Push notification MFA is one of the convenient MFA factors that allows seamless authentication. It involves sending a push notification to a registered mobile device and asking the user to approve or deny the login attempt.</p>\n<h3 id=\"sms-based-verification\" style=\"position:relative;\"><a href=\"#sms-based-verification\" aria-label=\"sms based verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SMS-Based Verification</h3>\n<p>An SMS-based MFA solution sends a one-time passcode (OTP) to a user’s mobile phone via text message. The user must enter the OTP to complete authentication.</p>\n<h3 id=\"hardware-token\" style=\"position:relative;\"><a href=\"#hardware-token\" aria-label=\"hardware token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hardware Token</h3>\n<p>A hardware token is a physical device that generates OTPs or connects via USB/NFC to authenticate the user.</p>\n<h3 id=\"biometric-authentication\" style=\"position:relative;\"><a href=\"#biometric-authentication\" aria-label=\"biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Authentication</h3>\n<p>This method uses inherent factors like fingerprint scans, facial recognition, or iris scans for verification.</p>\n<p>Biometric authentication is gaining popularity because of its ease of use and strong security. Many modern devices, including smartphones and laptops, integrate biometric authentication as an additional layer of security.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Buyers Guide to Multi-Factor Authentication ebook\"\n        title=\"Buyers Guide to Multi-Factor Authentication ebook\"\n        src=\"/static/4e78e2265f68071219ae6811eafb52ec/e5715/eb-buyers-guide-to-multi-factor-authentication.png\"\n        srcset=\"/static/4e78e2265f68071219ae6811eafb52ec/a6d36/eb-buyers-guide-to-multi-factor-authentication.png 650w,\n/static/4e78e2265f68071219ae6811eafb52ec/e5715/eb-buyers-guide-to-multi-factor-authentication.png 768w,\n/static/4e78e2265f68071219ae6811eafb52ec/2bef9/eb-buyers-guide-to-multi-factor-authentication.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"what-are-the-different-types-of-authentication-factors\" style=\"position:relative;\"><a href=\"#what-are-the-different-types-of-authentication-factors\" aria-label=\"what are the different types of authentication factors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Different Types of Authentication Factors?</h2>\n<p>Authentication factors are categorized into different types based on what the user knows, has, or is. These MFA factors play a key role in strengthening security.</p>\n<h3 id=\"knowledge-factors-something-the-user-knows\" style=\"position:relative;\"><a href=\"#knowledge-factors-something-the-user-knows\" aria-label=\"knowledge factors something the user knows permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Knowledge Factors: Something the User Knows</h3>\n<p>Examples include passwords, PINs, or security questions.</p>\n<h3 id=\"possession-factors-something-the-user-has\" style=\"position:relative;\"><a href=\"#possession-factors-something-the-user-has\" aria-label=\"possession factors something the user has permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Possession Factors: Something the User Has</h3>\n<p>Examples include smartphones, security keys, and smart cards.</p>\n<h3 id=\"inherent-factors-something-unique-to-the-user\" style=\"position:relative;\"><a href=\"#inherent-factors-something-unique-to-the-user\" aria-label=\"inherent factors something unique to the user permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Inherent Factors: Something Unique to the User</h3>\n<p>These involve biometric authentication methods such as fingerprints, voice recognition, or facial scans.</p>\n<h3 id=\"behavioral-factors-something-the-user-does\" style=\"position:relative;\"><a href=\"#behavioral-factors-something-the-user-does\" aria-label=\"behavioral factors something the user does permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Behavioral Factors: Something the User Does</h3>\n<p>These include behavioral patterns like keystroke dynamics and mouse movement patterns.</p>\n<p>Behavioral authentication is an emerging MFA technology that continuously analyzes user behavior to detect anomalies and prevent unauthorized access.</p>\n<h2 id=\"multi-factor-authentication-vs-two-factor-authentication\" style=\"position:relative;\"><a href=\"#multi-factor-authentication-vs-two-factor-authentication\" aria-label=\"multi factor authentication vs two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication vs. Two-Factor Authentication</h2>\n<p>Many people confuse both terms and are unable to <a href=\"https://www.loginradius.com/blog/identity/2fa-mfa-key-differences/\">decide between 2FA and MFA</a>. When it comes to 2FA vs MFA, the difference is quite simple:</p>\n<ul>\n<li>Two-factor authentication (2FA) requires exactly two authentication factors.</li>\n<li>Multi-factor authentication (MFA) requires two or more authentication factors.</li>\n</ul>\n<p>MFA is more secure than 2FA since it provides additional layers of protection. Organizations handling sensitive data or focusing on enterprise security often prefer MFA over 2FA to ensure stronger security.</p>\n<h2 id=\"what-is-adaptive-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-adaptive-multi-factor-authentication\" aria-label=\"what is adaptive multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Adaptive Multi-Factor Authentication?</h2>\n<p>When we talk about an advanced security measure, <a href=\"https://www.loginradius.com/products/adaptive-mfa\">Adaptive MFA</a> is undoubtedly a game-changer that analyzes user behavior and risk levels to determine when to prompt for authentication.</p>\n<p>If a login attempt appears risky (e.g., new device, unusual location), the system triggers additional authentication steps.</p>\n<p>Adaptive MFA helps balance security and user convenience by requiring additional verification only when necessary.</p>\n<h2 id=\"examples-of-multi-factor-authentication-methods\" style=\"position:relative;\"><a href=\"#examples-of-multi-factor-authentication-methods\" aria-label=\"examples of multi factor authentication methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Examples of Multi-Factor Authentication Methods</h2>\n<p>Here are some MFA examples used by businesses and individuals:</p>\n<ul>\n<li><strong>Online Banking</strong>: Banks use MFA for account access and high-value transactions.</li>\n<li><strong>Cloud Applications</strong>: Google, Microsoft, and AWS enforce MFA to secure user accounts.</li>\n<li><strong>Corporate Networks</strong>: Businesses implement MFA for employee access to sensitive data.</li>\n<li><strong>Healthcare Systems</strong>: Medical organizations use MFA to protect patient records and comply with regulations.</li>\n<li><strong>E-commerce Platforms</strong>: Online retailers leverage MFA to prevent fraudulent transactions.</li>\n</ul>\n<h2 id=\"benefits-of-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-multi-factor-authentication\" aria-label=\"benefits of multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Multi-Factor Authentication</h2>\n<p>When it comes to the benefits of MFA, the list is endless; here’s a list of a few benefits that you get:</p>\n<h3 id=\"improving-security\" style=\"position:relative;\"><a href=\"#improving-security\" aria-label=\"improving security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improving Security</h3>\n<p>MFA protects against unauthorized access by adding extra layers of verification beyond passwords. It significantly reduces the risk of credential-based attacks and data breaches.</p>\n<h3 id=\"enabling-digital-initiatives\" style=\"position:relative;\"><a href=\"#enabling-digital-initiatives\" aria-label=\"enabling digital initiatives permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enabling Digital Initiatives</h3>\n<p>Businesses can implement MFA solutions to secure digital transactions, remote work setups, and cloud applications. This allows organizations to safely expand their digital services without compromising security.</p>\n<h3 id=\"reducing-fraud-risks\" style=\"position:relative;\"><a href=\"#reducing-fraud-risks\" aria-label=\"reducing fraud risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reducing Fraud Risks</h3>\n<p>MFA helps businesses prevent fraudulent transactions and unauthorized account access. It is especially crucial for industries like banking and e-commerce, where financial fraud is a major concern.</p>\n<h3 id=\"increasing-user-confidence--trust\" style=\"position:relative;\"><a href=\"#increasing-user-confidence--trust\" aria-label=\"increasing user confidence  trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Increasing User Confidence &#x26; Trust</h3>\n<p>Customers feel more confident using services that implement strong authentication measures. A well-implemented MFA system reassures users that their sensitive information is protected, leading to improved customer retention and brand reputation.</p>\n<h3 id=\"boosting-regulatory-compliance\" style=\"position:relative;\"><a href=\"#boosting-regulatory-compliance\" aria-label=\"boosting regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Boosting Regulatory Compliance</h3>\n<p>Many industries, such as healthcare and finance, require MFA to comply with strict data protection regulations. Implementing MFA ensures that businesses meet compliance standards like GDPR, HIPAA, and PCI DSS.</p>\n<p>See how one of <a href=\"https://www.loginradius.com/resource/case-study-page-safebridge/\">our clients- SafeBridge, leveled up security</a> with LoginRadius MFA.</p>\n<h2 id=\"top-mfa-providers\" style=\"position:relative;\"><a href=\"#top-mfa-providers\" aria-label=\"top mfa providers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Top MFA Providers</h2>\n<h3 id=\"loginradius\" style=\"position:relative;\"><a href=\"#loginradius\" aria-label=\"loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius</h3>\n<p><a href=\"https://www.loginradius.com/platforms/multi-factor-authentication\">LoginRadius Multi-Factor Authentication</a> makes security effortless. With flexible options like OTPs, biometrics, and authenticator apps, you can add an extra layer of protection without disrupting the user experience.</p>\n<p>Moreover, LoginRadius’ adaptive MFA intelligently detects risk—only stepping in when needed, like an unusual login attempt. Best of all, you can integrate LoginRadius MFA into your app or website within minutes, with developer-friendly APIs and seamless workflows. Strong security, easy implementation, and a frictionless login experience—all in one solution.</p>\n<h3 id=\"google-authenticator\" style=\"position:relative;\"><a href=\"#google-authenticator\" aria-label=\"google authenticator permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Google Authenticator</h3>\n<p>Google Authenticator is a mobile app that generates time-based one-time passwords (TOTP) for multi-factor authentication (MFA).</p>\n<p>It provides an additional layer of security by requiring users to enter a unique 6-digit code, which refreshes every 30 seconds, along with their password during login. This method helps protect accounts from unauthorized access and is widely used across various platforms for secure authentication.</p>\n<h3 id=\"yubico\" style=\"position:relative;\"><a href=\"#yubico\" aria-label=\"yubico permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Yubico</h3>\n<p>Yubico provides hardware-based multi-factor authentication (MFA) solutions through its YubiKey devices. YubiKeys enhances security by requiring physical authentication in addition to a password, protecting accounts from phishing and unauthorized access.</p>\n<p>They support multiple authentication methods, including FIDO2, U2F, OTP, and Smart Card authentication, making them compatible with a wide range of platforms. Unlike SMS-based MFA, YubiKeys does not rely on network connectivity and provides strong, passwordless authentication options for improved security and ease of use.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Multi-Factor Authentication is a critical component of modern cybersecurity. By requiring multiple verification steps, MFA enhances security, prevents data breaches, and provides an added layer of protection against cyber threats.</p>\n<p>Businesses should implement MFA by choosing the right multi-factor authentication provider to safeguard sensitive information, reduce fraud risks, and comply with security regulations.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. Why is MFA important to security?</strong></p>\n<p>MFA is crucial to security because it adds an extra layer of protection by requiring multiple forms of verification, reducing the risk of unauthorized access.</p>\n<p><strong>2. What are the benefits of MFA security?</strong></p>\n<p>MFA security offers enhanced protection against cyber threats, mitigates the risk of stolen or weak passwords, and improves overall account security.</p>\n<p><strong>3. What is multi-factor authentication and why is it important to help prevent identity theft?</strong></p>\n<p>Multi-factor authentication (MFA) verifies user identity with multiple factors like passwords, tokens, or biometrics, reducing the risk of identity theft by ensuring only authorized users gain access.</p>\n<p><strong>4. What are the benefits of having an MFA?</strong></p>\n<p>Having MFA provides improved security, reduced vulnerability to password-related attacks, increased trust with consumers, and compliance with security standards.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 28, 2019","updated_date":null,"description":"In today’s digital landscape, cybersecurity threats are evolving rapidly. Businesses and individuals alike need stronger security measures to protect sensitive data. A highly effective method to improve security is through Multi-Factor Authentication (MFA). But what is multi factor authentication, and how does it work? Let’s dive into the details.","title":"What is Multi Factor Authentication (MFA) and How does it Work?","tags":["mfa","authentication","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4598540145985401,"src":"/static/ef2d2108dd2e8e4c8f71c33dd00c5810/ee604/mfa-cover.png","srcSet":"/static/ef2d2108dd2e8e4c8f71c33dd00c5810/69585/mfa-cover.png 200w,\n/static/ef2d2108dd2e8e4c8f71c33dd00c5810/497c6/mfa-cover.png 400w,\n/static/ef2d2108dd2e8e4c8f71c33dd00c5810/ee604/mfa-cover.png 800w,\n/static/ef2d2108dd2e8e4c8f71c33dd00c5810/a8378/mfa-cover.png 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"It is hard to write 100% holes-free code, no matter how hard you try. Sometimes it is not even your own fault (language implementation…","fields":{"slug":"/engineering/3-simple-ways-to-secure-your-websites-applications/"},"html":"<p>It is hard to write 100% holes-free code, no matter how hard you try. Sometimes it is not even your own fault (language implementation, server setups, etc.) and those factors are likely out of your control. That being said, as developers, we should strive to write our code as safe and secure as possible. Here are my suggestions to keep yourself from being woken up in the middle of the night:</p>\n<p>1. <strong>DO NOT trust any user-input, PERIOD.</strong> Not even if it is yours truly. This is the most common attack vector for your web applications, whether it is just a contact form or an API end-point. For example, if a form is implemented to store data in a database, someone can try brute-forcing with classic SQL-injection techniques. Others can certainly try calling your API and see if there are any spotty error-handling issues. Sanitize all inputs as much as you can, and handle all errors behind the scenes properly and gracefully without exposing the actual details to the public.</p>\n<p>2. <strong>UPDATE, UPGRADE and REPEAT.</strong> Chances are, a lot of your code is dependent on third-party libraries (open or closed source, does not matter). It is your job to make sure you are using the latest version for them all. When hackers find out you are using outdated or vulnerable code, you are done. I have seen this happening way too many times than I can count over the years when websites got hacked and outdated plugins or libraries was the main culprit.</p>\n<p>You might be saying, \"Hey, upgrading that library will break my code!!\". Well, what is your job again? Deal with it.</p>\n<p>3. <strong>Web Application Firewall (WAF)</strong> Consider getting one if your server admin lets you, it can potentially save yourself a lot of embarrassments. Just keep in mind though it should not be your only security strategy, as WAFs will not stop all kinds of attacks. It is still your sole responsibility to write good code and repeat step 1 and 2.</p>\n<p><strong>Happyyyyy coding!</strong></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 24, 2019","updated_date":null,"description":null,"title":"3 Simple Ways to Secure Your Websites/Applications","tags":["Engineering"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/a83283c1ebd13e5b72cee8093889ff72/2a4de/hacker.png","srcSet":"/static/a83283c1ebd13e5b72cee8093889ff72/69585/hacker.png 200w,\n/static/a83283c1ebd13e5b72cee8093889ff72/497c6/hacker.png 400w,\n/static/a83283c1ebd13e5b72cee8093889ff72/2a4de/hacker.png 600w","sizes":"(max-width: 600px) 100vw, 600px"}}},"author":{"id":"Karl Wittig","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":828,"currentPage":139,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}