{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/141","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"OAuth2 is an authorization delegation protocol that allows one party’s accessing of an end user’s resources stored with another party…","fields":{"slug":"/engineering/what-is-the-difference-between-oauth1-and-oauth2/"},"html":"<p>OAuth2 is an authorization delegation protocol that allows one party’s accessing of an end user’s resources stored with another party without sharing any credentials. OAuth2 is often compared with SAML and OpenID Connect as their purposes and uses overlap, however these comparisons often refer to OAuth2 as OAuth. This has resulted in some confusion regarding OAuth2 and OAuth1.</p>\n<p><a href=\"https://tools.ietf.org/html/rfc5849\">OAuth1</a> was published in 2010, and <a href=\"https://tools.ietf.org/html/rfc6749\">OAuth2</a> is a complete rewrite of OAuth1 released in 2012. The following section will go over the most significant needs that led to this rewrite, along with the change associated to address them.</p>\n<h3 id=\"support-for-non-browser-based-applications\" style=\"position:relative;\"><a href=\"#support-for-non-browser-based-applications\" aria-label=\"support for non browser based applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Support for non-browser based applications</h3>\n<p>One of the commonly agreed-upon disadvantages of OAuth1 was the lack of support it offers to non-browser based application clients. OAuth2 has different authorization work flows to address authorization initiated by native application clients. This was one of the main advantages OAuth2 has over OAuth1. However, abuse of the flows in favour of convenience and ease can lead to insecure implementations of OAuth2. When using OAuth2 for mobile, desktop, or single page applications, it is recommended to refer to the IETF paper going over best OAuth2 practices for mobile apps: <a href=\"https://tools.ietf.org/html/rfc8252\">IETF</a>.</p>\n<h3 id=\"ease-of-implementation\" style=\"position:relative;\"><a href=\"#ease-of-implementation\" aria-label=\"ease of implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Ease of implementation</h3>\n<p>OAuth1 was often criticized for the barrier it poses to writing a client as each exchange between client, server, and resource server requires a validation of a shared secret. This secret is used to sign the arguments for the authorization request by the client, subsequently the server signs the arguments with the client’s key to verify the legitimacy of the client. The arguments need to be passed in the exact order and is often finicky to write. Moreover, dealing with cryptographic signing of the requests in addition to this can be a pain.</p>\n<p>OAuth2 has delegated this part of the security to transfer over HTTPS. This means while OAuth1 is protocol-independent, OAuth2 requests must be sent over SSL. Since TLS already provides transport-level message privacy and integrity, some question the merit of arguably redundant client-side signing and argument sorting. Others have brought up concerns with completely delegating security to HTTPS, and mention reasons such as yet-undiscovered zero-day TLS vulnerabilities potentially compromising entire systems.</p>\n<h3 id=\"clear-separation-of-roles\" style=\"position:relative;\"><a href=\"#clear-separation-of-roles\" aria-label=\"clear separation of roles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear separation of roles</h3>\n<p>The conceptualization of OAuth2 defines a resource server in addition to an authorization server. This means there is a clear separation of roles between the server that handles the authorization request, and the server that makes access-control decisions based on the response to the authorization request. This separation of concerns allows support for more flexible use cases.</p>\n<h2 id=\"so-oauth1-or-oauth2\" style=\"position:relative;\"><a href=\"#so-oauth1-or-oauth2\" aria-label=\"so oauth1 or oauth2 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>So, OAuth1 or OAuth2?</h2>\n<p>All of the above points seem to suggest OAuth2 as a superior alternative to OAuth1, and that OAuth1 is obsolete. This is not the case. It is very rare to see a greenfield authorization system using OAuth1, and the only major player still using OAuth1 is Twitter -- they call their version OAuth1.0a. However, as far as security and usability is concerned, OAuth1 is still viable and perhaps even more secure than OAuth2 since it offers additional security on top of TLS-based precautions, and creates barriers in potentially compromising flows. An existing system that uses OAuth1 probably does not need to upgrade to OAuth2. New systems that rely on server-to-server authorization could probably leverage OAuth1 for the additional security as well. On the other hand, use cases that could benefit from a separation of concerns, non-browser support, and ease of client development should go for OAuth2.</p>\n<p>OAuth2 has received its own share of criticisms. For example, in 2012 Eran Hammer, one of the original authors of OAuth2, withdrew his name from the specification and wrote <a href=\"https://gist.github.com/nckroy/dd2d4dfc86f7d13045ad715377b6a48f\">an article</a> calling out its many flaws. However, even in this article he agreed with the usefulness of OAuth2, and that “at the hand of a developer with deep understanding of web security will likely result in a secure implementation”.</p>\n<p>OAuth2 is not necessarily more secure than OAuth1, and using OAuth2 does not inherently lead to better security. Many considerations must go into each specific implementation. For starters, the appropriate grant flow must be chosen with care pertaining to the use case; the redirect_uri must be validated sufficiently; and measures must be taken to prevent access tokens from ending up in the browser history. For additional security considerations, see this <a href=\"https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-10\">IETF work in progress draft on OAuth Security Best Current Practice</a>.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 31, 2019","updated_date":null,"description":"Learn about the differences between OAuth 1.0 and OAuth 2.0 and how OAuth 2.0 is superior to OAuth 1.0","title":"OAuth 1.0 VS OAuth 2.0","tags":["Oauth","Engineering"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/1c2dae61b8f7fee8ab8408c5d18cd8b4/14b42/pexels-photo-373543.jpg","srcSet":"/static/1c2dae61b8f7fee8ab8408c5d18cd8b4/f836f/pexels-photo-373543.jpg 200w,\n/static/1c2dae61b8f7fee8ab8408c5d18cd8b4/2244e/pexels-photo-373543.jpg 400w,\n/static/1c2dae61b8f7fee8ab8408c5d18cd8b4/14b42/pexels-photo-373543.jpg 800w,\n/static/1c2dae61b8f7fee8ab8408c5d18cd8b4/47498/pexels-photo-373543.jpg 1200w,\n/static/1c2dae61b8f7fee8ab8408c5d18cd8b4/0e329/pexels-photo-373543.jpg 1600w,\n/static/1c2dae61b8f7fee8ab8408c5d18cd8b4/2d44f/pexels-photo-373543.jpg 2250w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Ti Zhang","github":null,"avatar":null}}}},{"node":{"excerpt":"This blog post goes over how you can connect your SAAS/web application with the Azure AD world. Let’s take a look at how Azure AD works as…","fields":{"slug":"/engineering/azure-ad-as-an-identity-provider/"},"html":"<p>This blog post goes over how you can connect your SAAS/web application with the Azure AD world. Let’s take a look at how Azure AD works as an identity provider to provide your users with the ability to log in. e.g if anyone using Office 365, able to log on with their standard account or a federated one.</p>\n<p>Windows Azure provides a number of identity-based technologies to support such kind of requirements. As a means of illustrating this, we’ll show an example using Azure AD as an Identity Provider (IdP), connecting up to the LoginRadius SAAS application using the LoginRadius Admin Console.</p>\n<ul>\n<li>Log in to the Azure Portal.</li>\n<li>On the Azure active directory tab, click on the App registrations tab.  From the top of the screen, create a new application by clicking on \"New application registration\".</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 480px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 86.04166666666667%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"1\"\n        title=\"1\"\n        src=\"/static/20af250efd33089032a385eebeaf2b97/e85cb/1.png\"\n        srcset=\"/static/20af250efd33089032a385eebeaf2b97/e85cb/1.png 480w\"\n        sizes=\"(max-width: 480px) 100vw, 480px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li>Give your SaaS/Web application a name (company name Demo).  Using the drop-down, select the type of application i.e Web Application / Web API.</li>\n<li>For Sign-On URL fill in the Assertion Consumer Service (ACS) URL for the Service Provider</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 532px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 98.49624060150376%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"2\"\n        title=\"2\"\n        src=\"/static/0bca64781f2836e8e64d5c3b716adccc/89a37/2.png\"\n        srcset=\"/static/0bca64781f2836e8e64d5c3b716adccc/89a37/2.png 532w\"\n        sizes=\"(max-width: 532px) 100vw, 532px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li>Go to the App setting at the top of the page and fill in the required fields</li>\n<li>Go to the endpoints at the top of the application registration page and use these app endpoints to set up the azure ad with your saas application.</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 493px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 124.13793103448276%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"A 1\"\n        title=\"A 1\"\n        src=\"/static/6da5ac329fe0cd7ccd2c546fb0b7bf96/f88d0/A-1.png\"\n        srcset=\"/static/6da5ac329fe0cd7ccd2c546fb0b7bf96/f88d0/A-1.png 493w\"\n        sizes=\"(max-width: 493px) 100vw, 493px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Here are the meanings of the terms, we have used above: </p>\n<p><strong>Sign-On Url</strong>: This is where you want to send users to when accessing the \"application\". </p>\n<p><strong>Reply URL</strong>: It's the Reply URL which is the address to which Azure AD will send the SAML authentication response.</p>\n<p>On the Service Provider side, the metadata from the tenant, Azure Identity Provider needs to be parsed and added to the configuration file. This is done by downloading the Azure IdP metadata file directly, e.g.</p>\n<p><code>https://login.microsoftonline.com/&#x3C;AzureTenantID>/federationmetadata/2007-06/federationmetadata.xml</code></p>\n<p>This is all you need to know to go about creating a new application on the Azure portal and use Azure Ad as an Identity provider for login. With these and a number of services, Azure offers a solid convergence point for brokering connections with your web applications and workspaces.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 30, 2019","updated_date":null,"description":null,"title":"Azure AD as an Identity provider","tags":["Engineering","Authentication","AzureAD"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/c3f65c00249c3107c5efe318d12ef2f9/bc59e/TN0lxUr0.png","srcSet":"/static/c3f65c00249c3107c5efe318d12ef2f9/69585/TN0lxUr0.png 200w,\n/static/c3f65c00249c3107c5efe318d12ef2f9/497c6/TN0lxUr0.png 400w,\n/static/c3f65c00249c3107c5efe318d12ef2f9/bc59e/TN0lxUr0.png 512w","sizes":"(max-width: 512px) 100vw, 512px"}}},"author":{"id":"Team LoginRadius","github":"LoginRadius","avatar":null}}}},{"node":{"excerpt":"Introduction First, let’s understand what is SSO (Single Sign-On).  Introducing Single Sign On (SSO) to your customers can offer greater…","fields":{"slug":"/identity/what-is-single-sign-on/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>First, let’s understand what is SSO (Single Sign-On).  Introducing Single Sign On (SSO) to your customers can offer greater security and improved usability. That’s two of the many key <a href=\"https://www.loginradius.com/blog/identity/benefits-single-sign-on-sso/\">benefits of SSO.</a></p>\n<p>Let’s face it. No one likes remembering credentials. They seem like exerting a lot of pressure on the memory. What's worse is many use the same username and password, irrespective of the application they are using.</p>\n<p>This is where the Single Sign On technology comes into focus and works like a champ. To understand this solution, let's consider an analogy: \"Imagine going to the mall, and at each store, you must register with the store for your first purchase. Then, every time after that, you have to prove who you are to buy something.\"</p>\n<p>Unfortunately, this is what happens when you shop online. Each website makes you create a new and unique identity specific to that website. On top of that, you have to login and authenticate each time.</p>\n<p>While some web properties do offer the option to <a href=\"https://www.loginradius.com/social-login/\">sign in using social identity</a>, the majority of customers still have to log in to each web property. This often happens even when the websites are part of the same parent organization. Let’s understand what is SSO and how SSO works. </p>\n<h2 id=\"what-is-single-sign-on\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on\" aria-label=\"what is single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On?</h2>\n<p>Single Sign-On (SSO)  is a method of authentication that allows websites to use other trustworthy sites to verify users. Single sign-on allows a user to log in to any independent application with a single ID and password.</p>\n<p>SSO is an essential feature of an Identity and Access Management (IAM) platform for controlling access. Verification of user identity is important when it comes to knowing which permissions a user will have. Talking about the sso examples, the LoginRadius Identity platform is one example of managing access that combines user identity management solutions with SSO solutions.</p>\n<h2 id=\"how-single-sign-on-works\" style=\"position:relative;\"><a href=\"#how-single-sign-on-works\" aria-label=\"how single sign on works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Single Sign On Works?</strong></h2>\n<p>Single sign-on (SSO) is a system that allows users to access multiple applications and services with just one set of login credentials. </p>\n<p>When we talk about how how SSO works- it does  by authenticating a user's identity once and then granting access to all of the applications and services that the user is authorized to access. When a user attempts to access a resource from a service provider, the SSO system sends a request to the user's identity provider to authenticate the user's identity. </p>\n<p>Once the user is authenticated, the identity provider sends the necessary credentials to the service provider, allowing the user to access the requested resource. This process eliminates the need for users to remember and manage multiple usernames and passwords, streamlining the login process and improving the user experience.</p>\n<p>SSO also simplifies identity management for organizations, reducing the risk of data breaches and improving overall security.</p>\n<h2 id=\"what-is-a-single-sign-on-sso-authentication-token\" style=\"position:relative;\"><a href=\"#what-is-a-single-sign-on-sso-authentication-token\" aria-label=\"what is a single sign on sso authentication token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is a Single Sign-On (SSO) Authentication Token?</h2>\n<p>An SSO authentication token is a crucial aspect of the SSO process. Once a user is successfully authenticated, the Identity Provider (IDP) generates a token. This token contains information about the user's identity and permissions. The Service Provider (SP) then recognizes this token, granting access to the user without the need for re-authentication. Tokens are typically encrypted to ensure secure transmission and storage of user data.</p>\n<h2 id=\"how-are-saml-and-oauth-used-with-single-sign-on\" style=\"position:relative;\"><a href=\"#how-are-saml-and-oauth-used-with-single-sign-on\" aria-label=\"how are saml and oauth used with single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Are SAML and OAuth Used with Single Sign-On?</h2>\n<ul>\n<li><strong>SAML (Security Assertion Markup Language)</strong>: SAML is an XML-based open standard used for exchanging authentication and authorization data between the IDP and SP. It enables seamless SSO by allowing the IDP to send assertions about the user to the SP, which then grants access based on these assertions.</li>\n<li><strong>OAuth (Open Authorization)</strong>: OAuth is another protocol used with SSO, often seen in scenarios where a user wants to grant access to their information without sharing their credentials. It allows the user to authorize a third-party application to access their resources on another service provider. OAuth enhances security and user control in SSO scenarios.</li>\n</ul>\n<h2 id=\"what-makes-a-true-single-sign-on-system\" style=\"position:relative;\"><a href=\"#what-makes-a-true-single-sign-on-system\" aria-label=\"what makes a true single sign on system permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Makes a True Single Sign-On System?</h2>\n<p>A true SSO system offers several key features:</p>\n<ul>\n<li>Centralized Authentication: Users authenticate once, and this authentication is recognized across all connected applications.</li>\n<li>Seamless Experience: Users navigate between applications without the need for repeated logins.</li>\n<li>Token-Based Access: The system uses tokens to securely transmit and store user credentials and permissions.</li>\n<li>Integration with Identity Providers: The system seamlessly integrates with various identity providers, such as Microsoft Active Directory or Google Directory.</li>\n</ul>\n<h2 id=\"what-is-an-sso-software-vs-an-sso-solution\" style=\"position:relative;\"><a href=\"#what-is-an-sso-software-vs-an-sso-solution\" aria-label=\"what is an sso software vs an sso solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is an SSO Software vs. an SSO Solution?</h2>\n<ul>\n<li><strong>SSO Software</strong>: This refers to the technology and tools used to implement SSO, including protocols like SAML, OAuth, and OpenID Connect. It involves the software components that manage user authentication and authorization.</li>\n<li><strong>SSO Solution</strong>: An SSO authentication solution is a comprehensive package that includes SSO software along with additional features like user management, multi-factor authentication (MFA), and identity governance. It provides a complete system for managing user access across applications.</li>\n</ul>\n<h2 id=\"what-is-app-to-app-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#what-is-app-to-app-single-sign-on-sso\" aria-label=\"what is app to app single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is App-to-App Single Sign-On (SSO)?</h2>\n<p>App-to-App SSO authentication, also known as Service-to-Service SSO, enables seamless authentication and access between different applications within an organization's ecosystem. Instead of requiring users to log in multiple times when switching between apps, this approach maintains authentication sessions across the apps. It enhances productivity and user experience by eliminating the need for repeated logins.</p>\n<h2 id=\"what-is-single-sign-on-sso-software-as-a-service-saas\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on-sso-software-as-a-service-saas\" aria-label=\"what is single sign on sso software as a service saas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On (SSO) Software as a Service (SaaS)?</h2>\n<p>SSO Software as a Service (SaaS) is a cloud-based solution that offers SSO functionality to organizations without the need for on-premises infrastructure. With SSO SaaS, organizations can easily implement SSO across their applications and services by subscribing to a third-party provider. This approach simplifies deployment, maintenance, and scalability of SSO, making it accessible to businesses of all sizes.</p>\n<h2 id=\"how-does-single-sign-on-sso-fit-into-an-access-management-strategy\" style=\"position:relative;\"><a href=\"#how-does-single-sign-on-sso-fit-into-an-access-management-strategy\" aria-label=\"how does single sign on sso fit into an access management strategy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Single Sign-On (SSO) Fit into an Access Management Strategy?</h2>\n<p>Integrating SSO authentication into an Access Management Strategy enhances security, user experience, and operational efficiency:</p>\n<ul>\n<li><strong>Enhanced Security</strong>: SSO reduces the risk of password-related vulnerabilities and unauthorized access.</li>\n<li><strong>Streamlined User Experience</strong>: Users enjoy a seamless login experience across applications, boosting productivity.</li>\n<li><strong>Centralized Access Control</strong>: Administrators can manage user access and permissions from a centralized platform, ensuring consistency and compliance.</li>\n<li><strong>Cost Efficiency</strong>: SSO reduces IT costs associated with password resets and support, freeing up resources for other critical tasks.</li>\n</ul>\n<p>Incorporating SSO into an Access Management Strategy strengthens overall security posture while simplifying user access across the organization's digital assets.</p>\n<h2 id=\"what-are-the-benefits-of-single-sign-on\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-single-sign-on\" aria-label=\"what are the benefits of single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Benefits of Single Sign-On?</h2>\n<p>Till now, we’ve learned how SSO works, now let’s understand its benefits. Single Sign-On clearly minimizes the risk of poor password habits. Also, removing login credentials from servers or network storage can help a great deal in <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">preventing a cyber attack</a>. </p>\n<h3 id=\"benefits-for-customers\" style=\"position:relative;\"><a href=\"#benefits-for-customers\" aria-label=\"benefits for customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits for Customers</h3>\n<h4 id=\"1-seamless-user-experience\" style=\"position:relative;\"><a href=\"#1-seamless-user-experience\" aria-label=\"1 seamless user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Seamless user experience</h4>\n<p>Customers can use a single identity to navigate multiple web and mobile domains or service applications.</p>\n<h4 id=\"2-stronger-password-protection\" style=\"position:relative;\"><a href=\"#2-stronger-password-protection\" aria-label=\"2 stronger password protection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Stronger password protection</h4>\n<p>Because users only need to use one password, SSO makes generating, remembering, and using stronger passwords simpler for them.</p>\n<h4 id=\"3-reduces-customer-time\" style=\"position:relative;\"><a href=\"#3-reduces-customer-time\" aria-label=\"3 reduces customer time permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Reduces customer time</h4>\n<p>The time spent on re-entering passwords for the same identity. Users will spend less time logging into various apps to do their work. Ultimately it enhances the productivity of businesses.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABgUlEQVQY01VQv0tCYRR9LflMMbUIs9RELTVfEfoe+vzJszT7RRGF4FqDDQ0tQgUNBRkEDf0DbQ3VEIUQUUFDBLU0FBGUNVYuQs6n73ui0QeHey/fueeeexlldwgUTT1hqJ0RGSqSK7uDUDqCqP1TsA4RTb0SdPwE9JwEpVsC64zWeSyJDE1UzjBae2NotgegtgWgdUVh9A6jfSABjSsiEylPYfNDxQ3BHM/AHZ8Fy09BwSXAkj7WUR3K1KZbhRSEZBqeyCS0xKGGS6JNTEPjjkFBBOkGHcIIugLjMBGukU/BTGqLfwwmAsqTHdam94QmII5mwBNRO2kw+VKwhmag80h1hzTqyKoGHxUcgYFs0dI/+O8sssNGm4ijwiU+v77x9PyC1+I73oofKJVKCE/PgzHzaLAIWFzbxt3DI/aPz7B3cEJwiqubexwWLqDvixOdwJ/g+fUt6CuXy6hUfggqci2ls2A6vTKZ5rnNXSysbiG7kkd2OY+l9R3M5Taqp7GL+AU1kd8S931D/gAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Single Sign-on Datasheet\"\n        title=\"LoginRadius Single Sign-on Datasheet\"\n        src=\"/static/41cc8ea16144a85f22b499da107c16bf/e5715/DS-LoginRadius-Single-Sign-on-1-1024x310.png\"\n        srcset=\"/static/41cc8ea16144a85f22b499da107c16bf/a6d36/DS-LoginRadius-Single-Sign-on-1-1024x310.png 650w,\n/static/41cc8ea16144a85f22b499da107c16bf/e5715/DS-LoginRadius-Single-Sign-on-1-1024x310.png 768w,\n/static/41cc8ea16144a85f22b499da107c16bf/2bef9/DS-LoginRadius-Single-Sign-on-1-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"benefits-for-business\" style=\"position:relative;\"><a href=\"#benefits-for-business\" aria-label=\"benefits for business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits for Business</h3>\n<h4 id=\"1-improves-conversions-and-revenue\" style=\"position:relative;\"><a href=\"#1-improves-conversions-and-revenue\" aria-label=\"1 improves conversions and revenue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Improves conversions and revenue</h4>\n<p>Customers can access all domains and services with a single active session.</p>\n<h4 id=\"2-mitigates-risk\" style=\"position:relative;\"><a href=\"#2-mitigates-risk\" aria-label=\"2 mitigates risk permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Mitigates risk</h4>\n<p>Accessing third-party sites (user passwords are not stored or managed externally) becomes risk-free.</p>\n<h4 id=\"3-unifies-customer-profiles\" style=\"position:relative;\"><a href=\"#3-unifies-customer-profiles\" aria-label=\"3 unifies customer profiles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Unifies customer profiles</h4>\n<p>Creating a single instance of the customer data provides a centralized view of the <a href=\"https://www.loginradius.com/customer-profiling\">customer across all channels.</a></p>\n<h4 id=\"4-reduces-it-costs\" style=\"position:relative;\"><a href=\"#4-reduces-it-costs\" aria-label=\"4 reduces it costs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Reduces IT costs</h4>\n<p>Due to fewer help desk calls about passwords, IT can spend less time helping users to remember or reset their passwords for hundreds of applications.</p>\n<h2 id=\"what-are-the-different-types-of-single-sign-on\" style=\"position:relative;\"><a href=\"#what-are-the-different-types-of-single-sign-on\" aria-label=\"what are the different types of single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Different Types of Single Sign-On?</h2>\n<p>Single sign-on (SSO) is not a one-size-fits-all solution, and there are several different types of SSO that organizations can choose from. The most common types of SSO include:</p>\n<ul>\n<li><strong>Web SSO:</strong> This type of SSO allows users to access multiple web-based applications and services with a single set of credentials. When a user logs in to one of the web-based applications, they are automatically logged in to all of the other applications that they are authorized to access.</li>\n<li><strong>Enterprise SSO:</strong> Enterprise SSO is designed for organizations that use a mix of web-based and non-web-based applications. This type of SSO typically involves the use of a desktop client or browser extension that manages the user's credentials and automates the login process.</li>\n<li><strong>Mobile SSO:</strong> Mobile SSO allows users to access mobile applications with a single set of credentials. This type of SSO is becoming increasingly popular as more organizations adopt mobile-first strategies.</li>\n</ul>\n<h2 id=\"how-is-single-sign-on-implemented\" style=\"position:relative;\"><a href=\"#how-is-single-sign-on-implemented\" aria-label=\"how is single sign on implemented permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Single Sign-On Implemented?</h2>\n<p>Implementing single sign-on (SSO) requires careful planning and coordination between the identity provider and the service providers. The first step in implementing SSO is to choose an identity provider that supports the necessary protocols, such as SAML, OAuth, or OpenID Connect. </p>\n<p>Once the identity provider has been selected, the service providers must be configured to accept SSO requests from the identity provider. This typically involves configuring the service providers to trust the identity provider and to use the appropriate SSO protocol. </p>\n<p>The identity provider must also be configured to authenticate users and provide the necessary credentials to the service providers. Finally, the SSO system must be tested to ensure that it is working properly and that users are able to access the resources that they are <a href=\"https://www.loginradius.com/blog/identity/loginradius-m2m-authorization-data-access/\">authorized to access</a>.</p>\n<h2 id=\"how-to-choose-a-secure-sso-solution\" style=\"position:relative;\"><a href=\"#how-to-choose-a-secure-sso-solution\" aria-label=\"how to choose a secure sso solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Choose a Secure SSO Solution?</h2>\n<p>Your SSO solution must meet the basic needs to support IT needs. That means a stable solution and a highly functional one. Today, digital transformation relies on a platform for <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Customer</a> <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\"></a> <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Identity and Access Management</a> (CIAM), which includes SSO and other tools. So, here what you need to keep in mind while narrowing down your SSO solution. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius secure sso solution\"\n        title=\"Loginradius secure sso solution\"\n        src=\"/static/355754f63678ee3d681fff576bd4e865/212bf/Loginradius-secure-sso-solution.jpg\"\n        srcset=\"/static/355754f63678ee3d681fff576bd4e865/6aca1/Loginradius-secure-sso-solution.jpg 650w,\n/static/355754f63678ee3d681fff576bd4e865/212bf/Loginradius-secure-sso-solution.jpg 768w,\n/static/355754f63678ee3d681fff576bd4e865/72e01/Loginradius-secure-sso-solution.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"7-key-points-to-consider-while-choosing-a-secure-single-sign-on-solution\" style=\"position:relative;\"><a href=\"#7-key-points-to-consider-while-choosing-a-secure-single-sign-on-solution\" aria-label=\"7 key points to consider while choosing a secure single sign on solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Key Points to Consider While Choosing a Secure Single Sign-On Solution</h2>\n<h3 id=\"1-support-for-developers\" style=\"position:relative;\"><a href=\"#1-support-for-developers\" aria-label=\"1 support for developers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Support for Developers</h3>\n<p>Make sure your SSO solution provides adequate life-cycle management API support and SDKs for major platforms. </p>\n<h3 id=\"2-authentication\" style=\"position:relative;\"><a href=\"#2-authentication\" aria-label=\"2 authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Authentication</h3>\n<p>What about the extra layer of security? Find out if it supports MFA, adaptive authentication, automatic forced authentication, and more. </p>\n<h3 id=\"3-federation\" style=\"position:relative;\"><a href=\"#3-federation\" aria-label=\"3 federation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Federation</h3>\n<p>Find out if you will be allowed to use any corporate identity provider you prefer. Make sure it supports Microsoft Active Directory, Google Directory, etc. </p>\n<h3 id=\"4-mobile-phones-ready\" style=\"position:relative;\"><a href=\"#4-mobile-phones-ready\" aria-label=\"4 mobile phones ready permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Mobile phones ready</h3>\n<p>Ensure that your identity platform supports SSO for mobile devices and syncs well with various multi-factor authentication tools. </p>\n<h3 id=\"5-flexible-rules-governing-passwords\" style=\"position:relative;\"><a href=\"#5-flexible-rules-governing-passwords\" aria-label=\"5 flexible rules governing passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Flexible rules governing passwords</h3>\n<p>It should support password validation requirements like customizable password expiration limit, password complexity, and expiration notifications. </p>\n<h3 id=\"6-safety-reputation\" style=\"position:relative;\"><a href=\"#6-safety-reputation\" aria-label=\"6 safety reputation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Safety reputation</h3>\n<p>Check out if it meets security standards like ISO 27017, ISO 27018, ISO 27001, SOC 2 Type 2, and global compliances like the <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">GDPR and CCPA</a>, etc.</p>\n<h3 id=\"7-behavioral-analytics\" style=\"position:relative;\"><a href=\"#7-behavioral-analytics\" aria-label=\"7 behavioral analytics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Behavioral analytics</h3>\n<p>Find out if it allows you to blacklist or whitelist IPs, set responses to counter brute force attempts and there are provisions for re-authentication.</p>\n<h2 id=\"how-loginradius-single-sign-on-authentication-works\" style=\"position:relative;\"><a href=\"#how-loginradius-single-sign-on-authentication-works\" aria-label=\"how loginradius single sign on authentication works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Single Sign-On Authentication Works?</h2>\n<p>Since now you know what is an sso login, let’s understand how LoginRadius SSO is superior. Single sign on (SSO) can be implemented in several ways, but typically follows a standard or protocol, as well as several technologies which can enforce the standards/protocols listed below.</p>\n<h3 id=\"1-web-sso\" style=\"position:relative;\"><a href=\"#1-web-sso\" aria-label=\"1 web sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Web SSO</h3>\n<p>Web single sign-on enables your customers to access any of your connected web properties with a single identity. As customers navigate from one site to the next, your systems will be able to recognize who they are on each site.</p>\n<p><a href=\"https://www.loginradius.com/docs/single-sign-on/web-and-mobile-sso/loginradius-web-sso/\">Web Single Sign-On</a> also is known as LoginRadius Single Sign-On, is a browser-based session management system that uses browser storage mechanisms (sessionStorage, localStorage, Cookies) to hold the user session across your assets.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 28.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABC0lEQVQY03WRwU+DMBjF9/9fjVfdzejNeDCeXGKMcRpnIjMzQ5m4IQwcyErLoPTZfoVETHzJC7wefq/f10HJC5RCwEg2CrW2+SplbaXIXSzrBnkpwXbW5l/oM6OBP3tE4E7xn1IhkYgG28qCK6kw8nLsjyMMJzEOtfduQ1x63xYY+S5C/xWm4Oo9x8FkjQs3o8ZAU7yswiLcwF3FWG5rXVDjbsVw7HzhdLYhHz0ldEbAt/E5PpxrCvOEE3S65jSuuV2gIX7K8ZlxREWNopJ4CBhONPDsJSUb+H0HXD7fIF44v3bVF+1UAe2KKI/0eN3Iw78jF4xBCE6h0bfq3H+Utq7N5tF2sunZFBn9AG6px3zVEN4TAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius-web-sso\"\n        title=\"Loginradius-web-sso\"\n        src=\"/static/f284649388e18d83a9e0344429bb3160/e5715/web-sso-1-1024x294.png\"\n        srcset=\"/static/f284649388e18d83a9e0344429bb3160/a6d36/web-sso-1-1024x294.png 650w,\n/static/f284649388e18d83a9e0344429bb3160/e5715/web-sso-1-1024x294.png 768w,\n/static/f284649388e18d83a9e0344429bb3160/2bef9/web-sso-1-1024x294.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>This storage is stored on a centralized domain managed by LoginRadius and can be accessed via our JavaScript Single Sign-On APIs, or directly through a JSONP call. This session is integrated seamlessly into our standard Customer Identity and Access Management scripts.</p>\n<h3 id=\"2-mobile-sso\" style=\"position:relative;\"><a href=\"#2-mobile-sso\" aria-label=\"2 mobile sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Mobile SSO</h3>\n<p>Mobile single sign-on is like web SSO, except that customers can use a single identity to access connected mobile apps.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 24.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAFCAYAAABFA8wzAAAACXBIWXMAAAsTAAALEwEAmpwYAAABAElEQVQY021Qy04CQRDk773rQU8e8OBBj0YTDmiygPERo0ZC1gWXIC66LMK+YOfRU/bORGOilVSmerpT3anGJOhjUxZwMPiGMU4Tv5LMT79WOn6GHp5Dh11H1jR7shONl/seynRhC0XENNakhtCEKJf4KBQWa8VLCKkEqqEH1duDvD1wZK38ljP0b9pIojEyBRw+zrHlRTgLVqgUIVwKTFKFYBrDnyYIVwL8BTnqsMkumzUdfxuOusfIkzcQF6XQyCqNtSR7ZSEI73zdLBOYF8L2Piu+/PUO+uEIqn/iyFqPL53h4KqFfBn/yfB/cJ51FMEFpLcNeb3v2NmBGpzaiS82snbsHYnkRgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius-mobile-sso\"\n        title=\"Loginradius-mobile-sso\"\n        src=\"/static/4e5451c0e88b2b757f0dd0066d7fd9ff/e5715/mobile-sso-1-1024x247.png\"\n        srcset=\"/static/4e5451c0e88b2b757f0dd0066d7fd9ff/a6d36/mobile-sso-1-1024x247.png 650w,\n/static/4e5451c0e88b2b757f0dd0066d7fd9ff/e5715/mobile-sso-1-1024x247.png 768w,\n/static/4e5451c0e88b2b757f0dd0066d7fd9ff/2bef9/mobile-sso-1-1024x247.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><a href=\"https://www.loginradius.com/docs/single-sign-on/web-and-mobile-sso/loginradius-mobile-sso/\">Mobile SSO enables</a> you to unify a user session across multiple apps that are serviced by a single account LoginRadius. It works by storing the LoginRadius access token in a shared session, either shared Android preferences or iOS keychain, which allows you to recognize a currently active session and access current user data sessions to configure your user account with each linked program.</p>\n<h3 id=\"3-federated-sso\" style=\"position:relative;\"><a href=\"#3-federated-sso\" aria-label=\"3 federated sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Federated SSO</h3>\n<p>Federated single sign-on <a href=\"https://datafloq.com/read/what-is-federated-sso-is-it-different-from-sso/2700\">works a little differently</a> than the web and mobile SSO. Rather than connecting websites or mobile apps, you use the login credentials held by partners. This happens by using industry-standard SSO protocols, which allow customers to gain access to web properties without authentication barriers.</p>\n<p>LoginRadius also acts as an IdP that stores and authenticates the identities used by end-users to log in to customer systems, applications, file servers, and more depending on their configuration.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 95.07692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAATCAYAAACQjC21AAAACXBIWXMAAAsTAAALEwEAmpwYAAACTklEQVQ4y41US47UMBDNERA3QFyCPQsuxYJLgIQQLFkgjoHQsGHRMDCAGKC7J93pOM7PSew4zqPsfHDP9HRTUsmVcn1elasSYKS+7wceZWMMuq5zp/3u3PfIo873myjYCzYGJAEJz7CJGCLGEac5wjjBjmSWZmA8dTb9Nd+9gPCUtTao287eOIR+Fe6e7hptPF0/n8EMfXTijcbnRGLBJEQ7OD1fMLz4xJysuh7LUuNX0UJ2w70ZnfsJoaKLLc/BK4lcGeSlQCZqMuzx+N0V7jxd4O6zBZ68Dx2StBDOJpcdSqVR1Aqt8UquqISvP//giheoqFLOOXhWOIOHb77j/qsvuPfyHI/e/nA620uecGSUfJsJXFGv67EFwVA/GVWtK7FQHRLVg0njkJ+FAg9efyO+wMeowla0VK7GUnS4zCT1skNEus5/FFvaKmscUkvrQiGiBBNlVFomtZM1lWYDWbZB7OMsyXfvlQWhOlvRmJQSPtlEu1pDtRotIYlJ9mfOUlhIfFjnM5hgyGpwmQgKrOdAlmz2sNLUswQx9SykBqv5ZQebkpBbXz09ypTQ0FYcmv6S0EsaFctVa3BjEXpDvnoe9ODfUO4Pr6/LCcU0k8fI+txYvX2EPTQdqy3DhqVOtpsjqhqFqBxbuZEKWns9vC2bWz067MBnxFbTao3NjiGMYqw3Oycz2vu6kccD+mUntI6sHseGeh3Tz2HiNKdlqJt5548jHAP+TmvH/93DYyVbOo9KXOzEgRfuD/++TpUsVev4tinwKTgV7NRIXae/WqLITK5OFH4AAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius-Identity-Provider\"\n        title=\"LoginRadius-Identity-Provider\"\n        src=\"/static/b453710ee2d356c72095abd9879b9d86/e5715/LoginRadius-as-an-Identity-Provider-1024x974.png\"\n        srcset=\"/static/b453710ee2d356c72095abd9879b9d86/a6d36/LoginRadius-as-an-Identity-Provider-1024x974.png 650w,\n/static/b453710ee2d356c72095abd9879b9d86/e5715/LoginRadius-as-an-Identity-Provider-1024x974.png 768w,\n/static/b453710ee2d356c72095abd9879b9d86/2bef9/LoginRadius-as-an-Identity-Provider-1024x974.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius serves as a software provider providing end-user services. LoginRadius does not authenticate users but instead requests third-party Identity Provider authentication. LoginRadius relies on the identity provider to verify a user's identity and, if necessary, to verify other user attributes that the identity provider manages.</p>\n<h4 id=\"saml\" style=\"position:relative;\"><a href=\"#saml\" aria-label=\"saml permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SAML</h4>\n<p>Security Assertion Markup Language (SAML) is an open standard enabling identity providers (IdP) to pass credentials for authorization to service providers. In simple terms, it means that you can log into several different websites using one set of credentials.</p>\n<p><a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/saml/overview/\">LoginRadius supports both SAML 1.1 and SAML 2.0</a> flows to support LoginRadius either as an IDP or as a Service Provider (SP). LoginRadius supports SAML flows, both initiated by IDP and initiated by SP. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 40.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius SAML\"\n        title=\"Loginradius SAML\"\n        src=\"/static/4d5a5dc896b12ea7d4b2fb409e32bfe1/e5715/SAML-1024x418.png\"\n        srcset=\"/static/4d5a5dc896b12ea7d4b2fb409e32bfe1/a6d36/SAML-1024x418.png 650w,\n/static/4d5a5dc896b12ea7d4b2fb409e32bfe1/e5715/SAML-1024x418.png 768w,\n/static/4d5a5dc896b12ea7d4b2fb409e32bfe1/2bef9/SAML-1024x418.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The LoginRadius Admin Console allows the SAML settings to be entirely self-service, allowing you to configure statements, keys, and endpoints to suit any SAML provider.</p>\n<h4 id=\"jwt\" style=\"position:relative;\"><a href=\"#jwt\" aria-label=\"jwt permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>JWT</h4>\n<p>JSON Web Token (JWT) is a commonly used Single Sign-On protocol widely used in B2C applications and included in RFC 7519. This protocol helps you to create an encrypted token that is encoded in JSON. In LoginRadius, this can either be created via API or directly requested through the responses to the Login and Social Login interface.</p>\n<p>This token is then transferred and consumed on to the third-party service provider. The data to be collected can be mapped to the <a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/jwt-login/jwt-login-overview/\">LoginRadius Admin Console</a>. You can also configure the token's encryption method based on the service provider's specifications, which will consume the token.</p>\n<h4 id=\"oauth\" style=\"position:relative;\"><a href=\"#oauth\" aria-label=\"oauth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OAuth</h4>\n<p>OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can securely enable authenticated access to their assets without actually sharing the initial, related, single login credential. This is known as safe, third party, user-agent, delegated authorization in authentication parlance.</p>\n<p>LoginRadius may either function as an OAuth 2.0 Identity Provider or as a Service Provider delegating the authentication process to an IDP supporting the OAuth Project. The specifications for OAuth 2.0 are protected in RFC 6749.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 44.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAJCAYAAAAywQxIAAAACXBIWXMAAAsTAAALEwEAmpwYAAABfklEQVQoz42SzUrDQBSF8zDdWAXR/lupWhXcdOPCdaFPoSjoogsfQlAUCgVBly606hO4EdwIQmtKG9NMMtMmTX+Oc6dG2kLRCx+TO5l75s6Z0RJbOYTT25iLpBHfzCGZP0Aqv49oNoflZAbR1SxikmhaklpDdGcP6cIh4rsFxFbWsZjIILQQQWh+CeHEBrSm8YWaXke19inR8VHVoTcM1BtN0D+zZcFibAwbLZvDsh20LEvB5Bxhmi1otGA6DMOA4zjwPA+dTkfhui7aP9+e56q83+9P1DmcQ6MdLq5KOC6e4uikiLPzS/R6PTDbhu1wBaNumCM34RBCqI1I0Pd9DIdDDAYDNdI6KchwX3lCqXyN8vUNHh6f0e12wbgAa7uwhESO76aAL+epcDwoD+ZseSqNfJmOUQejLgjKg66om2mhCcFG01C+0FECgqJZEYiN8yt4e1dRiRBt1QGJ/yU4K8hv7eX1TZrbBedciSrTpVd0MWS67/f+gT+6SPlivgE4kImvEGDPDAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius OAuth\"\n        title=\"Loginradius OAuth\"\n        src=\"/static/da792cd3fec7cb4d316a031f72ed4630/e5715/Loginradius-OAuth-1024x452.png\"\n        srcset=\"/static/da792cd3fec7cb4d316a031f72ed4630/a6d36/Loginradius-OAuth-1024x452.png 650w,\n/static/da792cd3fec7cb4d316a031f72ed4630/e5715/Loginradius-OAuth-1024x452.png 768w,\n/static/da792cd3fec7cb4d316a031f72ed4630/2bef9/Loginradius-OAuth-1024x452.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Such specs cover the various specifications and <a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/oauth-2-0/oauth-2-0-overview/\">structured processes OAuth embraces</a>. From the authorization of the service provider requesting authentication to the request for authorization from the end-user to the generation of the access token used to request the scoped data from the IDP after authentication.</p>\n<h4 id=\"openid-connect\" style=\"position:relative;\"><a href=\"#openid-connect\" aria-label=\"openid connect permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OpenID Connect</h4>\n<p>OpenID Connect or (OIDC) is an authentication layer standardized by the OpenID Foundation atop the OAuth 2.0 framework. By following the specifications defined in the OpenID Connect specs, LoginRadius provides a way to integrate your <a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/openid-connect/openid-connect-overview/\">OpenID Connect client with our API</a>. These specs cover the various specifications and structured processes adopted by OpenID Link.</p>\n<h4 id=\"multipass\" style=\"position:relative;\"><a href=\"#multipass\" aria-label=\"multipass permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multipass</h4>\n<p>Multipass is one of the most simple forms of authentication with SSO. <a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/multipass/\">Multipass is done</a> through the generation of an authenticated JSON hash of the values to be sent to the service provider.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Deciding the best implementation method really depends on your individual situation, technical architecture, and business needs. \nIf you think a <a href=\"https://www.loginradius.com/single-sign-on/\">readymade SSO solution</a> is best for your company, a customer identity provider like LoginRadius will help you achieve fast and easy implementation.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is an example of SSO?</strong></p>\n<p>When we talk about what is an SSO login, the best example of SSO login is Google’s implementation of SSO in its products. For instance, if you’re logged in to Gmail, you automatically gain access to all other products of Google like YouTube, Google Drive, Google Photos, etc.</p>\n<p><strong>2. What is the difference between single sign-on (SSO) and social login?</strong></p>\n<p>SSO offers <a href=\"https://www.loginradius.com/single-sign-on/\">seamless authentication </a>with one credential across multiple connected platforms or systems. On the other hand, social login allows users to access services by authenticating themselves using their social account credentials.</p>\n<p><strong>3. What are the benefits and business advantages of single sign-on (SSO)?</strong></p>\n<p>Businesses can leverage SSO to deliver a seamless user experience at every touchpoint. Moreover, SSO can help online platforms derive more conversions and growth.</p>\n<p><strong>4. What is the difference between SSO and federation?</strong></p>\n<p>The main difference between Identity <a href=\"https://www.loginradius.com/blog/identity/federated-identity-management-vs-sso/\">Federation and SSO</a> lies in the range of access. SSO allows users to use a single set of credentials to access multiple systems within a single organization (a single domain). On the other hand, Federation lets users access systems across federated organizations.</p>\n<p><strong>5. How can I get SSO for my OTT platform?</strong></p>\n<p>What is sso integration and how can i get it for my OTT platform? SSO integration can be done through a cloud-based CIAM solution like LoginRadius. The cutting-edge CIAM helps OTT platforms to deliver a seamless user experience across multiple touchpoints. <a href=\"https://www.loginradius.com/blog/identity/how-ciam-helps-ott-platforms-scale-million-viewers/\">Read more.</a></p>\n<p><strong>6. What is the Single Sign-On (SSO) protocol?</strong></p>\n<p>SSO protocol enables users to access multiple applications with a single set of login credentials using standards like SAML, OAuth, or OpenID Connect.</p>\n<p><strong>7. What are three benefits of Single Sign-On (SSO)?</strong></p>\n<p>Enhanced security, improved user experience, and increased productivity.</p>\n<p><strong>8. What is the difference between Same Sign-On and Single Sign-On?</strong></p>\n<p>Same Sign-On is not a standard term; Single Sign-On (SSO) allows users to log in once and access multiple applications securely.</p>\n<p><strong>9. What is the purpose of Single Sign-On (SSO)?</strong></p>\n<p>Simplify authentication for users and enhance security by allowing access to multiple applications with one login.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-demo\"\n        title=\"Book-a-demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 30, 2019","updated_date":null,"description":"SSO is an essential feature of an Identity and Access Management (IAM) access control platform. User identity authentication is important when it comes to understanding which permissions a user will have. One example of controlling access that integrates user identity management solutions with SSO solutions is the LoginRadius Identity platform.","title":"What is Single Sign-On (SSO) and How it Works?","tags":["sso","identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/a9ebd13642b2b5d88097a552e6facf0e/33aa5/what-is-sso.jpg","srcSet":"/static/a9ebd13642b2b5d88097a552e6facf0e/f836f/what-is-sso.jpg 200w,\n/static/a9ebd13642b2b5d88097a552e6facf0e/2244e/what-is-sso.jpg 400w,\n/static/a9ebd13642b2b5d88097a552e6facf0e/33aa5/what-is-sso.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Every day, societies are becoming more digitized. Instead of speaking to a colleague, you’ll chat online. To hail a cab, just tap your phone…","fields":{"slug":"/identity/ccpa-introduction/"},"html":"<p>Every day, societies are becoming more digitized. Instead of speaking to a colleague, you’ll chat online. To hail a cab, just tap your phone screen. Need a doctor? There’s an app for that, too. All of this online activity gives businesses valuable consumer data (e.g., name, age, email addresses).</p>\n<p>However, starting January 01, 2020, the way you collect, store, and share this data may land you in trouble. If you’re unsure how the <strong>California Consumer Privacy Act (CCPA)</strong> will impact your company, keep reading. This introduction to CCPA compliance focuses on the most common questions that businesses have today.</p>\n<p>For more detailed information, including the major differences between GDPR and CCPA, <a href=\"https://www.loginradius.com/blog/identity/2019/09/ccpa-vs-gdpr-the-compliance-war/\">check out our infographic</a>.</p>\n<p>For now, let’s start with the basics.</p>\n<h2 id=\"what-is-the-california-consumer-privacy-act\" style=\"position:relative;\"><a href=\"#what-is-the-california-consumer-privacy-act\" aria-label=\"what is the california consumer privacy act permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What is the California Consumer Privacy Act?</strong></h2>\n<p>The CCPA’s goal is to give consumers more information and control over how their personal information is being used. It will apply to all businesses that handle or collect data from California residents.</p>\n<p>What is residency based on? Basically, anyone who pays taxes to the State of California is a California consumer, whether they currently live in the Golden State or not<em>.</em> This California <a href=\"https://www.palmspringstaxandtrustlawyers.com/the-part-time-resident-tax-trap/\">residency law site</a> explains more:</p>\n<p><em>“Under California law, a person who visits the state for other than a temporary or transitory purpose is also a legal resident, subject to California taxation. Even visits can result in residency status. Examples of such visits include an indefinite stay for health reasons, extended stays (usually over six months), retirement, or employment that requires a prolonged or indefinite period to accomplish.”</em></p>\n<h2 id=\"how-do-you-comply-with-the-california-consumer-privacy-act\" style=\"position:relative;\"><a href=\"#how-do-you-comply-with-the-california-consumer-privacy-act\" aria-label=\"how do you comply with the california consumer privacy act permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How do you comply with the California Consumer Privacy Act?</strong></h2>\n<p>Preparing for compliance can feel overwhelming. In fact, in a recent survey of American companies, nearly half had not begun implementing privacy policies (<a href=\"https://www.trustarc.com/\">TrustArc</a>, 2019).</p>\n<p>However, here are three ways you can get started now.</p>\n<p><strong>Ensure that your decision-makers and key stakeholders know:</strong></p>\n<ul>\n<li>What the CCPA is and who it concerns.</li>\n<li>When it goes into effect: January 1st, 2020.</li>\n<li>How CCPA rules affect your business practices.</li>\n</ul>\n<p><strong>Document and organize customer information, so your company knows:</strong></p>\n<ul>\n<li>Which personal information is being collected.</li>\n<li>How personal information is being collected.</li>\n<li>Where personal information is being stored.</li>\n<li>Why personal information is being collected.</li>\n<li>Where personal information is being shared.</li>\n</ul>\n<p>This will help you set up an efficient system for information retrieval should a customer or auditor request that info. Enlisting a Data Protection Officer or a Data Protection Team to handle these requests is a good idea.</p>\n<p><strong>Review and update your privacy policies.</strong></p>\n<p>A GDPR Privacy Policy will meet CalOPPA/CCPA requirements, but a CalOPPA/CCPA policy might <em>not</em> be GDPR-compliant. To be safe, be sure that your CCPA privacy policy is clearly defined and easily distinguishable from <a href=\"https://www.loginradius.com/gdpr-and-privacy/\">GDPR regulations</a>.</p>\n<p>It’s also helpful to train your customer-facing employees on how privacy policies and CCPA compliance can <a href=\"https://www.loginradius.com/customer-trust/\">improve customer trust</a> and increase engagement.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ccpa and customer identity\"\n        title=\"ccpa and customer identity\"\n        src=\"/static/277eebfdb42ba7a9547788e0c4bc7ae6/e5715/ccpa-and-customer-identity.png\"\n        srcset=\"/static/277eebfdb42ba7a9547788e0c4bc7ae6/a6d36/ccpa-and-customer-identity.png 650w,\n/static/277eebfdb42ba7a9547788e0c4bc7ae6/e5715/ccpa-and-customer-identity.png 768w,\n/static/277eebfdb42ba7a9547788e0c4bc7ae6/63ff0/ccpa-and-customer-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"ccpa-20-what-you-need-to-know-about-the-new-cpra\" style=\"position:relative;\"><a href=\"#ccpa-20-what-you-need-to-know-about-the-new-cpra\" aria-label=\"ccpa 20 what you need to know about the new cpra permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>CCPA 2.0: What You Need to Know About the New CPRA</strong></h2>\n<p>On November 3, 2020, the voters in California approved the Consumer Privacy Rights Act (on the ballot as <a href=\"https://ballotpedia.org/California_Proposition_24,_Consumer_Personal_Information_Law_and_Agency_Initiative_(2020)#California_Consumer_Privacy_Act_.28AB_375.29\">Proposition 24</a>) with 56.1% of the vote. This revised version of the CCPA will further strengthen the consumer privacy rights for California citizens. </p>\n<p>We are thrilled to announce the passage of <a href=\"https://twitter.com/hashtag/Prop24?src=hash&#x26;ref_src=twsrc%5Etfw\">#Prop24</a>, the California Privacy Rights Act, with a decisive majority of Californians supporting the measure to strengthen consumer privacy rights. #California once again makes history and leads the nation!</p>\n<p>— Yes on Prop 24 — <a href=\"https://twitter.com/caprivacyorg/status/1323998270369099776?ref_src=twsrc%5Etfw\">Californians for Consumer Privacy</a> (@caprivacyorg) November 4, 2020_</p>\n<p>While some of the changes took effect immediately, the law would become effective on January 1, 2023 with the majority of the enforcement set for July 1 of that year. </p>\n<h3 id=\"ccpa-20-key-aspects-of-the-new-cpra\" style=\"position:relative;\"><a href=\"#ccpa-20-key-aspects-of-the-new-cpra\" aria-label=\"ccpa 20 key aspects of the new cpra permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CCPA 2.0: Key Aspects of the New CPRA</h3>\n<p>Most significant new additions include: </p>\n<ul>\n<li><strong>New type of personal information</strong>: CPRA categorises a new kind of personal data - “sensitive personal information” that subsets elements like financial account number, social security number, and driver license number. The new law also includes (without limitation), a consumer’s racial or ethnic origin, religious beliefs, union membership, the content of email and text messages, consumers sex life and sexual orientation, and genetic information.</li>\n<li><strong>New consumer rights</strong>: California consumers will have the right to request to limit the use and disclosure of personal information. Consumers also will have the right to ask businesses to correct any inaccurate detail maintained by the business.</li>\n<li><strong>Changes to the Notice at Collection</strong>: Businesses will have to provide consumers a notice at collection. For example, the notice should come with a retention period for each category of  information, both personal and sensitive.</li>\n<li><strong>Adds a data security requirement</strong>: Businesses will have to implement security procedures and practices to protect consumer data from unauthorized access, destruction, use, modification, or disclosure. </li>\n<li><strong>Extension of the employee personal information and B2B exemptions</strong>: CPRA extends the exemption for employee personal information and “B2B” personal information until January 1, 2023. </li>\n<li><strong>Protection for children’s data</strong>: CPRA will impose fines on businesses for collecting and selling information of minors under 16 years. </li>\n<li><strong>Adds data retention requirement</strong>: Businesses cannot retain consumers' personal or sensitive information for longer than reasonably necessary. </li>\n</ul>\n<h3 id=\"ccpa-20-key-differences-with-the-ccpa\" style=\"position:relative;\"><a href=\"#ccpa-20-key-differences-with-the-ccpa\" aria-label=\"ccpa 20 key differences with the ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CCPA 2.0: Key Differences with the CCPA</h3>\n<table>\n  <tr>\n   <td><strong>Parameter</strong>\n   </td>\n   <td><strong>CCPA</strong>\n   </td>\n   <td><strong>CPRA</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>Consumer Rights\n   </td>\n   <td>\n<ul>\n<li>Right to Know/Access \n<li>Right to Delete \n<li>Right to Opt-out of Sale \n<li>Right to Non-Discrimination\n</li>\n</ul>\n   </td>\n   <td>All rights defined under the CCPA, plus: \n<ul>\n<li>Right to Rectification \n<li>Right to Limit Use and Disclosure of Sensitive Personal Information \n</li>\n</ul>\n   </td>\n  </tr>\n  <tr>\n   <td>Employee and B2B Exemption\n   </td>\n   <td>Expires on Jan 1, 2021 \n   </td>\n   <td>Expires on Jan 1, 2023\n   </td>\n  </tr>\n  <tr>\n   <td>Personal Information\n   </td>\n   <td>Information that identifies, relates to, describes, or could reasonably be linked, directly or indirectly, with a consumer or household. \n   </td>\n   <td>Personal information, as well as “Sensitive Personal Information” which includes SSN, driver license numbers, biometric information, precise geolocation, and racial and ethnic origin etc. \n   </td>\n  </tr>\n  <tr>\n   <td>Threshold Application\n   </td>\n   <td>It applies to businesses that collect personal information from California's consumers and meet any of the following:\n<ul>\n<li>A gross annual revenue of over $25 million.\n<li>Buy, receive, or sell the personal information of 50,000 or more California consumers, households, or devices.\n<li>Derive 50% or more of their annual revenue from selling California consumers’ personal information.\n</li>\n</ul>\n   </td>\n   <td>It applies to businesses that collect personal information from California's consumers and meet any of the following:\n<ul>\n<li>A gross annual revenue of over $25 million.\n<li>Buy, receive, or sell the personal information of 100,000 or more California consumers, households, or devices.\n<li>Derive 50% or more of their annual revenue from selling or sharing California consumers’ personal information. \n</li>\n</ul>\n   </td>\n  </tr>\n  <tr>\n   <td>Enforcement\n   </td>\n   <td>\n<ul>\n<li>The Attorney General can pursue violations.\n<li>Consumers have a private right of action for a breach. \n<li>Businesses will have a 30–day cure period before imposing fine.\n</li>\n</ul>\n   </td>\n   <td>\n<ul>\n<li>Consumers have a private right of action for a breach.\n<li>Businesses will be fined immediately with no cure period. \n</li>\n</ul>\n   </td>\n  </tr>\n  <tr>\n   <td>Use Limitation \n   </td>\n   <td>N/A \n   </td>\n   <td>Collection, retention, and use should be limited to what is necessary to provide goods or service. \n   </td>\n  </tr>\n</table>\n<h2 id=\"how-businesses-should-prepare-for-the-new-cpra\" style=\"position:relative;\"><a href=\"#how-businesses-should-prepare-for-the-new-cpra\" aria-label=\"how businesses should prepare for the new cpra permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Businesses Should Prepare for the New CPRA</strong></h2>\n<p>The good news for companies is that the implementation of the CPRA will not begin until July 2023. So, organizations have some time to plan out their new data policies.</p>\n<p><strong>Step up data deletion policies</strong></p>\n<p>Under CPRA, businesses will have to delete personal data after it has served its purpose. So, here's what you can do.</p>\n<p>Put an identity and access management (IAM) system in place to connect all personal data under centralized user profiles. With a single repository of consumer data, you can simplify compliance and abide more easily by the primary aspects of CPRA. They may include deleting personal data, making corrections, and offering reports to consumers upon request.</p>\n<p><strong>Implement MFA for logins</strong></p>\n<p>One way to improve the security of login credentials is by implementing multi-factor authentication (MFA). It puts a bar on automatic account access and enforces additional authentication layers such as a fingerprint or a one-time code in the event of an unusual login.</p>\n<p>It is a simple effort to prevent broken authentication attacks, such as credential stuffing, in which exposed login credentials become the gateway for identity thieves. </p>\n<h2 id=\"how-does-loginradius-handle-consent-withdrawal\" style=\"position:relative;\"><a href=\"#how-does-loginradius-handle-consent-withdrawal\" aria-label=\"how does loginradius handle consent withdrawal permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How does LoginRadius handle consent withdrawal?</strong></h2>\n<p>With the CCPA, your organization needs to prepare for consent withdrawal. The LoginRadius Identity Platform centralizes all your customers’ personal information. You can document and manage your <a href=\"https://www.loginradius.com/\">customers’ consent</a> including withdrawal.</p>\n<p>Another core component of the CCPA is providing data access to auditors or customers, should they request it. With the LoginRadius Identity Platform, customer data is unified into one profile for easy access. You can also export it in an easy-to-read format.</p>\n<p>Last but not least, LoginRadius provides <a href=\"https://www.loginradius.com/security/\">top-notch security</a> that monitors and protects your customer data. For example, our CIAM software can encourage your customers to use intelligent passwords, protect the data against brute force attacks from hackers, block access to suspicious IPs, and more.</p>\n<h3 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Summary</strong></h3>\n<p>Following the old CCPA rules will <em>not automatically</em> lead to CCPA 2.0 compliance; don’t wait to be sued to find out. Let LoginRadius help your business become globally compliant. Not only does our technology meet the new CPRA regulations, but we continuously update it to meet new international privacy laws.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book a demo loginradius\"\n        title=\"book a demo loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 03, 2019","updated_date":null,"description":"On November 3, 2020, the voters in California approved the Consumer Privacy Rights Act (on the ballot as Proposition 24) with 56.1% of the vote. This revised version of the CCPA will further strengthen the consumer privacy rights for California citizens.","title":"California's CCPA 2.0 Passed: Everything You Need to Know About the New CPRA","tags":["ccpa","data privacy","compliance","customer trust"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.150537634408602,"src":"/static/6e185d6a87b7773ea2ca9a79de8d9527/c3e3a/ccpa-intro.jpg","srcSet":"/static/6e185d6a87b7773ea2ca9a79de8d9527/f836f/ccpa-intro.jpg 200w,\n/static/6e185d6a87b7773ea2ca9a79de8d9527/2244e/ccpa-intro.jpg 400w,\n/static/6e185d6a87b7773ea2ca9a79de8d9527/c3e3a/ccpa-intro.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The conventional employee identity and access management (IAM) systems were initially designed to manage employee identities. And they aren…","fields":{"slug":"/identity/iam-vs-ciam/"},"html":"<p>The conventional employee identity and access management (IAM) systems were initially designed to manage employee identities. And they aren’t potent enough to cater to customers' diverse needs pertaining to user experience and security. </p>\n<p>Apart from this, employee IAM also doesn’t help when the needs of consumers are growing with every passing year, and internal identity management systems are not built to keep up.</p>\n<p>Users now expect a seamless and secure customer experience across multiple platforms, devices, and touchpoints. And the conventional IAM will always struggle to meet these requirements. </p>\n<p><a href=\"https://blog.loginradius.com/identity/customer-identity-and-access-management/\">Customer Identity and Access Management</a> (CIAM) solutions help to improve the customer experience, reduce security risks, shrink costs, and increase the availability of applications.</p>\n<p>CIAM solutions are becoming more commonly used in organizations today because they provide several benefits. For example, a customer identity and access management (CIAM) solution can improve the customer experience by increasing the flexibility and customization of applications. </p>\n<p>CIAM solutions can also reduce security risks by allowing users to access only those applications they need for their work tasks. </p>\n<p>Finally, these solutions can be very cost-effective because they allow companies to scale their technology needs by providing an easy way to manage all users with one set of tools.</p>\n<p>This is where customer IAM solutions come in. These solutions have been built to handle customer <a href=\"https://www.loginradius.com/authentication/\">authentication requirements</a>, scalability, privacy and data regulations, user experience, and integration.</p>\n<p>Compared to employee IAM, a customer identity and access management (CIAM) solution improves the customer experience, reduces security risks, shrinks costs, and increases the availability of applications.</p>\n<p>In this infographic, we compare the following features of both an IAM and CIAM solution:</p>\n<ul>\n<li>Functional Difference</li>\n<li>Authentication</li>\n<li>Authentication Methods</li>\n<li>User Experience</li>\n<li>Performance </li>\n<li>Security</li>\n<li>Privacy &#x26; Data Regulation</li>\n<li>Platform Scalability</li>\n<li>Real-Life Examples</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 369.2307692307692%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"employee-iam-vs-ciam\"\n        title=\"employee-iam-vs-ciam\"\n        src=\"/static/4c1ca15260cbb83bff6ff97caa5d7617/e5715/employee-iam-vs-ciam.png\"\n        srcset=\"/static/4c1ca15260cbb83bff6ff97caa5d7617/a6d36/employee-iam-vs-ciam.png 650w,\n/static/4c1ca15260cbb83bff6ff97caa5d7617/e5715/employee-iam-vs-ciam.png 768w,\n/static/4c1ca15260cbb83bff6ff97caa5d7617/b2c3d/employee-iam-vs-ciam.png 2584w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 21, 2019","updated_date":null,"description":"In order to serve customers, conventional identity management is no longer enough. This truly ought to go without saying. After all, internal management systems were initially designed to handle employee identities, and consumer preferences are not generally matched with their preferences of a successful user experience.","title":"IAM vs. CIAM: Which Solution is Right For You?","tags":["iam","ciam","identity management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/33f5de275c064ffdda7e9e501bd74fa7/0756a/IAM-vs-CIAM-V01.01-01-1.png","srcSet":"/static/33f5de275c064ffdda7e9e501bd74fa7/69585/IAM-vs-CIAM-V01.01-01-1.png 200w,\n/static/33f5de275c064ffdda7e9e501bd74fa7/497c6/IAM-vs-CIAM-V01.01-01-1.png 400w,\n/static/33f5de275c064ffdda7e9e501bd74fa7/0756a/IAM-vs-CIAM-V01.01-01-1.png 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"What is JWT? What is OAuth2? JWT(Json Web Token) is a token format. It is digitally-signed, self-contained, and compact. It provides a…","fields":{"slug":"/engineering/using-jwt-with-oauth2-when-and-why/"},"html":"<h2 id=\"what-is-jwt-what-is-oauth2\" style=\"position:relative;\"><a href=\"#what-is-jwt-what-is-oauth2\" aria-label=\"what is jwt what is oauth2 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is JWT? What is OAuth2?</h2>\n<p>JWT(Json Web Token) is a token format. It is digitally-signed, self-contained, and compact. It provides a convenient mechanism for transferring data. JWT is not inherently secure, but the use of JWT can ensure the authenticity of the message so long as the signature is verified and the integrity of the payload can be guaranteed. JWT is often used for stateless authentication in simple use cases involving non-complex systems.</p>\n<p>OAuth2 is an authorization protocol that builds upon the original OAuth protocol created in 2006, arising out of a need for authorization flows serving different kinds of applications from web and mobile apps to IoT. OAuth2 specifies the flows and standards under which authorization token exchanges should occur. OAuth2 does not encompass authentication, only authorization. For more information on OAuth2, please see <a href=\"https://tools.ietf.org/html/rfc6749\">IETF</a></p>\n<h2 id=\"using-jwt-with-oauth2\" style=\"position:relative;\"><a href=\"#using-jwt-with-oauth2\" aria-label=\"using jwt with oauth2 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Using JWT with OAuth2</h2>\n<p>JWT and OAuth2 are entirely different and serve different purposes, but they are compatible and can be used together. The OAuth2 protocol does not specify the format of the tokens, therefore JWTs can be incorporated into the usage of OAuth2.</p>\n<p>For example, the access_token returned from the OAuth2 Authorization Server could be a JWT carrying additional information in the payload. This could potentially increase performance by reducing round trips for the required information between the Resource Server and the Authorization Server. This is a good use case for incorporating JWT into OAuth2 implementations when transparent tokens are acceptable - there are scenarios requiring token opacity where this is not optimal.</p>\n<p>Another common way to use JWT in conjunction with OAuth2 is to issue two tokens: a reference token as access_token, and a JWT containing identity information in addition to that access token. In use cases where this implementation seems necessary, it is probably worth looking into OpenID Connect - an extension built upon OAuth2 and provides additional standardizations, including having an access_token and an id_token.</p>\n<p>A common misconception is that using JWT with OAuth2 increases the security of an application, this is not true. As mentioned earlier, JWT is not an inherently secure mechanism, and the security of OAuth2 is upheld through the definitions of the actors involved in the authorization process and the specific steps to be taken for this process in different use cases. Security concerns regarding OAuth2 are best addressed by choosing the appropriate OAuth2 grant flow for the application based on use case, not the token format.</p>\n<p>The advantages of using JWT in addition to OAuth2 is in increased performance and decreased process complexity when it comes to certain flows; however, this may increase development complexity. When deciding whether to use JWT on top of OAuth2, it is best to begin by considering whether the performance gain is meaningful to your application, and whether that is worth the additional work required for development.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 11, 2019","updated_date":null,"description":"Learn how to use JWT with OAuth and when & why","title":"How to Use JWT with OAuth","tags":["JWT","Oauth","JSON Web Token"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/d14806f1306c0379a98cfb3b3feceac2/14b42/photo-1454165804606-c3d57bc86b40.jpg","srcSet":"/static/d14806f1306c0379a98cfb3b3feceac2/f836f/photo-1454165804606-c3d57bc86b40.jpg 200w,\n/static/d14806f1306c0379a98cfb3b3feceac2/2244e/photo-1454165804606-c3d57bc86b40.jpg 400w,\n/static/d14806f1306c0379a98cfb3b3feceac2/14b42/photo-1454165804606-c3d57bc86b40.jpg 800w,\n/static/d14806f1306c0379a98cfb3b3feceac2/47498/photo-1454165804606-c3d57bc86b40.jpg 1200w,\n/static/d14806f1306c0379a98cfb3b3feceac2/724e2/photo-1454165804606-c3d57bc86b40.jpg 1350w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Ti Zhang","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":840,"currentPage":141,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}