{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/62","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"There has never been a better time to enter the banking industry. Modern technologies have made banking a simple and entertaining experience…","fields":{"slug":"/growth/multi-factor-authentication-ivr-banking/"},"html":"<p>There has never been a better time to enter the banking industry. Modern technologies have made banking a simple and entertaining experience. However, the competition has grown tougher. Customers have an increased appetite for engaging digital products that seamlessly fit into their daily lives. </p>\n<p>But this also means not neglecting the cyber security threat that customers are constantly vulnerable to. Multi-factor authentication is one solution to keep the trust of their customers intact. Adding IVR into the mix can further help the banking industry deal with the new technical challenges they face on the digital front. </p>\n<h2 id=\"understanding-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#understanding-multi-factor-authentication\" aria-label=\"understanding multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding Multi-Factor Authentication</h2>\n<p><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-factor authentication (MFA)</a> is gaining huge popularity globally after banks and other financial institutes started implementing it to prevent cyber frauds. </p>\n<p>MFA provides a second level of credentials after a user logs in successfully with their credentials. This second-level validation requires either a one-time password or a soft token or a hard token. It increases the security of the users' data. If the token is lost, the user can still access their accounts by generating a new one. </p>\n<p>Based on this fact, the chances of theft reduce to a great extent if MFA is employed for user authentication.</p>\n<h2 id=\"understanding-interactive-voice-response\" style=\"position:relative;\"><a href=\"#understanding-interactive-voice-response\" aria-label=\"understanding interactive voice response permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding Interactive Voice Response</h2>\n<p>Interactive Voice Response (IVR) is a type of call management system that enables your business to receive calls through different channels such as online, email, or fax and offers services in real-time. </p>\n<p>As traditional phone systems are losing their importance in today’s world of smartphones and the internet, more and more banks look forward to an <a href=\"https://getvoip.com/ivr-systems/\">IVR</a> system for its convenience and effectiveness in conducting communication.</p>\n<h2 id=\"the-role-of-multi-factor-authentication-and-ivr-in-the-banking-industry\" style=\"position:relative;\"><a href=\"#the-role-of-multi-factor-authentication-and-ivr-in-the-banking-industry\" aria-label=\"the role of multi factor authentication and ivr in the banking industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Multi-Factor Authentication and IVR in the Banking Industry</h2>\n<p>When it comes to providing a secure environment for your customers you can’t leave anything to chance. There are a number of very important technologies that, when used properly, will help ensure that your customers’ data is not at risk. Some of these technologies include multi-factor authentication and an Interactive Voice Response (IVR) system. </p>\n<p>The following will give you a detailed insight into the different roles of MFA and IVR systems.</p>\n<h3 id=\"1-provides-strong-authentication\" style=\"position:relative;\"><a href=\"#1-provides-strong-authentication\" aria-label=\"1 provides strong authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Provides strong authentication</h3>\n<p>A constant threat to credential harvesting has led to the adoption of <strong>multi-factor authentication</strong>, providing an extra layer of security to its users. A weak or stolen password can have consequences on the organization and customer's trust. Thus, using multiple weighted factors can prevent hackers' access to confidential data. These factors could be, using passwords and phone to log into an account.</p>\n<h3 id=\"2-calculates-the-risk-vector\" style=\"position:relative;\"><a href=\"#2-calculates-the-risk-vector\" aria-label=\"2 calculates the risk vector permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Calculates the risk vector</h3>\n<p>With the introduction of work-from-home arrangements, the workplace of different users varies. Thus to cater to the needs of more complex requests, <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">adaptive multi-factor authentication</a> is here. </p>\n<p>Adaptive Authentication is a method to send notifications or prompt the consumers to complete an additional step(s) to verify their identities when the authentication request is deemed malicious according to your organization's security policy.</p>\n<p>For example, a user wants to access a company's data. He is sitting in a coffee shop and operating via an unsecured WiFi, then MFA would ask for additional verification data to ensure a secured network. </p>\n<p><a href=\"https://www.loginradius.com/resource/an-enterprises-guide-to-risk-based-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-to-RBA\"\n        title=\"GD-to-RBA\"\n        src=\"/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png\"\n        srcset=\"/static/d57f9c65049003fa8427fb6d0893f180/a6d36/GD-to-RBA.png 650w,\n/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png 768w,\n/static/d57f9c65049003fa8427fb6d0893f180/81501/GD-to-RBA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-enhances-user-experience\" style=\"position:relative;\"><a href=\"#3-enhances-user-experience\" aria-label=\"3 enhances user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Enhances user experience</h3>\n<p>Being able to log in anywhere with the same password is convenient. However, by doing so you could be locking yourself out of your accounts if you forget them. With multi-factor authentication, you don’t have to worry about forgetting your password until it’s too late. There are ways to combine security with convenience to protect your data at all costs, enhancing user experience in the process. </p>\n<h3 id=\"4-eliminates-customer-friction\" style=\"position:relative;\"><a href=\"#4-eliminates-customer-friction\" aria-label=\"4 eliminates customer friction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Eliminates customer friction</h3>\n<p>Attending thousands of queries manually in a day is not easy. Moreover, it's a lengthy process and leads to customers' disappointment. IVR software helps a bank save time from small queries keeping agents free to deal with a more complex one. This highly efficient system is a boon for the banking industry. Further, it allows a bank hassle-free resolution of the problems of its customers.</p>\n<p>For example, if a customer wants to know about the procedure to open a bank account, he can get the related information by clicking on telephonic numbers. </p>\n<h3 id=\"5-sends-immediate-fraud-notification\" style=\"position:relative;\"><a href=\"#5-sends-immediate-fraud-notification\" aria-label=\"5 sends immediate fraud notification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Sends immediate fraud notification</h3>\n<p>On detection of any <a href=\"https://www.loginradius.com/blog/fuel/good-transaction-security/\">fraudulent transaction</a>, a notification is sent immediately to the concerned customer. However, a message is sufficient to inform the customer about fraudulent activity. But an IVR enables the customer to directly have a conversation with the bank's agent and take necessary steps.</p>\n<h3 id=\"6-easy-registration-of-an-immediate-report\" style=\"position:relative;\"><a href=\"#6-easy-registration-of-an-immediate-report\" aria-label=\"6 easy registration of an immediate report permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Easy registration of an immediate report</h3>\n<p>In case of a lost, damaged, or stolen card, the user can immediately report via IVR. There is no need to call the customer care number and wait for an agent. With a simple click, you can register your problem or block the card in your preferred language.</p>\n<h3 id=\"7-surveys\" style=\"position:relative;\"><a href=\"#7-surveys\" aria-label=\"7 surveys permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Surveys</h3>\n<p>IVR is an excellent way of conducting surveys and collecting necessary data for further improvement in different policies. Moreover, bank authorities can keep an eye on their employees by asking their customers about their experience in interaction with the company's agent.</p>\n<p>The use of technology in various ways has been a great factor in accelerating the growth of many sectors. These have resulted in the enhancement of product quality, improvement of delivery time, and reduction in costs. The banking sector is one sector that utilizes technology to add value to both its members and other commercial businesses. </p>\n<p>Customers must feel and be sure that the bank's employees only can access their accounts and personal data. First-and second-factor authentication is now being replaced by newer technologies, specifically multi-factor authentication. This greater level of protection is gaining popularity in the wake of the growing threat of information theft and <a href=\"https://www.loginradius.com/blog/identity/identity-theft-frauds/\">identity theft</a> due to cyber-attacks.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 21, 2021","updated_date":null,"description":"One of the greatest adoptions in the banking industry is the introduction of multi-factor authentication (MFA) and Interactive Voice Response (IVR) systems. Both of them are considered effective ways that help banks to reduce fraud. This blog explains their individual roles in banking.","title":"Decoding the Role of Multi-Factor Authentication and IVR in Banking","tags":["mfa","adaptive mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7391304347826086,"src":"/static/ae5b8ad2038f13e62e5c37c41ec1f357/14b42/ivr-cover.jpg","srcSet":"/static/ae5b8ad2038f13e62e5c37c41ec1f357/f836f/ivr-cover.jpg 200w,\n/static/ae5b8ad2038f13e62e5c37c41ec1f357/2244e/ivr-cover.jpg 400w,\n/static/ae5b8ad2038f13e62e5c37c41ec1f357/14b42/ivr-cover.jpg 800w,\n/static/ae5b8ad2038f13e62e5c37c41ec1f357/16310/ivr-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"In the coming years, cybercrime will continue to grow. Between 2023 and 2028, the global 'Estimated Cost of Cybercrime' indicator in the…","fields":{"slug":"/identity/cybersecurity-best-practices-for-enterprises/"},"html":"<p>In the coming years, cybercrime will continue to grow. Between 2023 and 2028, the global 'Estimated Cost of Cybercrime' indicator in the cybersecurity market was anticipated to rise consistently, reaching a total of <a href=\"https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide\">5.7 trillion U.S. dollars</a>, marking a significant increase of 69.94 percent.</p>\n<p>Businesses of all sizes will continue facing new threats on a daily basis—phishing scams and malware being the most common ones. Both can be devastating to unprotected companies. To help you avoid becoming another cybercrime statistic, we’ve created this infographic with our top cybersecurity best practices.</p>\n<p>In 2020, when a large chunk of the world population shifted to work from home models, cybercriminals also transitioned to remote operations. In fact, a report also suggested that remote working accounted for <a href=\"https://resources.malwarebytes.com/files/2020/08/Malwarebytes_EnduringFromHome_Report_FINAL.pdf\">20% of cybersecurity incidents</a> that occurred during the pandemic. </p>\n<p>2021 and 2022 were no different. Remember when Taiwanese computer giant Acer was hit by a REvil ransomware attack in March this year? The hackers demanded a <a href=\"https://constellix.com/news/acer-responds-to-being-hit-by-50m-ransomware-attack\">whopping $50 million</a>. They shared images of stolen files as proof of breaching Acer’s security and the consequent data leak.</p>\n<p>Not only was the same gang responsible for the 2020 ransomware strike on Travelex, they reportedly extorted more than $100 million in one year from large businesses.</p>\n<p>These are wake-up calls, and it is high time organizations must <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">understand cyber threats</a> and do everything possible to prevent data breaches.</p>\n<p>Here are some cybersecurity best practices this infographic will cover.</p>\n<h3 id=\"use-tougher-security-questions\" style=\"position:relative;\"><a href=\"#use-tougher-security-questions\" aria-label=\"use tougher security questions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Use tougher security questions.</h3>\n<p>Security questions prevent imposters from infiltrating the verification process. So what does <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">a good security question</a> look like? </p>\n<p>The best ones will make it easy for legitimate users to authenticate themselves. They should be: </p>\n<ul>\n<li>Safe: Hackers shouldn’t be able to guess or research it.</li>\n<li>Stable: The answer shouldn’t change over time.</li>\n<li>Memorable: The user should be able to remember it.</li>\n<li>Simple: The password should be precise, easy, and consistent.</li>\n<li>Many: The password should have many possible answers.</li>\n</ul>\n<h3 id=\"enable-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#enable-multi-factor-authentication-mfa\" aria-label=\"enable multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable multi-factor authentication (MFA).</h3>\n<p>Multi-factor authentication is a powerful feature to prevent unauthorized users from accessing sensitive data. </p>\n<p>For the most secure user sign-ins, you should use a combination of elements like biometrics, SMS/text messages, emails, and security questions. Use <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">extra layers of protection</a>, like text verification, email verification, or time-based security codes.</p>\n<p>For example, you can allow an employee to log in on a managed device from your corporate network. But if a user is logging in from an unknown network on an unmanaged device, ask them to crack an additional layer of security. </p>\n<h3 id=\"create-a-strong-password-policy\" style=\"position:relative;\"><a href=\"#create-a-strong-password-policy\" aria-label=\"create a strong password policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a strong password policy.</h3>\n<p>To protect your organization's network, enforce a strong password security policy with the following practices:</p>\n<ul>\n<li><strong>Longer passwords</strong>: The minimum length should be 15 characters, more if possible.</li>\n<li><strong>Mix characters</strong>: The password should be a combination of uppercase and lowercase letters, numbers, and symbols. The more complex your password is, the harder will it be for brute force attackers. </li>\n<li><strong>Do not allow dictionary words</strong>: Do not use everyday dictionary words or even a combination of words. For example, \"chocolate\" is a bad password, so is \"dark chocolate\". Go for a passphrase instead. They are a string of related words with no sentence structure. Here is an example: hotdog food ketchup relish mustard mayo. </li>\n<li><strong>Don’t use memorable keyboard paths</strong>: Do not use sequential keyboard paths like qwerty, a1s2d3f4, or asdfgh. </li>\n<li><strong>Change passwords regularly</strong>: Change passwords at a regular interval. It can be once every month or twice a month. </li>\n<li><strong>Use a password manager</strong>: Password managers can auto-generate and store strong passwords on your behalf. They save your passwords in an encrypted, centralized location, and allow you to access them with a master password. </li>\n</ul>\n<h3 id=\"embrace-cybersecurity-training\" style=\"position:relative;\"><a href=\"#embrace-cybersecurity-training\" aria-label=\"embrace cybersecurity training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Embrace cybersecurity training.</h3>\n<p>Conduct cybersecurity awareness workshops to train your employees at regular intervals. It will help reduce cyberattacks caused by human error and employee negligence to a great extent. </p>\n<h3 id=\"create-data-backups\" style=\"position:relative;\"><a href=\"#create-data-backups\" aria-label=\"create data backups permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create data backups.</h3>\n<p>A data backup solution is one of the best measures to keep personal and business data secure from a ransomware attack. Ransomware is malicious software that is accidentally deployed by an employee by clicking on a malicious link. And deployed, all data in the site is taken hostage. </p>\n<p>You can ensure the protection of your data by implementing continuous backups. You can use the cloud to create a copy of your data on a server and hosts it in a remote location. In case, your system is hacked, you can restore back your data. </p>\n<p>Aside from login security tips, this infographic will also highlight:</p>\n<ul>\n<li>A few fascinating facts about cybercrime.</li>\n<li>The hidden costs of cybercrime.</li>\n<li>The intensity of damage predictions.  </li>\n<li>A cybercriminal’s ROI</li>\n<li>A few eye-opening statistics </li>\n</ul>\n<p>To learn more about the cybersecurity best practices for your business in 2023 and beyond, check out the infographic created by LoginRadius.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 605.076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cybersecurity-infographic-2023\"\n        title=\"cybersecurity-infographic-2023\"\n        src=\"/static/e9e0e9c6620d5adeecaf4f19466b2049/e5715/cybersecurity-infographic2023.png\"\n        srcset=\"/static/e9e0e9c6620d5adeecaf4f19466b2049/a6d36/cybersecurity-infographic2023.png 650w,\n/static/e9e0e9c6620d5adeecaf4f19466b2049/e5715/cybersecurity-infographic2023.png 768w,\n/static/e9e0e9c6620d5adeecaf4f19466b2049/7a4b2/cybersecurity-infographic2023.png 1240w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Get the best cybersecurity solutions for your enterprise with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 21, 2021","updated_date":null,"description":"Today cybercriminals are increasingly able to cover their tracks, hide in the cloud, manipulate the infrastructure of the web, and exploit complex vulnerabilities. This infographic summarizes the key takeaway into the cybersecurity best practices that businesses should adopt in 2023.","title":"Cybersecurity Best Practices for Businesses in 2023 & Beyond [Infographic]","tags":["cybersecurity","data security","cx","password management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0458360a0639a9e862b116364adca46e/33aa5/cybersecurity-best-practices.jpg","srcSet":"/static/0458360a0639a9e862b116364adca46e/f836f/cybersecurity-best-practices.jpg 200w,\n/static/0458360a0639a9e862b116364adca46e/2244e/cybersecurity-best-practices.jpg 400w,\n/static/0458360a0639a9e862b116364adca46e/33aa5/cybersecurity-best-practices.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Bootstrap is an open-source tool collection for creating responsive web pages and web apps. It is the combination of HTML, CSS…","fields":{"slug":"/engineering/guest-post/bootstrap4-vs-bootstrap5/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Bootstrap is an open-source tool collection for creating responsive web pages and web apps. It is the combination of HTML, CSS, and JavaScript framework that makes it easy to develop responsive, mobile-first websites. It mainly aims to resolve the cross-browser compatibility issue. Bootstrap is at the core of every website that is perfect for all screen sizes and looks perfect in every modern browser.</p>\n<h2 id=\"getting-started-with-bootstrap\" style=\"position:relative;\"><a href=\"#getting-started-with-bootstrap\" aria-label=\"getting started with bootstrap permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Getting Started with Bootstrap</h2>\n<p>In order to start using Bootstrap in your web pages, you need to add a few CSS and JS tags in your template file.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk12\">CSS</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">tag</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">rel</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;stylesheet&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">href</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">integrity</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;sha384-Gn5384xqQ1aoWXA+058RXPxPg6fy4IWvTNh0E263XmFcJlSAwiGgFAW/dAiS6JXm&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">crossorigin</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;anonymous&quot;</span><span class=\"mtk17\">&gt;</span></span></code></pre>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk12\">JS</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Link</span><span class=\"mtk1\"> </span><span class=\"mtk12\">tag</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">script</span><span class=\"mtk1\"> </span><span class=\"mtk12\">src</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://code.jquery.com/jquery-3.2.1.slim.min.js&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">integrity</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;sha384-KJ3o2DKtIkvYIK3UENzmM7KCkRr/rE9/Qpg6aAZGJwFDMVNA/GpGFF93hXpG5KkN&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">crossorigin</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;anonymous&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">script</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">script</span><span class=\"mtk1\"> </span><span class=\"mtk12\">src</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">integrity</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;sha384-ApNbgh9B+Y1QKtv3Rn7W3mgPxhU9K/ScQsAP7hUibX39j7fakFPskvXusvfa0b4Q&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">crossorigin</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;anonymous&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">script</span><span class=\"mtk17\">&gt;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">script</span><span class=\"mtk1\"> </span><span class=\"mtk12\">src</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">integrity</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;sha384-JZR6Spejh4U02d8jOt6vLEHfe/JQGiRRSQQxSfFWpi1MquVdAyjUar5+76PVCmYl&quot;</span><span class=\"mtk1\"> </span><span class=\"mtk12\">crossorigin</span><span class=\"mtk1\">=</span><span class=\"mtk8\">&quot;anonymous&quot;</span><span class=\"mtk17\">&gt;&lt;/</span><span class=\"mtk4\">script</span><span class=\"mtk17\">&gt;</span></span></code></pre>\n<blockquote>\n<p><strong>NOTE:</strong>  Always add the <code>jquery</code> script first, followed by the <code>popper</code> and <code>bootstrap</code> scripts. Then you can add any of your custom scripts below them.</p>\n</blockquote>\n<h2 id=\"bootstrap-versions\" style=\"position:relative;\"><a href=\"#bootstrap-versions\" aria-label=\"bootstrap versions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bootstrap Versions</h2>\n<p>The developers have been working continuously to enrich the developer experience of using Bootstrap for customizing the web pages quite easily. They've released many minor and major versions. But the major releases that are the most popular are the <code>Bootstrap v4.x</code> and <code>Bootstrap v5.x</code>. Let's look at what all v4.x offered and how those things evolved in the v5.x release with additional features.</p>\n<h3 id=\"bootstrap-v4x\" style=\"position:relative;\"><a href=\"#bootstrap-v4x\" aria-label=\"bootstrap v4x permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bootstrap v4.x</h3>\n<p>Bootstrap 4 was launched back in January 2018, and it was a great improvement over the existing previous versions. However, the most loved features included the following.</p>\n<ul>\n<li>\n<h4 id=\"flexbox-grid\" style=\"position:relative;\"><a href=\"#flexbox-grid\" aria-label=\"flexbox grid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Flexbox Grid</strong></h4>\n<p>Flexbox grids gave the power to web developers to align the columns with ease. Now, you could position the columns at any part of the view simply by using classes like <code>justify-content-center</code> or <code>align-items-end</code>, and so on. You can also change the direction of rows which makes the vertical layouts much easier to implement and maintains responsiveness at the same time.</p>\n</li>\n<li>\n<h4 id=\"grid-tiers\" style=\"position:relative;\"><a href=\"#grid-tiers\" aria-label=\"grid tiers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Grid Tiers</strong></h4>\n<p>Bootstrap 3 had only four tiers, but Bootstrap 4 has provided improvements by providing new device-width to enhance the support from phablets to smaller devices. The new grid tiers specified the following device widths.</p>\n<ul>\n<li><strong>sm</strong>: 576px and up</li>\n<li><strong>md</strong>: 768px and up</li>\n<li><strong>lg</strong>: 992px and up</li>\n<li><strong>xl</strong>: 1200px and up</li>\n</ul>\n</li>\n<li>\n<h4 id=\"syntactically-awesome-style-sheets-sass\" style=\"position:relative;\"><a href=\"#syntactically-awesome-style-sheets-sass\" aria-label=\"syntactically awesome style sheets sass permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Syntactically Awesome Style Sheets (Sass)</strong></h4>\n<p>Bootstrap 4 added the support for Sass, which is a widely-used and very popular CSS preprocessor. A Sass style sheet offers better control and customization and enables defining how you exactly want to use Bootstrap.</p>\n</li>\n<li>\n<h4 id=\"cards\" style=\"position:relative;\"><a href=\"#cards\" aria-label=\"cards permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Cards</strong></h4>\n<p>You no longer need to design multiple elements and combine them to provide a card view to the users. With the introduction of Cards component, you can directly use this component and further customize it using newly available bootstrap classes to redefine the look and feel of card structures, like profile cards or information tiles. Card component also doesn't have a fixed width and dissolves into the container it is placed into.</p>\n</li>\n<li>\n<h4 id=\"spacing-utilities\" style=\"position:relative;\"><a href=\"#spacing-utilities\" aria-label=\"spacing utilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Spacing Utilities</strong></h4>\n<p>Spacing utilities make your life easier by providing ready-made utility margin and padding classes that you can simply apply to each visual component. The margin classes are like <code>mt-2</code> or <code>mx-2</code>, and the padding classes are like <code>pt-2</code> or <code>px-2</code>, where <strong>m</strong> stands for margin, <strong>p</strong> stands for padding, the <strong>t</strong> for top or <strong>x</strong> for both left and right side, and the number says the amount you need.</p>\n</li>\n</ul>\n<h3 id=\"bootstrap-v5x\" style=\"position:relative;\"><a href=\"#bootstrap-v5x\" aria-label=\"bootstrap v5x permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bootstrap v5.x</h3>\n<p>   Bootstrap 5 came into play back in May 2021. This release was launched after several iterations of alpha and beta releases and hence had a stack of major additions and new features. Some of the most talked about features are listed below.</p>\n<ul>\n<li>\n<h4 id=\"enhanced-grid-system\" style=\"position:relative;\"><a href=\"#enhanced-grid-system\" aria-label=\"enhanced grid system permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Enhanced Grid System</strong></h4>\n</li>\n<li>\n<h4 id=\"enhanced-form-elements\" style=\"position:relative;\"><a href=\"#enhanced-form-elements\" aria-label=\"enhanced form elements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Enhanced Form elements</strong></h4>\n</li>\n<li>\n<h4 id=\"utilities-api\" style=\"position:relative;\"><a href=\"#utilities-api\" aria-label=\"utilities api permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Utilities API</strong></h4>\n</li>\n<li>\n<h4 id=\"support-for-ie\" style=\"position:relative;\"><a href=\"#support-for-ie\" aria-label=\"support for ie permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Support for IE</strong></h4>\n</li>\n<li>\n<h4 id=\"extended-colors\" style=\"position:relative;\"><a href=\"#extended-colors\" aria-label=\"extended colors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Extended Colors</strong></h4>\n</li>\n<li>\n<h4 id=\"bootstrap-icons\" style=\"position:relative;\"><a href=\"#bootstrap-icons\" aria-label=\"bootstrap icons permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Bootstrap Icons</strong></h4>\n</li>\n</ul>\n<p>   Let's dive into its features by comparing how things changed in Bootstrap 5 and understanding what better design perspectives it offers for developers.</p>\n<h2 id=\"bootstrap-5-vs-bootstrap-4\" style=\"position:relative;\"><a href=\"#bootstrap-5-vs-bootstrap-4\" aria-label=\"bootstrap 5 vs bootstrap 4 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bootstrap 5 vs. Bootstrap 4</h2>\n<p>The above section talked about the features of both Bootstrap 4 and Bootstrap 5. This section talks about the upgrades that Bootstrap 5 provides over Bootstrap 4.</p>\n<h3 id=\"enhanced-grid-system-1\" style=\"position:relative;\"><a href=\"#enhanced-grid-system-1\" aria-label=\"enhanced grid system 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Grid System</h3>\n<p>The grid system is retained in Bootstrap 5. However, an extra grid tier <code>xxl</code> has been introduced to minimize the effort in making the pages responsive on higher resolution displays.</p>\n<p>Columns don't have a default <code>relative</code> position in Bootstrap 5.</p>\n<p>Classes have been added to address <code>vertical spacing</code>.</p>\n<h3 id=\"enhanced-form-elements-1\" style=\"position:relative;\"><a href=\"#enhanced-form-elements-1\" aria-label=\"enhanced form elements 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Form Elements</h3>\n<p>The form elements in Bootstrap 4 have defaulted to the browser-provided view. However, in Bootstrap 5, the form elements have a custom design that enables them to have a consistent look and feel in all browsers.</p>\n<p>The new form controls are based on completely semantic, standard form controls. This helps developers to avoid adding extra markups for form controls.</p>\n<h3 id=\"utilities-api-1\" style=\"position:relative;\"><a href=\"#utilities-api-1\" aria-label=\"utilities api 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Utilities API</h3>\n<p>Unlike Bootstrap 4, Bootstrap 5 enables the developers to modify and create their own utilities.</p>\n<p>You can simply use <code>sass</code> to create your own utilities.</p>\n<p>You can use the <code>state</code> option to generate dummy class variations like <code>hover</code> and <code>focus</code>.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">$utilities: (</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk8\">&quot;opacity&quot;</span><span class=\"mtk1\">: (</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">property</span><span class=\"mtk1\">: </span><span class=\"mtk12\">opacity</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">class</span><span class=\"mtk1\">: </span><span class=\"mtk12\">opacity</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">state</span><span class=\"mtk1\">: </span><span class=\"mtk12\">hover</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">values</span><span class=\"mtk1\">: (</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk7\">0</span><span class=\"mtk1\">: </span><span class=\"mtk7\">0</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk7\">25</span><span class=\"mtk1\">: </span><span class=\"mtk7\">.25</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk7\">50</span><span class=\"mtk1\">: </span><span class=\"mtk7\">.5</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk7\">75</span><span class=\"mtk1\">: </span><span class=\"mtk7\">.75</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk7\">100</span><span class=\"mtk1\">: </span><span class=\"mtk7\">1</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    )</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  )</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">);</span></span></code></pre>\n<h3 id=\"support-for-ie-1\" style=\"position:relative;\"><a href=\"#support-for-ie-1\" aria-label=\"support for ie 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Support for IE</h3>\n<p>Bootstrap 5 no longer supports Internet Explorer 10 and 11 like its predecessor, Bootstrap 4.</p>\n<h3 id=\"extended-colors-1\" style=\"position:relative;\"><a href=\"#extended-colors-1\" aria-label=\"extended colors 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Extended Colors</h3>\n<p>Bootstrap 4 had limited color options. But Bootstrap 5 has included many new color options to its color palette, enabling you to choose from the various shades available. You can find some of the color shades below.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 668px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 91.53846153846155%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAASCAYAAABb0P4QAAAACXBIWXMAAA7DAAAOwwHHb6hkAAAE+0lEQVQ4yx2SeVTNeRjGf8YwtrFvWYtzsoVQmqKUbBNCCHWKEim7TqbtJoPQHGslc7UbRWWIEBKthKQsdZVtSNxO2+1271Xd+5mf/vic5/v95znv8z6vEFegY/kZLSujtCyJ0OIo1bEsSkdWmY5Lu9VEOKsId2zhpIOK06tVxHtrKH/UxLmgF8Tue8UZ31KkgS+J2FPK/dRPCD6pWgb5tNNnRzuCi5ZeW1vovbOV6CwdoabN7BmnwL27gjVCPRv7yQkwUpOb9g3fxbkELCvA3fguW2bdwWt2FgkHyxEuPtHhEgtbk3RsTBCJVYnaRr5MR7pEwzkPNbGeP1RJlFs9lyWtVD5TkHionAtHKjgfKiP+YBnRwWU8vFmDIG9so6SygdK3jVRUa/hQB5XfoFkDX6qUVBTXUlVWz8fXzcjfQe1HLWplG+8qvvFeJudtRQ1fPymRf1KjqP+O8KpaS2qRivRnaq4/b+fmCx3XSnV8Eo3LszUUpil4nK6k+LqakoxWXt9vp75Gw9P71RT/4MEXygpqeZ5Ty+fKZoSCylbCrtcRnllPVLaamAKIytHypgYeJim4cuwrN8Ll3I5q5L60jaJLbXx938KtpHIyk2Wivibnyn88SPvMm5IGhIzSdnb804J/qhL/tO8EXdWx97KWYjHe7eNKEn0bSA5o4GKggkv+Gm4ea+WDGD/l9CvSIspJCX/J1bOVpJ6qpOSBHCG5qJ2V4QrcopW4xbXikfijJC0FMkj1a+IvxxrCXeViIY1I3VSi6XexlCakwcVEh5R0kBj6mmjJSwozviBEZrdiLKnD5nAd1mEq5p3QMStM3GWJliQvNSccNESsUXNyhYoDlkrOumh4mV/PIY9cjmzOJ3RTDse3P+Ww2xPuXPiIcPhWO3o+KibvUzNBPInxwVpGB7RzuUhLpH0Leyc1IzFpJnB6M7vHKDg6X82zrDoCV+UiccwneE0eIU4P8bXLE6O/RQgUd9Zrhw79AB0D9ujosU1Lpy1aEnJ0HLVQ4qWnYNdoBVtFdf25CX8jFY8yajsM/JYW4m9fiM+CPNynZZEUJkPwT5bT1VnGMK8q+rq/odd6GT85VZBwrwGJuQyngWW4D3+B6+AyHLo+Y+cUGXnXPuJhlYzn3JQOPKwusmpiHDGhjxACEqvo5pDNKPd8+q3NofvKBwj294jPrMbXogCHQbdxGpWF49C7LOh8g81G+WRfleFsEYmr1Vk2WP+Nk3kkC8eEEfVnljih9DFdbWMYvvICfe3i6Sa+BSspcdcq8DJPZV5/KUuGxbBo8DnMOp1i3aQkbl8uYck0CctNQ1hhtp/FxkGY6W3nWFAawt7TdxCmBzNg7hF6zDrIL+YHOv5xV4pxMYnEtKcEywH7Me+9j8nCHyyfcJKMlEJmG27CZpIXcyZswWqcJxP7rSXUL16c8Hga3ad6YmDrS19Tb7oYbUIw3EBMSg7rLA5gOsgbq9G7mDnYGwPBiYXj/bh6KRvzcWuwNHLG2tgVk7GrGNF9DsE+pxH2hEQi9DXjV0M7Oo+wQRhiidBnJtLEa9hOWc8gwQKDnvMY2c2GnsJ0TA1Wc/F8OsP7GKM/0JSxQ35jVP8ZdBFGsts7WLzDE9GMnW6Hqe06xpvZo2+8CL0Jc0lOu4mz/TYsJi/HesZqzI2WYTjEisVzNpD+byazTX7H2nxpB2bG89EfOpWQoKP8D0eAxqU+ueIrAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Bootstrap 5 Color\"\n        title=\"Bootstrap 5 Color\"\n        src=\"/static/4b5ffdd71eeb7f85b97b02e4af17a88b/74866/colors.png\"\n        srcset=\"/static/4b5ffdd71eeb7f85b97b02e4af17a88b/a6d36/colors.png 650w,\n/static/4b5ffdd71eeb7f85b97b02e4af17a88b/74866/colors.png 668w\"\n        sizes=\"(max-width: 668px) 100vw, 668px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"bootstrap-icons-1\" style=\"position:relative;\"><a href=\"#bootstrap-icons-1\" aria-label=\"bootstrap icons 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bootstrap Icons</h3>\n<p>Bootstrap 4 didn't have an SVG icon library. You had to use other third-Party libraries like <code>Font Awesome</code> to use icons in your applications. But Bootstrap 5 has taken care of this issue by introducing its own SVG library with 1000+ icons.</p>\n<p>It also includes a web font version in the stable version release of the icon library.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 101.38461538461539%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Bootstrap 5 Icons\"\n        title=\"Bootstrap 5 Icons\"\n        src=\"/static/c0c3f76afb2d4b85a44266a248169923/e5715/BootStrapIcons.png\"\n        srcset=\"/static/c0c3f76afb2d4b85a44266a248169923/a6d36/BootStrapIcons.png 650w,\n/static/c0c3f76afb2d4b85a44266a248169923/e5715/BootStrapIcons.png 768w,\n/static/c0c3f76afb2d4b85a44266a248169923/715a3/BootStrapIcons.png 830w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"site-generation-strategy\" style=\"position:relative;\"><a href=\"#site-generation-strategy\" aria-label=\"site generation strategy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Site Generation Strategy</h3>\n<p>Bootstrap 5 has moved to Hugo for its static site generation over Jekyll. Hugo is a fast static site generator implemented in Go and is quite popular. You can learn more about <a href=\"https://gohugo.io/\">Hugo here</a>.</p>\n<h3 id=\"popperjs-update\" style=\"position:relative;\"><a href=\"#popperjs-update\" aria-label=\"popperjs update permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Popper.js Update</h3>\n<p>Bootstrap 5 update brings in an update for Popper.js as well, <code>Popper.js v2</code>. Popper.js generally helps to design the tooltips and popovers. With v2, the following changes come in:</p>\n<ul>\n<li><code>fallbackPlacement</code> option becomes <code>fallbackPlacements</code></li>\n<li><code>offset</code> option is no longer available. However, you can use the <code>popperConfig</code> parameter to achieve this.</li>\n</ul>\n<h3 id=\"placeholder-components\" style=\"position:relative;\"><a href=\"#placeholder-components\" aria-label=\"placeholder components permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Placeholder Components</h3>\n<p>Bootstrap 5 allows loading placeholders in your pages. This means that you can utilize the space of the components by showing placeholders in their place while they're still loading the actual content.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 684px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Placeholder Components\"\n        title=\"Placeholder Components\"\n        src=\"/static/2368a2aec32e17c9c21c107e4d039e5c/2c288/placeholders.png\"\n        srcset=\"/static/2368a2aec32e17c9c21c107e4d039e5c/a6d36/placeholders.png 650w,\n/static/2368a2aec32e17c9c21c107e4d039e5c/2c288/placeholders.png 684w\"\n        sizes=\"(max-width: 684px) 100vw, 684px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"floating-labels\" style=\"position:relative;\"><a href=\"#floating-labels\" aria-label=\"floating labels permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Floating Labels</h3>\n<p>Bootstrap 5 adds support for floating labels in forms for the input fields. You can simply use the <code>form-floating</code> class to enable a floating label. When you enter some value into the input fields, they automatically adjust their position to their floated area.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 683px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 17.846153846153847%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAECAYAAACOXx+WAAAACXBIWXMAAA7DAAAOwwHHb6hkAAAAh0lEQVQY03WPiQoDIQxE/f8flSpdD5BlNTp1PJZ2oYEhRt+EUWFVa1RDrVT9FR8fNdlvbnqVcw7Oe5zniVIKROaCDdCYc4YPATFGeB+QUhrsvagz9EmfldYaL2NgrR2Lad4J2kp2XRmmM+/jGBw7WRG5E/NMqf1FDuWPBrzSsA/1RKU8mH73AQbwOizFJPITAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Floating Labels\"\n        title=\"Floating Labels\"\n        src=\"/static/b8c7c0c42fcfdb4ad477e37aea1b7ac7/bca35/flabels.png\"\n        srcset=\"/static/b8c7c0c42fcfdb4ad477e37aea1b7ac7/a6d36/flabels.png 650w,\n/static/b8c7c0c42fcfdb4ad477e37aea1b7ac7/bca35/flabels.png 683w\"\n        sizes=\"(max-width: 683px) 100vw, 683px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"rtl-support\" style=\"position:relative;\"><a href=\"#rtl-support\" aria-label=\"rtl support permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>RTL Support</h3>\n<p>Bootstrap 5 has added support for RTL (Right-to-Left), which means you can develop content that needs writing from the right side of the page and continues to the left. As a result, websites in languages like Arabic, Sindhi, and Urdu can easily be developed.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 685px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.84615384615385%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"RTL Dashboard Example\"\n        title=\"RTL Dashboard Example\"\n        src=\"/static/6a4ae736793c0804d6c89471e9c8680a/8ce22/rtl.png\"\n        srcset=\"/static/6a4ae736793c0804d6c89471e9c8680a/a6d36/rtl.png 650w,\n/static/6a4ae736793c0804d6c89471e9c8680a/8ce22/rtl.png 685w\"\n        sizes=\"(max-width: 685px) 100vw, 685px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"jquery-deprecation\" style=\"position:relative;\"><a href=\"#jquery-deprecation\" aria-label=\"jquery deprecation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>jQuery Deprecation</h3>\n<p>Bootstrap used jQuery from the very beginning as a dependency to offer dynamic features. With Bootstrap 5, jQuery is dropped, and Vanilla JS is introduced as its replacement.</p>\n<blockquote>\n<p><strong>NOTE:</strong>  There are still JS dependencies that depend on Popper and Vanilla JS modules. However, jQuery is optional and can be added based on the requirement of the project.</p>\n</blockquote>\n<h3 id=\"other-significant-changes\" style=\"position:relative;\"><a href=\"#other-significant-changes\" aria-label=\"other significant changes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Other Significant Changes</h3>\n<ul>\n<li>Bootstrap 5 introduces a new data attribute naming structure. <code>data-*</code> attribute has been renamed to <code>data-bs-*</code>.</li>\n<li>Bootstrap 5 now provides easier customizations on the v4 theming pages and provides code snippets to build using Bootstrap's Sass files.</li>\n<li>Bootstrap 5 has added a new <code>accordion</code> component that includes icons that have a state and can be clicked. The <code>accordion-flush</code> class can be used to remove the default background color, borders, or corners to possibly render accordions edge-to-edge with the parent element.</li>\n<li>Bootstrap 5 documentation site is now enhanced to improve the user readability, and new examples have been added with code snippets.</li>\n<li>The <code>inline-block</code> property is removed in Bootstrap 5, and the <code>dropdown-menu-dark</code> class now loads with a default black dropdown.</li>\n<li>The support for <code>jumbotron</code> has been terminated in Bootstrap 5.</li>\n<li>With vertical classes in Bootstrap 5, the columns can be positioned <code>relative</code>.</li>\n<li>Gutters can now be applied using <code>g*</code> class instead of <code>gutter</code>. The font size is now set to <code>rem</code> instead of <code>px</code>.</li>\n<li>Lastly, Bootstrap 5 also adds a new <code>offcanvas</code> component that enables you to create hidden view panes that would pop out when you interact with component tied to it -- e.g., side navigation bars, shopping carts, etc. Here is an example of the bottom <code>offcanvas</code> component.</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.84615384615385%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAALCAYAAAB/Ca1DAAAACXBIWXMAAA7DAAAOwwHHb6hkAAABGUlEQVQoz62PzY6DMAyE88os+cMJEIrEay5curet4FwxaweBop5Wai19MmPisa26rkOMEZJTSnDOoW1bxEyXv09KLd+lDrFjeigRRIS+7y/DwANcQ0wA+QaBIe+zbpyH53+2iTCOQPxe3tQuwlMLJZtdhsOQDWU7y83SELQBGUbr3GhJGnkQE6lBbDxCCHDh2FqJ8DxdNhVzw82yobYOlXawXxq+qmBqA82mljF1DWvtMZRxcoFcxl5qHMd86jRNGSkOtxsCT6O2R8c55WHHBSkNGNKR+wLxkD41LwvmecH3PON+/8G2bVjXFWvOG+s16+2sFWwXa86/jwfU8/nEyb7veDfUa0FM30G9FkrT/0bZp0rxiVD4cPwBdrPN7/GxZZsAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Offcanvas Bottom Bar\"\n        title=\"Offcanvas Bottom Bar\"\n        src=\"/static/2b27ba639040368aec3106810ada8a19/e5715/offcanvas.png\"\n        srcset=\"/static/2b27ba639040368aec3106810ada8a19/a6d36/offcanvas.png 650w,\n/static/2b27ba639040368aec3106810ada8a19/e5715/offcanvas.png 768w,\n/static/2b27ba639040368aec3106810ada8a19/906b5/offcanvas.png 950w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summary</h2>\n<p>Bootstrap 4 used to do a great job providing all the flexibility and responsiveness for designing the web pages. However, Bootstrap 5 adds several new aspects that help to reduce the effort to do the same. But still, you need to keep certain parameters in mind before choosing either of these two.</p>\n<p>If you have an existing project that needs to support IE 10 and 11 or depends on jQuery, you should probably stick to Bootstrap 4. Bootstrap 5 can be overwhelming but might break your project structure if not migrated properly.</p>\n<p>But if you're starting a new project and want to provide a more immersive UI for the users, definitely opt for Bootstrap 5 to use its modern components, which this article discussed above.</p>\n<p>This is all for this blog post at the moment. I hope you had a great time reading this and learned something new. Do let me know in the comments if you liked the content.</p>\n<blockquote>\n<p><strong>NOTE:</strong>  All the images used in this blog post are taken from the official <a href=\"https://getbootstrap.com/\">Bootstrap</a> website and are used here for reference purposes only.</p>\n</blockquote>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk17 { color: #808080; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n</style>","frontmatter":{"date":"October 21, 2021","updated_date":null,"description":"This article discusses the differences between Bootstrap 4 and Bootstrap 5 and helps you understand which version you should use for your projects.","title":"Bootstrap 4 vs. Bootstrap 5: What is the Difference?","tags":["Bootstrap","Frontend","Sass"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/8f7ef876ee3ee88f8ddb1becc34c70fa/ee604/coverImage.png","srcSet":"/static/8f7ef876ee3ee88f8ddb1becc34c70fa/69585/coverImage.png 200w,\n/static/8f7ef876ee3ee88f8ddb1becc34c70fa/497c6/coverImage.png 400w,\n/static/8f7ef876ee3ee88f8ddb1becc34c70fa/ee604/coverImage.png 800w,\n/static/8f7ef876ee3ee88f8ddb1becc34c70fa/f3583/coverImage.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rutam Prita Mishra","github":"Rutam21","avatar":null}}}},{"node":{"excerpt":"With the increasing involvement of people in online gaming, there have been many disruptions in the cyber world that's causing major…","fields":{"slug":"/growth/risk-based-authentication-gaming-industry/"},"html":"<p>With the increasing involvement of people in online gaming, there have been many disruptions in the cyber world that's causing major security concerns—malware, unwanted software, credit card, personal information theft, etc. In fact,  the number of people affected by cyber threats related to gaming has increased multifold recently. </p>\n<p>The gaming authorities take different measures to protect the gaming industry from these threats, including <strong>risk-based authentication.</strong> In this article, we are going to discuss what it is and how it works. </p>\n<h2 id=\"what-is-risk-based-authentication\" style=\"position:relative;\"><a href=\"#what-is-risk-based-authentication\" aria-label=\"what is risk based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Risk-Based Authentication</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">Risk-based authentication</a> (RBA), also called adaptive authentication, monitors consumers’ identity and access using a set of stringent rules. The objective is to authenticate a user profile before allowing it access to ensure that it is not a threat. These restrictions become more stringent with increasing risks. </p>\n<h2 id=\"how-does-rba-works\" style=\"position:relative;\"><a href=\"#how-does-rba-works\" aria-label=\"how does rba works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does RBA Works</h2>\n<p>Risk-based authentication works on a model that requires permission and response. A user asks for permission to access a file or software. In response, the file or software responds by presenting options to log in using either an ID and password method or by sending mail or OTP to a registered contact number. </p>\n<p>While performing the authentication, RBA analyses the following factors: </p>\n<ul>\n<li>The device used to gain access, i.e., mobile or laptop. </li>\n<li>The location of the device. It includes components such as the physical address of the server. </li>\n<li>Network. This refers to the IP address of the user. </li>\n<li>How sensitive is the data? Is the required data general or significant?</li>\n</ul>\n<p>If the system detects any risk, then it follows either of the following measures: </p>\n<ul>\n<li>The system blocks the user if any risk is observed.</li>\n<li>The system uses <a href=\"https://www.loginradius.com/blog/identity/multi-factor-authentication-a-beginners-guide/\">multi-factor authentication</a> to authenticate the user identity, i.e., using SMS or Google authenticator. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/fixing-broken-authentication-with-adaptive-mfa/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABbklEQVQY01WQTUsCURSGJSjnQx3JJKTEQittNC2ZScfGRkfUTKUoUiwy2gRFH5tWWZtW/pJo0SJaRBEtok1t2rUJ+itvZ9QRWrxwL/c9zz08FnZ6CUa4GRW2YPpf+KAK890IE1DAiTpGEutwzelgwzkwwWWwUykwvY7FhBkFeygNju48xRnR4Y6vwBnOgqEBE8gTxKvVIeZqsCU2YI3kCah036nXAVrp4FfXkKkdQK40IZV3MalU4KANBVHrA60EHI5k4ZVLcM/n4ZWK8CwUOtuZHYtJ9iUrkAgm6lsYk1YgRPPgYyUItCHbKw/5k3BFc/ApVYwvrlLKGI0XO/N9oHHgyZd9VgMX0jAYoMFACg6lDj7dhCNaIJ8qLJ4YjlptfP/84u7xFTf3T7h9eMbbxxde3j9JTYY+VAwgOSOHhiuBvPFitvtBYhMMAQUCGhsOTMiQq3s4vGhj+/QSjeMWGict7J9fY+fsCjbyb6j7AxKEw6noHebVAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-Adaptive-MFA\"\n        title=\"GD-Adaptive-MFA\"\n        src=\"/static/38581e51de794ee73778cc943c5b9537/e5715/GD-Adaptive-MFA.png\"\n        srcset=\"/static/38581e51de794ee73778cc943c5b9537/a6d36/GD-Adaptive-MFA.png 650w,\n/static/38581e51de794ee73778cc943c5b9537/e5715/GD-Adaptive-MFA.png 768w,\n/static/38581e51de794ee73778cc943c5b9537/63ff0/GD-Adaptive-MFA.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-to-use-rba-in-the-gaming-industry\" style=\"position:relative;\"><a href=\"#how-to-use-rba-in-the-gaming-industry\" aria-label=\"how to use rba in the gaming industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Use RBA in the Gaming Industry</h2>\n<p>A significant amount of people play games online. This includes people of different ages, geographical areas, and criminal backgrounds. This can result in increased cybercrime related to gaming. </p>\n<p>To counter these crimes, the gaming industry should put <strong>risk-based authentication</strong> to use. But how can it help in gaming? The answer is mentioned below: </p>\n<h3 id=\"verifying-location\" style=\"position:relative;\"><a href=\"#verifying-location\" aria-label=\"verifying location permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Verifying location</h3>\n<p>In the USA, only the bettors within the state are allowed to participate in online betting games. Anyone participating from other states may have to face the consequences. RBA can authenticate the user location by asking questions or tracing IP addresses to distinguish the necessary information. </p>\n<p>You can also use this to track users who come from places where incidents of cybercrime are common. </p>\n<h3 id=\"authenticating-age\" style=\"position:relative;\"><a href=\"#authenticating-age\" aria-label=\"authenticating age permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authenticating age</h3>\n<p>Age is another factor that can be verified using RBA. Many games have a certain age limit that you should follow. By identity verification, the authorities can confirm the age of the users. </p>\n<p>Authorities can use <a href=\"https://www.loginradius.com/blog/identity/what-is-identity-verification/\">digital identity verification</a> to gather data from the user. The data may include name, address, and date of birth. RBA can check this data against existing records to see whether the information is correct or not or has been changed recently. </p>\n<h3 id=\"avoiding-money-laundering-with-kyc\" style=\"position:relative;\"><a href=\"#avoiding-money-laundering-with-kyc\" aria-label=\"avoiding money laundering with kyc permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Avoiding money laundering with KYC</h3>\n<p>Many people use money from criminal proceedings and money laundering in online gaming or betting. Know our customer (KYC) and anti-money laundering initiates are taken into account in these cases.</p>\n<p>The KYC is usually not required at the time of signing in but when the suspicion arises. Suspicion may arise in the cases where the user pays a huge amount of money in one go. </p>\n<p>Identity verification is done at the time of KYC, and it requires identity verification via documents and photos of a user. Incorporating AML and KYC at the time of payment for gaming makes the entire risk mitigation process smarter. </p>\n<h2 id=\"what-should-you-look-for-in-a-risk-based-authentication-system\" style=\"position:relative;\"><a href=\"#what-should-you-look-for-in-a-risk-based-authentication-system\" aria-label=\"what should you look for in a risk based authentication system permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Should You Look for in a Risk-Based Authentication System</h2>\n<p>An effective RBA can make a huge difference between a safe and unsafe gaming experience. When you are choosing an RBA, look for the following features: </p>\n<ul>\n<li><strong>Real-time data:</strong> Access to real-time data helps identify the risk at the earliest and prevent potential threats that may affect the gaming system.</li>\n<li><strong>User analytics:</strong> User analytics include all the information related to a user, like their name, address, and age. This analytics helps in profiling potential cybercriminals. </li>\n<li><strong>Multi-factor authentication or verification:</strong> If any risk is detected or a user seems questionable, RBA can use extra authentication. It includes asking for additional information that may reveal useful insights about the background of a user.</li>\n<li><strong>Configuration policies:</strong> Passwords are widely used for authentication, but other configuration policies help set up advanced technology like RBA that ensures the security and smart functioning of the gaming industry. </li>\n</ul>\n<p>The focus is to confide the users' personal information, and with LoginRadius, you will find more than just one solution to your digital predicaments. <a href=\"https://www.loginradius.com/contact-sales\">Contact us</a> to know more. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo\"\n        title=\"book-a-demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 18, 2021","updated_date":null,"description":"It is not possible to create an application that protects against everything, especially in the gaming industry. Although it is important to effectively protect sensitive data in electronic gaming environments, it is also essential to create systems that maintain the fun and excitement of online gaming. Risk-Based Authentication makes it possible.","title":"Embracing Risk-Based Authentication in the Gaming Industry","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.941747572815534,"src":"/static/12e96a1af309feefb043f036ea486d0b/14b42/rba-gaming-cover.jpg","srcSet":"/static/12e96a1af309feefb043f036ea486d0b/f836f/rba-gaming-cover.jpg 200w,\n/static/12e96a1af309feefb043f036ea486d0b/2244e/rba-gaming-cover.jpg 400w,\n/static/12e96a1af309feefb043f036ea486d0b/14b42/rba-gaming-cover.jpg 800w,\n/static/12e96a1af309feefb043f036ea486d0b/16310/rba-gaming-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"Delivering rich consumer experiences isn’t a luxury anymore; it’s the necessary fuel that keeps businesses up and running in the most…","fields":{"slug":"/identity/sso-integration-secure-cx/"},"html":"<p>Delivering rich consumer experiences isn’t a luxury anymore; it’s the necessary fuel that keeps businesses up and running in the most competitive digital ecosystem. </p>\n<p>Moreover, the entire e-commerce industry’s success largely depends on how they make their consumers feel whenever they land on their website or mobile application. </p>\n<p>Whether it’s the personalized greeting or a suggestion of a product based on a buyer’s search history, online vendors can deliver rich consumer experiences that not only enhance sales but ensure returning customers. </p>\n<p>However, when we talk about loyalty platforms, things aren’t that smooth as they should be. In other words, consumers can’t indulge in a seamless experience when they connect with a loyalty platform for potential benefits. </p>\n<p>Stats reveal that approximately <a href=\"https://www.statista.com/statistics/1239203/business-spending-on-customer-loyalty-world/\">75B U.S. dollars</a> were spent on loyalty management back in 2019. </p>\n<p>Businesses are spending a good amount of money and time offering loyalty to their consumers, which eventually brings good returns on investment. But not everyone can yield good profits.  </p>\n<p>Buyers cannot redeem benefits as cash points or discounts on e-commerce platforms since the most significant barrier, i.e., identity verification, hampers user experience. This leads to poor conversions and eventually a decline in the number of visitors on loyalty platforms. </p>\n<p>This post helps you understand the biggest challenge for loyalty platforms and how Single Sign-On (SSO) integration for consumer loyalty platforms can be the game-changer. </p>\n<h2 id=\"the-biggest-challenge-for-consumer-loyalty-platforms\" style=\"position:relative;\"><a href=\"#the-biggest-challenge-for-consumer-loyalty-platforms\" aria-label=\"the biggest challenge for consumer loyalty platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Biggest Challenge for Consumer Loyalty Platforms</h2>\n<p>As discussed earlier, consumer experience is essential for any online business; the same goes for loyalty platforms. </p>\n<p>Consumers today are always on a hunt for a seamless experience as they already interact with brands like Amazon, Microsoft, and Apple. They know what a great user experience means, and they’re expecting at least something closer to it. </p>\n<p>However, when they interact with platforms offering <a href=\"https://www.forbes.com/sites/bryanpearson/2019/02/21/amazons-new-loyalty-program-5-reasons-amazon-moments-will-change-how-you-shop/?sh=6fae2a873acd\">loyalty for third-party websites</a>, including Amazon, they cannot find that sophisticated and seamless experience. </p>\n<p>A little friction during the authentication process can lead to a poor experience for consumers that further impacts overall sales. </p>\n<p>Authenticating and authorizing a user by the loyalty provider for an e-commerce vendor through its unique identity should be a matter of seconds. </p>\n<p>Unfortunately, it isn’t. </p>\n<p>Users may face several challenges while expecting discount benefits or redeeming cash points because their loyalty provider lacks a robust identity management partner. </p>\n<p>Let’s understand this issue further in detail. </p>\n<h2 id=\"consequences-of-a-bad-identity-management-system-for-loyalty-platforms\" style=\"position:relative;\"><a href=\"#consequences-of-a-bad-identity-management-system-for-loyalty-platforms\" aria-label=\"consequences of a bad identity management system for loyalty platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consequences of a Bad Identity Management System for Loyalty Platforms</h2>\n<p><a href=\"https://www.loginradius.com/blog/fuel/consumer-journey-from-sign-up-to-purchase/\">Managing the consumer journey</a> in the business landscape can be challenging for any organization, especially if they’re dealing with multiple parties. </p>\n<p>The same goes for accessing electronic records and loyalty vendors handling multiple identities of consumers seeking benefits and their regular clients and employees. </p>\n<p>Poor identity management impacts sales and affects recurring consumers since users demand rich experiences, and when it’s about rewards, they cannot compromise.  Moreover, the market is flooded with several loyalty providers, and consumers are just a click away to switch. </p>\n<p>Hence, loyalty vendors must quickly put their best effort into enhancing user experience, especially when they’re handling third-party users seeking benefits in terms of rewards and discounts that eventually build trust and lasting relationships. </p>\n<p>Furthermore, securing consumer accounts is yet another tough nut to crack for enterprises delivering loyalty benefits since attacks and fraud reward platforms are always looking for ways to sneak into a network and exploit consumer identities. </p>\n<p>This raises the demand for a robust mechanism that handles consumer identities securely and manages consumer onboarding from third-party websites like a breeze. </p>\n<p>Here’s where a consumer identity and access management (CIAM) solution like LoginRadius comes into play. </p>\n<p>Let’s understand how industry-leading CIAM like LoginRadius pave the path for a flawless user onboarding experience coupled with robust security for loyalty platforms using cutting-edge SSO integration. </p>\n<h2 id=\"why-is-loginradius-single-sign-on-sso--the-need-of-the-hour-for-loyalty-platforms\" style=\"position:relative;\"><a href=\"#why-is-loginradius-single-sign-on-sso--the-need-of-the-hour-for-loyalty-platforms\" aria-label=\"why is loginradius single sign on sso  the need of the hour for loyalty platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is LoginRadius’ Single Sign-On (SSO)  the Need of the Hour for Loyalty Platforms?</h2>\n<p>Single Sign-on (or SSO) is a unique authentication method that allows users to access multiple applications with a single set of credentials, like a username and password. </p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">LoginRadius SSO</a> is designed to simplify the verification process and create a seamless environment when accessing multiple apps, portals, and servers.</p>\n<p>Simply put, LoginRadius SSO has entirely removed the need for users to enter their login credentials for individual applications.  Alternatively, users sign in once, and the interface sends the necessary credentials to the assigned systems through various proxies and agents. </p>\n<h2 id=\"loginradius-sso-capabilities\" style=\"position:relative;\"><a href=\"#loginradius-sso-capabilities\" aria-label=\"loginradius sso capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius’ SSO Capabilities</h2>\n<p>LoginRadius <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">Single Sign-On</a> is the perfect fit for organizations that want to reduce their data protection vulnerabilities, improve consumer experiences, and streamline processes for identity management and log in.</p>\n<p>What else makes LoginRadius single sign-on the best choice for your enterprise? Let's find out.</p>\n<h3 id=\"sso-offers-robust-security\" style=\"position:relative;\"><a href=\"#sso-offers-robust-security\" aria-label=\"sso offers robust security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO offers robust security</h3>\n<p>According to a <a href=\"http://services.google.com/fh/files/blogs/google_security_infographic.pdf\">survey by Google</a>, 53% of users still reuse the same password for multiple accounts. Therefore, reducing login to a single set of credentials is a good start in reducing the attackers' surface area. Because users log in only once, there are fewer opportunities for mistakes. </p>\n<p>Enterprises can also go the extra mile with two-factor authentication (2FA) and multifactor authentication (MFA) techniques. </p>\n<h3 id=\"sso-helps-with-regulatory-compliance\" style=\"position:relative;\"><a href=\"#sso-helps-with-regulatory-compliance\" aria-label=\"sso helps with regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO helps with regulatory compliance</h3>\n<p>Regulations like HIPAA require users to authenticate before they can access electronic records along with options like automatic log-off and audit controls to track user access. </p>\n<p>LoginRadius SSO makes these requirements around data access and control at the granular level. It also allows enterprises and developers to comply with regulations that require provisioning and deprovisioning users. </p>\n<h3 id=\"sso-saves-time\" style=\"position:relative;\"><a href=\"#sso-saves-time\" aria-label=\"sso saves time permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO saves time</h3>\n<p>Because users need not remember multiple credentials for multiple logins anymore, it saves time and improves productivity.</p>\n<p>Also, remembering one password instead of many miraculously <a href=\"https://www.loginradius.com/resource/infographic/death-of-passwords\">reduces password fatigue</a>. More so, it gives users the perfect opportunity to come up with even stronger passwords. </p>\n<h3 id=\"sso-lowers-it-costs\" style=\"position:relative;\"><a href=\"#sso-lowers-it-costs\" aria-label=\"sso lowers it costs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO lowers IT costs</h3>\n<p>This one is interlinked. When there are fewer passwords to remember, there will be even lesser chances of users forgetting them—leading to a reduced number of reset help tickets. This will reduce the need for IT involvement and lower IT costs.</p>\n<h2 id=\"why-loginradius-is-the-right-choice-in-2021-and-beyond\" style=\"position:relative;\"><a href=\"#why-loginradius-is-the-right-choice-in-2021-and-beyond\" aria-label=\"why loginradius is the right choice in 2021 and beyond permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why LoginRadius is the Right Choice in 2021 and Beyond</h2>\n<p>LoginRadius’ cutting-edge CIAM goes beyond a single sign-on solution with its broader consumer identity and access management functions, but it is an excellent platform for SSO nonetheless. </p>\n<p>With its simple-to-use one-click access, it works great for small to large-scale, consumer-facing deployment. The added 2FA/MFA security protects data—both in-house and consumers.</p>\n<p>The LoginRadius Identity Platform offers SSO in the following ways:</p>\n<ul>\n<li><strong>Web SSO:</strong> LoginRadius offers browser-based session management when the SSO is required between two or more web applications. It uses localStorage, cookies, and similar storage mechanisms to maintain the user's session across applications. To execute the authentication, a centralized domain operated by LoginRadius IDX is used.</li>\n<li><strong>Mobile SSO:</strong> After logging into an application, the user can log in across multiple apps without the need for multiple passwords. It works by storing the LoginRadius access token in a shared session. It enables you to identify a currently active session and utilize the data to configure the user account in successive applications. </li>\n<li><strong>Federated SSO:</strong> Login also helps you implement SSO with third-party applications. It is done through <a href=\"https://www.loginradius.com/federated-sso/\">federated SSO</a>. LoginRadius Identity Platform supports all major industry single sign-on protocols like SAML, JWT, OAuth, and OpenID SSO protocols for interaction with various third-party web applications.</li>\n<li><strong>Custom IDPs:</strong> Consider this as Social Login. Custom IDPs are used to configure a Social Login provider that is not available in the default list of providers by LoginRadius. You can use any external database to authenticate your application users. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/kuppingercole-industry-report-2020\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"RP-KuppingerCole\"\n        title=\"RP-KuppingerCole\"\n        src=\"/static/f8e56969bf187ba521683187faf124aa/e5715/RP-KuppingerCole.png\"\n        srcset=\"/static/f8e56969bf187ba521683187faf124aa/a6d36/RP-KuppingerCole.png 650w,\n/static/f8e56969bf187ba521683187faf124aa/e5715/RP-KuppingerCole.png 768w,\n/static/f8e56969bf187ba521683187faf124aa/81501/RP-KuppingerCole.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"other-good-reasons-to-rely-on-loginradius\" style=\"position:relative;\"><a href=\"#other-good-reasons-to-rely-on-loginradius\" aria-label=\"other good reasons to rely on loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Other Good Reasons to Rely on LoginRadius</h2>\n<ul>\n<li>Reinforced Security with Stronger Authentication</li>\n<li>Reduced Help Desk Costs</li>\n<li>Auto Scalable Infrastructure</li>\n<li>Scalability</li>\n<li>Globally Compliant </li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>In the digital era, every business is leveraging a consumer identity and access management solution that can help them enhance growth without compromising user experience and security. </p>\n<p>Loyalty platforms need to understand the crucial role of a CIAM solution that delivers a flawless user experience through SSO and enhances security through MFA. </p>\n<p>Single Sign-On improves consumer experience and boosts productivity by a considerable margin for loyalty businesses. </p>\n<p>By implementing the benefits of the LoginRadius SSO as a unified solution, you increase business agility, security, convenient and streamlined experience for your business and consumers alike. <a href=\"https://www.loginradius.com/contact-sales\">Contact us</a> today. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 18, 2021","updated_date":null,"description":"Today, consumers are enjoying flawless experiences on every platform but can’t indulge in a seamless experience when they connect with a loyalty platform for potential benefits. This post helps you understand the biggest challenge for loyalty platforms and how Single Sign-On (SSO) integration for consumer loyalty platforms solves the purpose.","title":"SSO Integration: How to Secure the Customer Experience on Loyalty Platforms","tags":["sso","identity management","compliance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.941747572815534,"src":"/static/b0744baef0c40059d78f347e2ab6a9d2/14b42/sso-integration-secure-cx-cover.jpg","srcSet":"/static/b0744baef0c40059d78f347e2ab6a9d2/f836f/sso-integration-secure-cx-cover.jpg 200w,\n/static/b0744baef0c40059d78f347e2ab6a9d2/2244e/sso-integration-secure-cx-cover.jpg 400w,\n/static/b0744baef0c40059d78f347e2ab6a9d2/14b42/sso-integration-secure-cx-cover.jpg 800w,\n/static/b0744baef0c40059d78f347e2ab6a9d2/16310/sso-integration-secure-cx-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"One of the most used authentication standards in web applications is the JSON Web Token standard. It is mostly used for authentication…","fields":{"slug":"/engineering/guest-post/jwt-authentication-best-practices-and-when-to-use/"},"html":"<p>One of the most used authentication standards in web applications is the JSON Web Token standard. It is mostly used for authentication, authorization, and information exchange.</p>\n<p>JSON Web tokens are made of three parts separated by dots <code>(.)</code> — and look like this typically: <code>xxxxx.yyyyy.zzzzz</code>. These correspond to the Header, the Payload, and the Signature. You can learn more about <a href=\"https://www.loginradius.com/blog/engineering/jwt/\">JWT tokens here</a>.</p>\n<p>And before using them and continuing to read this article, you might want to check the advantages compared to the session authentication method. You can learn more about <a href=\"https://www.loginradius.com/blog/engineering/guest-post/jwt-vs-sessions/\">JWTs vs. Sessions here</a>.</p>\n<h2 id=\"when-to-use-jwt-authentication\" style=\"position:relative;\"><a href=\"#when-to-use-jwt-authentication\" aria-label=\"when to use jwt authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>When to Use JWT Authentication?</h2>\n<h3 id=\"authentication\" style=\"position:relative;\"><a href=\"#authentication\" aria-label=\"authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication</h3>\n<p>Authentication is done when a client successfully proves its identity via a login endpoint. If it's successful, the server will create JSON Web Token and send it in response to the client.</p>\n<p>The client will use this JWT on every request for a protected resource. </p>\n<h3 id=\"authorization\" style=\"position:relative;\"><a href=\"#authorization\" aria-label=\"authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authorization</h3>\n<p>A server built on JWT for authorization will create a JWT when a client logs in. This JWT is signed, so any other party can’t alter it.</p>\n<p>Each time the client has access to protected resources, the server will verify that the JWT’s signature matches its payload and header to determine that the JWT is valid.</p>\n<p>Then if the JWT is successfully verified, it can grant or deny access to the resource. </p>\n<h3 id=\"data-exchanges\" style=\"position:relative;\"><a href=\"#data-exchanges\" aria-label=\"data exchanges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data Exchanges</h3>\n<p>JWT is also a great way to secure information transmission between parties — two servers, for example — and because you can verify the validity of the token (signature, structure, or the standards claimed in the JWT). </p>\n<h2 id=\"when-not-to-use-jwt-authentication\" style=\"position:relative;\"><a href=\"#when-not-to-use-jwt-authentication\" aria-label=\"when not to use jwt authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>When Not to Use JWT Authentication?</h2>\n<h3 id=\"revocable-tokens\" style=\"position:relative;\"><a href=\"#revocable-tokens\" aria-label=\"revocable tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Revocable Tokens</h3>\n<p>JWT doesn’t require any lookup of the database, so revoking them before the expiration is quite difficult. </p>\n<p>Revocation is very important in many cases.</p>\n<p>For example, when logging out users or banning users, or changing permissions or passwords instantly, if the token hasn't been revoked, it might be possible for the user to continue to make requests even if this user no longer has the required authorization to do so.</p>\n<h3 id=\"sensitive-information\" style=\"position:relative;\"><a href=\"#sensitive-information\" aria-label=\"sensitive information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Sensitive Information</h3>\n<p>JWT is usually signed to protect against data manipulation or alteration. With this, the data can be easily read or decoded.</p>\n<p>So, you can’t include sensitive information such as the user’s record or any identifier because the data is not encrypted.</p>\n<h3 id=\"cookie-size-factor\" style=\"position:relative;\"><a href=\"#cookie-size-factor\" aria-label=\"cookie size factor permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cookie Size Factor</h3>\n<p>The size of a JWT is greater than the size of a session token. And this can quickly increase linearly as you add more data to the JWT. And because you need to send the JWT at each request, you're increasing the payload size. This can become heavily complex if there is a low-speed internet connection.</p>\n<h2 id=\"jwt-best-practices\" style=\"position:relative;\"><a href=\"#jwt-best-practices\" aria-label=\"jwt best practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>JWT: Best Practices</h2>\n<h3 id=\"1-jwt-as-access-token\" style=\"position:relative;\"><a href=\"#1-jwt-as-access-token\" aria-label=\"1 jwt as access token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1) JWT as Access Token</h3>\n<p>JWT can be used as an access token to prevent unwanted access to a protected resource. They're often used as Bearer tokens, which the API will decode and validate before sending a response.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">Authorization: Bearer &lt;token&gt;</span></code></pre>\n<h3 id=\"2-refresh-tokens-logic-with-jwt\" style=\"position:relative;\"><a href=\"#2-refresh-tokens-logic-with-jwt\" aria-label=\"2 refresh tokens logic with jwt permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2) Refresh Tokens Logic with JWT</h3>\n<p>How do you get a new access token if this one is expired? The natural first idea is to log in again. But from a User Experience point, this can be quite painful.</p>\n<p>JWT can be used as <a href=\"https://www.loginradius.com/blog/engineering/guest-post/what-are-refresh-tokens-and-when-to-use-them/\">refresh tokens</a>; these tokens are used to retrieve a new access token.</p>\n<p>For example, when a client requests a protected resource and receives an error, which can mean that the access token has expired, the client can be issued a new access token by sending a request with a refresh token in the headers or the body.\nIf the refresh token is valid, a new access token will be created and sent as a response.</p>\n<p>Note that the refresh token is obtained at authentication and has a bigger lifetime.</p>\n<h3 id=\"3-which-signing-algorithm-to-use\" style=\"position:relative;\"><a href=\"#3-which-signing-algorithm-to-use\" aria-label=\"3 which signing algorithm to use permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3) Which Signing Algorithm to Use?</h3>\n<p>Interestingly enough, JWT can be <a href=\"https://www.loginradius.com/blog/engineering/jwt-signing-algorithms/\">signed using many different algorithms</a>. But let’s quickly talk about the <code>alg</code> value in the JWT header. When it’s decoded:</p>\n<p>The <code>alg</code> value in JWT headers simply tells you how the JWT was signed. For example, with an <code>alg</code> value of <code>RS512</code>. </p>\n<p><code>RS512 => RS 512</code> where RS is the signature algorithm and <code>SHA-512</code> is the hashing algorithm.</p>\n<p><code>SHA-512</code> will produce a <code>512-bits</code> hash while <code>SHA-256</code> will produce a <code>256-bit</code> hash. And each of these algorithms gives you 50% of their output size of security level. This means that, for example, <code>SHA-512</code> will provide you with <code>256-bits</code> security.</p>\n<p>In any case, make sure to use a minimum of <code>128-bit</code> security.</p>\n<h3 id=\"4-expiration-issued-time-and-clock-skew\" style=\"position:relative;\"><a href=\"#4-expiration-issued-time-and-clock-skew\" aria-label=\"4 expiration issued time and clock skew permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4) Expiration, Issued Time, and Clock Skew</h3>\n<p>JWTs are hard to revoke when they are created. Most of the time, you’ll have to wait until expiry. That’s why you should use a short expiration time. </p>\n<p>Additionally, you can implement your own revocation system.</p>\n<p>JWT comes with a time-based claim <code>iat</code> — issued at. It can be used to reject tokens that are too old to be used by the resource server.\nAnd clock skew specifies the allowed time difference (in seconds) between the server and the client clocks when verifying <code>exp</code> and <code>nbf</code> time-based claims. The default recommended default value is 5.</p>\n<h3 id=\"5-jwt-signature\" style=\"position:relative;\"><a href=\"#5-jwt-signature\" aria-label=\"5 jwt signature permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5) JWT Signature</h3>\n<p>The last part of a JWT is the signature, which is simply a MAC (or Message Authentication Code). This signature is created by the server using a secret key. This secret key is an important part of the JWT signature.</p>\n<p>There are two things to respect to decrease the probability of a secret key leaking or a successful brute force attack:</p>\n<ul>\n<li>Keep the secret key <strong>secret</strong></li>\n<li>\n<p>The minimum key length must be equal to the size of bits of the hash function used along with the HMAC algorithm.</p>\n<blockquote>\n<p>\"A key of the same size as the hash output (for instance, 256 bits for \"HS256\") or larger MUST be used with this algorithm.\" - <a href=\"https://tools.ietf.org/html/rfc7518#section-3.2\">JSON Web Algorithms (RFC 7518), 3.2 HMAC with SHA-2 Functions</a></p>\n</blockquote>\n</li>\n</ul>\n<h3 id=\"6-where-to-store-the-tokens\" style=\"position:relative;\"><a href=\"#6-where-to-store-the-tokens\" aria-label=\"6 where to store the tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6) Where to Store the Tokens?</h3>\n<p>The easiest ways to store a token on the client side are <code>localStorage</code> and <code>sessionStorage</code>. However, both are vulnerable to XSS attacks, and <code>sessionStorage</code> is cleaned if the browser is closed.</p>\n<p>A better, secure way is to store JWT in cookies. Cookies are not accessible via JavaScript, they can’t be read and written, and interestingly, they are automatically sent to the server.</p>\n<h3 id=\"7-always-use-https\" style=\"position:relative;\"><a href=\"#7-always-use-https\" aria-label=\"7 always use https permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7) Always Use HTTPS</h3>\n<p>One of the main benefits of <code>HTTPS</code> is that it comes with security and trust. <code>HTTP</code> path and query parameters are encrypted when using <code>HTTPS</code>.</p>\n<p>Then, there is no risk of someone intercepting the request, particularly the token in transit. These types of attacks are commonly called <strong>MitM</strong> (man in the middle) attacks that can be successful on compromised or insecure networks.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>This article discussed JWT and some best practices to fully use its potential.</p>\n<p>JWT is simply an authentication standard with its pros and cons. Thus, knowing some best practices can really help you use JWT better.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"October 14, 2021","updated_date":null,"description":"JWT is a common way of implementing authentication in web and mobile apps. Read more to know how you can use JWT and learn the necessary best practices.","title":"JWT Authentication — Best Practices and When to Use","tags":["JWT","Authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/dd60f505aa7484a17a6cd0b90a5b0fae/ee604/cover-image.png","srcSet":"/static/dd60f505aa7484a17a6cd0b90a5b0fae/69585/cover-image.png 200w,\n/static/dd60f505aa7484a17a6cd0b90a5b0fae/497c6/cover-image.png 400w,\n/static/dd60f505aa7484a17a6cd0b90a5b0fae/ee604/cover-image.png 800w,\n/static/dd60f505aa7484a17a6cd0b90a5b0fae/f3583/cover-image.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Kolawole Mangabo","github":"koladev32","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":366,"currentPage":62,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}