{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/65","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"OAuth stands for Open Authorization. It's a process through which an application or website can access private data from another website. It…","fields":{"slug":"/identity/what-is-oauth/"},"html":"<p>OAuth stands for Open Authorization. It's a process through which an application or website can access private data from another website. It provides applications the ability to \"secure designated access.\" For example, you can tell Google that it's OK for abc.com to access your Google account or contact without having to give abc.com your Google password.</p>\n<p>OAuth never shares password data but instead uses authorization tokens to prove an identity between consumers and service providers. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password.</p>\n<p>To understand this, let's take the example of Facebook. When an app on Facebook asks you to share your profile and pictures, Facebook acts as a service provider: it has your data and image, and that app is a consumer. If you want to do something with your picture with the help of this app, you need to provide permission to this app to access your images, which the OAuth manages in the background.</p>\n<h2 id=\"how-does-the-oauth20-work\" style=\"position:relative;\"><a href=\"#how-does-the-oauth20-work\" aria-label=\"how does the oauth20 work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does the OAuth2.0 Work</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.5546875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"what-is-oauth-1\"\n        title=\"what-is-oauth-1\"\n        src=\"/static/40fa6eb6f1f5acf7210a4b5de0eca5ec/01e7c/what-is-oauth-1.png\"\n        srcset=\"/static/40fa6eb6f1f5acf7210a4b5de0eca5ec/01e7c/what-is-oauth-1.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The following explains the working of the above sequence diagram of Oauth 2.0 implementation: </p>\n<ol>\n<li>Let's assume the client requests authorization to access protected resources owned by the resource owner by redirecting the client to the authorization server.</li>\n<li>The resource access request is authenticated and authorized by the resource owner from the web application, and the authorization grant is returned to the client by an authorized endpoint.</li>\n<li>There are four types of Grant Protocol defined by OAuth 2.0: <strong>Authorization Code</strong>, <strong>Client Credentials</strong>, <strong>Device Code</strong>, and <strong>Refresh Token</strong>.</li>\n<li>The client requests the access token from the authorization server by presenting the authorization grant returned from the authorized endpoint and authentication of its own identity to the token endpoint. A token endpoint is a URL such as <code>https://your_domain/oauth2/token</code>.</li>\n<li>The access token will be issued to the client for valid authentication and authorization grant by the authorization server or authentication provider.</li>\n<li>By presenting the access token for authentication, the client can request the protected resources from the resource server.</li>\n<li>The requested resources are returned to the application (client) with the valid access token from the resource server.</li>\n</ol>\n<p><strong>Also Read: <a href=\"https://www.loginradius.com/blog/engineering/authorization-code-flow-oauth/\">Guide to Authorization Code Flow for OAuth 2.0 </a></strong></p>\n<h2 id=\"why-you-should-be-using-oauth\" style=\"position:relative;\"><a href=\"#why-you-should-be-using-oauth\" aria-label=\"why you should be using oauth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why You Should be Using OAuth</h2>\n<p>OAuth provides applications the ability to secure designated access. In the traditional method, before OAuth, sites ask for the username and password combination for login and use the same credentials to access your data.</p>\n<p>With OAuth flow, instead of sending the username and password to the server with each request, the consumer sends an API key ID and secret. In this scenario, the consumer communicates to their identity provider for access. The identity provider generates an encrypted, signed token that grants the application access by authenticating the consumer. This process works on trust between the Identity Provider and the application. It will create a better interface for web applications.</p>\n<h2 id=\"working-with-oauth-token--scope\" style=\"position:relative;\"><a href=\"#working-with-oauth-token--scope\" aria-label=\"working with oauth token  scope permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Working with OAuth Token &#x26; Scope</h2>\n<p>The authorization server authenticates the client and validates the authorization grant, and if valid, issues a token known as an **access token. **It must be kept confidential and in storage. This access token should only be seen by the application, authorization, and resource server. The application makes sure that the storage of the access token can not be readable to other applications on the same device.</p>\n<p>The <a href=\"/blog/identity/oauth2-0-guide/\">OAuth 2.0 authorization protocol</a> defines the following methods to receive the Access Token. These Flows are called grant types. So you can decide the grant types as per the use case or it is based mainly on the type of your application.</p>\n<p>The following are the five types of grants described to perform authorizations tasks. Those are</p>\n<ul>\n<li>Authorization Code Grant</li>\n<li>Implicit Grant</li>\n<li>Resource Owner Credentials Grant</li>\n<li>Client Credentials Grant</li>\n<li>Refresh Token Grant \\</li>\n</ul>\n<p><strong>The scope</strong> specifies the level of access that the application is requesting from the client. An application can request one or more scopes. This information is then presented to the consumer on the consent screen. The access token issued to the application will be limited to the scopes granted. <strong>Consent</strong> tells your consumers who is requesting access to their data and what kind of data you're asking to access.</p>\n<h2 id=\"blending-oauth-with-loginradius\" style=\"position:relative;\"><a href=\"#blending-oauth-with-loginradius\" aria-label=\"blending oauth with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Blending OAuth with LoginRadius</h2>\n<p>LoginRadius Identity Platform supports standard <a href=\"https://tools.ietf.org/html/rfc6749\">OAuth 2.0 specs</a> to integrate your OAuth client with LoginRadius. Thus, you can allow your application's customers to log in to an OAuth-enabled application without creating an account. This<a href=\"https://www.loginradius.com/docs/single-sign-on/tutorial/federated-sso/oauth-2-0/oauth-2-0-overview/#oauthguide0\"> document</a> goes over the complete process of getting the SSO feature implemented with OAuth 2.0.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>This article talked about OAuth 2.0 as an authorization framework for delegated access to web APIs. This feature grants the resource access to the consumer without exposing their password to their application. However, before implementing any functionality on your website, analyze and consider the pros and cons from every possible angle.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 23, 2021","updated_date":null,"description":" OAuth is an open standard for authorization. It lets users authorize third-party access to their servers without handing out their username and password. Read this blog to also find about OAuth 2.0 as an authorization framework for delegated access to web APIs.","title":"Everything You Need to Know About OAuth and How it Works","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/598f4336592e5164e938b78ec3cfc1bd/14b42/what-is-oauth-cover.jpg","srcSet":"/static/598f4336592e5164e938b78ec3cfc1bd/f836f/what-is-oauth-cover.jpg 200w,\n/static/598f4336592e5164e938b78ec3cfc1bd/2244e/what-is-oauth-cover.jpg 400w,\n/static/598f4336592e5164e938b78ec3cfc1bd/14b42/what-is-oauth-cover.jpg 800w,\n/static/598f4336592e5164e938b78ec3cfc1bd/16310/what-is-oauth-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vaibhav Jain","github":null,"avatar":null}}}},{"node":{"excerpt":"Prerequisites You should know the basics of Vim beforehand. You may refer to a previous blog Vim: Getting started. This tutorial explores…","fields":{"slug":"/engineering/guest-post/vim-level-up/"},"html":"<h2 id=\"prerequisites\" style=\"position:relative;\"><a href=\"#prerequisites\" aria-label=\"prerequisites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prerequisites</h2>\n<p>You should know the basics of Vim beforehand. You may refer to a previous blog <a href=\"https://www.loginradius.com/blog/engineering/vim-getting-started/\">Vim: Getting started</a>.</p>\n<p>This tutorial explores the following concepts:</p>\n<ul>\n<li>Macros</li>\n<li>Buffers and splitting</li>\n<li>Global  command</li>\n</ul>\n<p>In addition, this tutorial explores a few other tips and tricks. It is not uncommon for folks who have been using Vim for a long time and not being familiar with these handy, useful features.</p>\n<h2 id=\"macros\" style=\"position:relative;\"><a href=\"#macros\" aria-label=\"macros permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Macros</h2>\n<p>You don't want to miss out on macros if you want to level up your Vim game. Vim macro is a powerful feature that allows you to record a sequence of keys on the fly. It helps you to automate a lot of stuff. </p>\n<p>Macros are based on the concept of registers. If you don't know what registers are, you can think of them as a bunch of spaces in memory that Vim uses to store some text.</p>\n<p>Macros are editable registers, which you can record, store, and edit whenever you want.</p>\n<p>Here's the basic syntax of  macros:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">q&lt;key you want to record your macro into&gt;&lt;series of commands&gt;q</span></code></pre>\n<p>Example:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">q1f;xq</span></code></pre>\n<p>Let's break it down for you:</p>\n<p>q : Starts recording a macro<br>\n1 : The recorded macro will be stored on key 1<br>\nf;x : Find the first occurrence of <code>;</code>in that line and delete <code>;</code><br>\nq : stop recording the macro  </p>\n<p>That's it. Now, you can use this macro by <code>@&#x3C;your key></code> i.e <code>@1</code></p>\n<p>If you want to repeat a macro <em>n</em> number of times, then <code>n@1</code>is the syntax.</p>\n<h3 id=\"use-case\" style=\"position:relative;\"><a href=\"#use-case\" aria-label=\"use case permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Use Case</h3>\n<p>Not impressed yet? Huhh! Let's show you a practical use case to demonstrate the power of a macro. I work in ReactJs a lot and like to export all my components in one file. Let's try exporting 99 HeroBlocks in one go.</p>\n<p>The desired result is:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">export {default as HeroBlock1 } from &#39;./HeroBlock1/HeroBlock1.js&#39;</span>\n<span class=\"grvsc-line\">export {default as HeroBlock2 } from &#39;./HeroBlock1/HeroBlock2.js&#39;</span>\n<span class=\"grvsc-line\">export {default as HeroBlock3 } from &#39;./HeroBlock1/HeroBlock3.js&#39;</span>\n<span class=\"grvsc-line\">...</span>\n<span class=\"grvsc-line\">..</span>\n<span class=\"grvsc-line\">so on</span></code></pre>\n<p>Perform <code>vim index.js</code></p>\n<p>And, write this line:</p>\n<p><code>export {default as HeroBlock1 } from './HeroBlock1/HeroBlock1.js'</code></p>\n<p>Now, follow along:</p>\n<p><code>q1yyp4E ^A6e ^Aq</code></p>\n<p>Breaking it down:</p>\n<p>q1 : Start recording a macro in key 1.<br>\nyy : yank the current line.<br>\np : paste the yanked line.<br>\n4E : Get the cursor to 1 of Heroblock1. (<em><code>f1</code> might be tempting but it will give you wrong results as not all lines will have 1, they can have any number. Try making the macro very generalized.</em>)<br>\n^A : this is <code>ctrl + a</code>. It increments the current version by one.<br>\n6e : Get the cursor to the second number.<br>\n^A : increment the number by one.<br>\nq : stop recording.  </p>\n<p>Now, to repeat your macro 99 times:</p>\n<p><code>99@1</code></p>\n<p>And that's all.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.38461538461539%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"macro demo\"\n        title=\"macro demo\"\n        src=\"/static/3fc1ce475f85e20f3e8953cea9830341/e5715/vim-macro-demo.png\"\n        srcset=\"/static/3fc1ce475f85e20f3e8953cea9830341/a6d36/vim-macro-demo.png 650w,\n/static/3fc1ce475f85e20f3e8953cea9830341/e5715/vim-macro-demo.png 768w,\n/static/3fc1ce475f85e20f3e8953cea9830341/26c3a/vim-macro-demo.png 1907w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"buffers--splitting\" style=\"position:relative;\"><a href=\"#buffers--splitting\" aria-label=\"buffers  splitting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Buffers &#x26; Splitting</h2>\n<p>In simple terms, a <em>buffer</em> is a file that has been loaded into memory. Everything you do in Vim is in a buffer. You can list all the buffers by <code>:buffers</code>. And then, if you want to check out a particular buffer, use <code>:b n</code> -- where n is the buffer number. </p>\n<p>If you want to delete a buffer, use <code>:bd n</code> is the command.</p>\n<p>To create a new buffer in the same view -- creating a split in the current window -- use <code>:sp filename</code>. </p>\n<p>For a vertical split, use <code>:vsp filename</code>.</p>\n<blockquote>\n<p>To be honest, using buffer numbers to switch buffers is not what I prefer to do. I prefer to switch based on what I see, like <code>ctrl-w</code> then <code>j</code>to focus on a buffer below if I'm splitting the window. <code>:tabprevious</code> to move a tab on the left if I'm using tabs.</p>\n</blockquote>\n<p>Here are some key bindings you might want to use for a smooth workflow.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">nnoremap &lt;C-t&gt; :tabnew&lt;CR&gt;</span>\n<span class=\"grvsc-line\">nnoremap &lt;C-Left&gt; :tabprevious&lt;CR&gt;</span>\n<span class=\"grvsc-line\">nnoremap &lt;C-Right&gt; :tabnext&lt;CR&gt;</span>\n<span class=\"grvsc-line\">nnoremap &lt;C-J&gt;  &lt;C-W&gt;&lt;C-J&gt;</span>\n<span class=\"grvsc-line\">nnoremap &lt;C-K&gt;  &lt;C-W&gt;&lt;C-K&gt;</span>\n<span class=\"grvsc-line\">nnoremap &lt;C-L&gt;  &lt;C-W&gt;&lt;C-L&gt;</span>\n<span class=\"grvsc-line\">nnoremap &lt;C-H&gt;  &lt;C-W&gt;&lt;C-H&gt;</span></code></pre>\n<h2 id=\"global-command\" style=\"position:relative;\"><a href=\"#global-command\" aria-label=\"global command permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Global Command</h2>\n<p>The global command in Vim is very powerful and will solve a lot of your problems quickly.</p>\n<p>The basic syntax goes something as follows:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">:[range]global/{pattern}/{command}</span></code></pre>\n<p>Let's go through some use cases to learn more about it.</p>\n<p>The following will delete any line containing the word console in the entire file:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">:g/console/d</span></code></pre>\n<p>The following will delete any line between line 10-20 containing the word console in it:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">:10,20g/console/d</span></code></pre>\n<p>You can even do the inverse of it by using <code>:g!</code></p>\n<p>The following will delete any line <strong>not</strong> containing the word console in it in the entire file:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"7\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">:g!/console/d</span></code></pre>\n<p>You can even combine the two.</p>\n<p>The following will delete any line containing <em>console</em> and not containing <em>hello</em> in it in the entire file.</p>\n<p>The global command can work on any regular expression, which makes it even more powerful, provided you're creative enough...</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"8\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">:g/console/g!/Hello/d</span></code></pre>\n<p>The following will delete any line starting with <code>#</code> i.e., comments in python will be deleted in one go:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"9\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">:g/^#/d</span></code></pre>\n<p>So far, we've been using d as the command, but it can be anything else like <code>m</code> for move <code>t</code> for copy etc.</p>\n<p>One of the very powerful commands is <code>norm</code>. This command allows you to do anything that would have worked in normal mode.</p>\n<p>The following will comment out all the print statements in a python code in one go.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"10\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">:g/print/norm I#</span></code></pre>\n<p>The global command can be coupled with macros using <em>norm</em>, which means you can apply a macro to certain lines matching the regex given. This was enough to blow my mind, and it made the time I spent reading about Vim worthy.</p>\n<p>Here's the syntax for using macros with global commands:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"11\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">:g/const/normal @q</span></code></pre>\n<h2 id=\"you-made-it\" style=\"position:relative;\"><a href=\"#you-made-it\" aria-label=\"you made it permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>You Made It</h2>\n<p>Congratulations! You made it this far. You now have leveled up your Vim game. All these tips and tricks will eventually be useful to you. Here's a little something for reading this far: <a href=\"https://pintovim.dev/\">Pintovim</a> You can use this tool to make your own customized Vim color scheme.</p>\n<p>Thanks for reading!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"September 23, 2021","updated_date":null,"description":"Vim is Vi's newest and most common reincarnation, which is supported on every known platform. Go through this tutorial to learn about what Vim is and how to make the most out of it.","title":"How to Upgrade Your Vim Skills","tags":["Vim","Text Editor","UNIX"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0e8a15779baa24ee0c8d1487ce2f4794/ee604/Vim.png","srcSet":"/static/0e8a15779baa24ee0c8d1487ce2f4794/69585/Vim.png 200w,\n/static/0e8a15779baa24ee0c8d1487ce2f4794/497c6/Vim.png 400w,\n/static/0e8a15779baa24ee0c8d1487ce2f4794/ee604/Vim.png 800w,\n/static/0e8a15779baa24ee0c8d1487ce2f4794/f3583/Vim.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Shubhankar Khare","github":"iamshubhankarkhare","avatar":null}}}},{"node":{"excerpt":"Excellent customer experiences motivate people to become regular consumers. The main goal of any company is to put itself in the customer’s…","fields":{"slug":"/growth/how-to-improve-the-customer-xperience/"},"html":"<p>Excellent customer experiences motivate people to become regular consumers. The main goal of any company is to put itself in the customer’s shoes. An improved user experience brings more leads that will convert into clients and the opportunity to increase your customer base.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 37.3046875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAHCAIAAACHqfpvAAAACXBIWXMAAAsTAAALEwEAmpwYAAABAElEQVQY021QXUvCYBT27/Ub+ht13013giARWhJlCkpXUjhCZzWWTJabRUTZRcXErdam7Mu9+Z7z1ibJlD135zxfnJPBBACAMebY/lmBr5b5vUJjc2NXr7/RoYd/BLKlksXIsFXMfMJVxNx2tbh/UTppyvm+oxjG1mMoTSMaMClOmOP9dVu9akhy5+F58KGNTbSo0/qc5rrugYDkZ61ppdkLZtli7fiw+aK8R2mAXr09V4YTTjD5LrkZxOWwbl6coelmR5TFO3X0bTHb9c9vifSEQUjU18nOkX96GUkppDcDoNC7bwlyOKdoWGA7i+CIcgOqfS3H9IchJlj8lyJLxS90ToSWzlFM+AAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/6a6d81c495118ce9f2c4153d0cdb62c1/01e7c/consumer-exp.png\"\n        srcset=\"/static/6a6d81c495118ce9f2c4153d0cdb62c1/01e7c/consumer-exp.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Note that your perfect customer experience depends on numerous factors. These are positive feedback, brand awareness, a good reputation, the SEO-friendliness of your website, and many more.</p>\n<p>According to a <a href=\"https://www.business2community.com/customer-experience/how-to-optimize-the-customer-experience-strategies-and-trends-02240366\">Business2Community</a> survey, customer experience (CX) should be improved for three core reasons:</p>\n<ul>\n<li>To improve customer retention</li>\n<li>To raise customer satisfaction rates</li>\n<li>To boost cross and up-selling statistics</li>\n</ul>\n<p>Additionally, your company will be able to generate more revenue via customer acquisition by renewing and upselling to your standing customers.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 57.6171875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/3aaf1e37e7102e3811c6d1a90c36102f/01e7c/consumer-exp2.png\"\n        srcset=\"/static/3aaf1e37e7102e3811c6d1a90c36102f/01e7c/consumer-exp2.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"overview-of-the-cx-evolution-2017-2020\" style=\"position:relative;\"><a href=\"#overview-of-the-cx-evolution-2017-2020\" aria-label=\"overview of the cx evolution 2017 2020 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Overview of the CX Evolution (2017-2020)</h2>\n<p>Before exploring the latest tips for improving customer experience, let’s check the evolution of consumer demands and the CX trends of previous years.</p>\n<p>2017</p>\n<p><a href=\"https://www.zendesk.com\">Zendesk</a> found that about 88% of consumers always share their bad experiences with other people, while 87% of satisfied customers shared recommendations on ecommerce companies that provided an excellent experience.</p>\n<p>2018</p>\n<p>According to a <a href=\"https://www.gartner.com/en\">Gartner</a> survey, the focus on CX was predicted for 2019. Three hundred respondents proved that user experience matters and are willing to interact with a company if they were delighted with their first experience.</p>\n<p>2019</p>\n<p><a href=\"https://www.accenture.com/us-en/about/company-index\">Accenture</a> found that about 86% of companies are searching for alternative ways to improve their CX because traditional experiences no longer bring high customer satisfaction.</p>\n<p>2020</p>\n<p>According to <a href=\"https://www.gartner.com/en\">Gartner's</a> research, about 35% of companies optimized the customer journey and focused on their omnichannel experiences. The survey report also includes the latest statistics on modern consumers: more than 25% of present-day customers get used to virtual assistants and prefer online interactions through chatbots.</p>\n<p>2021 is the year of new trends in the context of customer experience. Marketers, SEO specialists, and business representatives should take into account the latest statistics provided by <a href=\"https://www.zendesk.com/\">Zendesk</a>:</p>\n<ol>\n<li>Spotless CX is the reason to purchase/order/interact/cooperate one more time for about 75% of present-day consumers.</li>\n<li>64% of today’s customers switched to social messaging as a new communication + customer service channel.</li>\n<li>75% of companies have already implemented digital tech solutions, and 43% of ecommerce companies worldwide converted their business and CX into fully remote entities.</li>\n</ol>\n<p>If you are interested in the best practices that will come in handy for improving CX, read these expert tips and improve client impressions when interacting with them.</p>\n<h2 id=\"7-top-expert-tips-for-cx-improvement-in-2021\" style=\"position:relative;\"><a href=\"#7-top-expert-tips-for-cx-improvement-in-2021\" aria-label=\"7 top expert tips for cx improvement in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Top Expert Tips for CX Improvement in 2021</h2>\n<p>If you still have not digitized your business, it is time to do it right now. Start with your website and social media network accounts. Your site should be mobile-friendly because about 70% of global traffic is generated via mobile device screens.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.796875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/4ac82cb3d8d6e4307afc04ff4057c720/01e7c/consumer-exp3.png\"\n        srcset=\"/static/4ac82cb3d8d6e4307afc04ff4057c720/01e7c/consumer-exp3.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>\nBesides the technical aspects that affect user experience, seven others are described in the following expert tips. Having implemented these approaches into practice, your CX will become significantly improved according to 2021 trends.</p>\n<h3 id=\"1-understand-who-are-your-customers\" style=\"position:relative;\"><a href=\"#1-understand-who-are-your-customers\" aria-label=\"1 understand who are your customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1 Understand Who Are Your Customers</h3>\n<p>Your task is to initiate the mouth-to-mouth recommendation cycle. For this purpose, you need to know who your customers are and improve their loyalty to your company, its goods, and services. First, you need to put yourself in the consumer’s shoes. Think like the client who would like to interact with your company. Then, it is necessary to use any CRM tool to analyze your customer data and accurately determine the client’s profile and purchasing behavior.</p>\n<p>For improved customer loyalty with a guaranteed individual approach, you can split your consumers into several groups. It is a CX-driven idea because your target audience can have various needs and require diversified products. For example, the all-in-one SEO platform <a href=\"https://seranking.com/\">Seranking</a> provides a personal touch by segmenting its customers. Customers are divided into four groups and offered a special-purpose pack of SEO services:</p>\n<ul>\n<li>For enterprises;</li>\n<li>For medium and small businesses;</li>\n<li>For agencies;</li>\n<li>For entrepreneurs.</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.3515625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/0a1b707789ea49175f2dd8b8532110a6/01e7c/consumer-exp4.png\"\n        srcset=\"/static/0a1b707789ea49175f2dd8b8532110a6/01e7c/consumer-exp4.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>This way, first-time visitors are easily navigated to the information and features that best fit their segment. So, while being a single platform with many different SEO services, the company has improved the customer experience by providing their potential clients with a simple way to find the package designed for their needs.</p>\n<h3 id=\"2-strengthen-an-omnichannel-customer-experience\" style=\"position:relative;\"><a href=\"#2-strengthen-an-omnichannel-customer-experience\" aria-label=\"2 strengthen an omnichannel customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2 Strengthen an Omnichannel Customer Experience</h3>\n<p>Omnichannel CX is a way to provide an integrated customer experience through synchronized and connected channels. Potential clients have an opportunity to interact with the company and order goods and services differently. It doesn’t need to be just a desktop ecommerce site but:</p>\n<ul>\n<li>A user-friendly mobile version of the website;</li>\n<li>Mobile app;</li>\n<li>Brick and Mortar store.</li>\n</ul>\n<p>Omnichannel CX implements many approaches simultaneously to convert CX into a seamless process. Many integration strategies bring higher conversion rates and more traffic. Additionally, it benefits customer retention. It is worth noting that omnichannel and multichannel user experiences are not the same.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 37.5%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/1ee039af9cadc7eeca204cbb50dde01a/01e7c/consumer-exp5.png\"\n        srcset=\"/static/1ee039af9cadc7eeca204cbb50dde01a/01e7c/consumer-exp5.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The main idea of the multichannel approach is to provide many customer service channels that are not linked to each other. It means that social media networks, websites, online shops, and call centers are not synchronized. But omnichannel CX infers that all these multiple channels are connected.</p>\n<p>To strengthen the omnichannel customer experience, tie in a CX-driven combination of all your strategies and approaches in the context of:</p>\n<ul>\n<li>Your product/services;</li>\n<li>Digital marketing and SEO;</li>\n<li>Customer service;</li>\n<li>Sales;</li>\n<li>User experience.</li>\n</ul>\n<p>A good example of omnichannel CX is the pharmaceutical brand <a href=\"https://www.walgreens.com/\">Walgreens</a>. Brand communication takes place via a mobile-friendly app. The shopping experience is improved with the help of convenient digital features such as refilling prescriptions virtually, setting up reminders and notifications. The app saves customers time because they do not need to visit the pharmacy to get medications.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.1171875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAOCAIAAACgpqunAAAACXBIWXMAAAsTAAALEwEAmpwYAAADE0lEQVQoz2N48+bN5i2bN23dunn7ti07tgPRpu1gtG3bZiB35w4Y2rl5OxBs+/Dhw//////9+wckGaZPn87AwMDMzMwAA4xgxAYUZGBgYWBgBSMgl5sZyGNYvXoVUNufP79BmidMmsjOwLDRN/pgWOresOQ9IUnTnKKnOUbN9U6c7p081S58mkPEFPvwGQ5RXW4xQM0rVq5AaO7v6+Ph4Xlw6w7QJV+/fPn441frzrsV2+6V7X9euOtJ8e4nBTsfl+5+XLD7efzSc0DNK1csR2ju6+vj5uY+dfHKm9dv7t2+/eD5q7oFh4rmHsjfeD1j3Y2olTeCll4NXno1dtPz4PlnQTavWAbU9vs3UPM/sGYenodXLv76+fPL58/vP33N2Xqncve9+j33Sjdejpx5wHvqAa+Je7RSm21y2wTFJTasWwe2+Q/I5okTJwoKCj68cw/I+fvn99cfvxNXXUtadaV833Mt11CgVW6+Af6h4SYcnAn6huVRcQoaGu6BgXEZmbv37mXo7+/n5eW9cOUyKOz////x+0/8ymthiy8n7HiS5hax1NxxR1T6wvAkUzF5SwkFHxPLEAn5MkPzCeGh6+YvgPr54pWz/+GaV133nXwwtXFNX3X3p9OXPl26tn/hfD09jbCIIHsHaxsTi5mFiW3V0YvmzYJqvnfvHtAbf37//vL9R8jC83YTDhR27+2v6Zi++cCqw5fnzp9npStRneXoZG2cH2IyL8e/uyBj3uyZIGfz8/O/ffsWkm6Ajr/14uv1x5+e//g/Y9navmXr1u7YtmDpbDc3D3cXF2tr65Luop1lFfPKYhfMnMrQ29vLxMQETGdr1qxZtWrV6tWrVy5euHbZkg2rV/ZNnrzv3IWzFy+tWrZ8Qm/vmhWru9tbc9umrV2yemlb6ZJFCxi2bN6ioqKipKQkDwOy8gpyCgqSUlJGphbJ2QWZ+UXhERGysrKaWlqycvITutp27941bc6CJUuXMwBd+uPHj9+oACgC9EV8fDwwqjg5OID+evToEVDkyZMnevqGerr60tLSs2fPBgD17NUy7sYBswAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/cdc7eb6586108ebdc62ec97915f28dea/01e7c/consumer-exp6.png\"\n        srcset=\"/static/cdc7eb6586108ebdc62ec97915f28dea/01e7c/consumer-exp6.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Simplified interactions and virtual communication is in high demand today and are highly appreciated by consumers and increases Walgreens’ customer retention.</p>\n<h3 id=\"3-optimize-the-customer-journey\" style=\"position:relative;\"><a href=\"#3-optimize-the-customer-journey\" aria-label=\"3 optimize the customer journey permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3 Optimize the Customer Journey</h3>\n<p>The customer journey is a full cycle that takes place from the first interaction of your consumer up to the final experience. To ensure that you have provided your clients with high-level loyalty, the customer journey should be smooth without pitfalls and challenges. Nevertheless, according to an <a href=\"https://econsultancy.com/\">Econsultancy</a> report, about 50% of companies still have no idea what the customer journey is. The lifecycle consists of the following stages:</p>\n<ol>\n<li>Out-of-the-market – The potential client has just found some information about the company (through Internet channels like social media, advertising, websites, newsletters, or a physical store).</li>\n<li>Trigger – This phase is notable with interest to the company because of any trigger (sales, special offers, an invitation to any event, etc.). Potential consumers analyze these opportunities and progress to the next customer journey stage.</li>\n<li>Initial brand consideration – When interest arises, the user searches for some information about the brand (reviews, location of retail shops, websites, etc.). Any negative information can stop the journey here.</li>\n<li>Evaluation – This stage is crucial for SaaS projects that offer free trials and demos. Only in this phase, a potential customer is willing to try your services. If a free-of-charge package satisfies the user, it is more likely that the one will purchase your product.</li>\n<li>Decision-making – It is necessary to provide the best customer service at this stage and be sure that the customer has no hurdles. If some questions arise, the customer support team should react immediately.</li>\n<li>Experience – When an order is completed, the customer gets an experience. Your task is to turn it into the most positive one. When it comes to SaaS, customer support services should be rendered even after a software release.</li>\n<li>Loyalty – An utterly positive experience means that the client will likely repeat the purchase and recommend your product. Encourage loyal customers to submit thankful reviews that will improve your reputation, brand awareness, and search rankings.</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 33.984375%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/ad90eb01e7e4681a9224cbb5700becb1/01e7c/consumer-exp7.png\"\n        srcset=\"/static/ad90eb01e7e4681a9224cbb5700becb1/01e7c/consumer-exp7.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"tips-for-customer-journey-optimization\" style=\"position:relative;\"><a href=\"#tips-for-customer-journey-optimization\" aria-label=\"tips for customer journey optimization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Tips for Customer Journey Optimization</h2>\n<p>To optimize your customer journey, you need to map out each step and the processes associated with them. Here is a list of ways for full-cycle optimization:</p>\n<p>Phase</p>\n<p>Company’s Touchpoints</p>\n<p>Out-of-the-market</p>\n<ol>\n<li>Run a website audit to make it SEO-friendly and climb the search results.</li>\n<li>Synchronize a social media network account with the website and other online channels.</li>\n<li>Involve blog posters and search for publishers and market experts to promote your services.</li>\n<li>Optimize the strategy for a sound online presence.</li>\n</ol>\n<p>Trigger</p>\n<ol>\n<li>Provide special offers like promo codes, discounts, in-person newsletters, etc.</li>\n<li>Specify short time limits for any triggers to gain consumer attention.</li>\n<li>Motivate people to share your content and promos (Instagram reposts, Facebook giveaways, bigger discounts for recommendations).</li>\n</ol>\n<p>Evaluation</p>\n<ol>\n<li>Be sure that your SEO strategy is brand-focused.</li>\n<li>Keep track of reviews that form your reputation on the Internet.</li>\n<li>Engage loyal clients to leave reviews.</li>\n<li>Be sure that you provide enough contact information for each online channel.</li>\n</ol>\n<p>Decision-making</p>\n<ol>\n<li>Provide immediate reactions to user requests.</li>\n<li>Optimize your call centers and online management departments.</li>\n<li>Add a chatbox to the website.</li>\n<li>Add a 24/7 customer support channel (it might be the only way to communicate - email, chatbox, calls).</li>\n</ol>\n<p>Experience</p>\n<ol>\n<li>Allow potential customers to order services or products in various ways (website, social media, online shop, marketplaces).</li>\n<li>Provide various payment methods.</li>\n<li>Proceed with fast order processing and provide 24/7 customer support.</li>\n</ol>\n<p>Loyalty</p>\n<ol>\n<li>Create a loyalty program for existing customers.</li>\n<li>Send newsletters to loyal clients.</li>\n<li>Notify about updates, changes, and recent news.</li>\n<li>Reward orders from loyal clients with bonuses.</li>\n<li>Engage in the word-of-mouth recommendations with discounts.</li>\n</ol>\n<p>Finish with a gap analysis to fix all the challenging phases. If your customer cycle is well-thought-out, you will not lose potential consumers. All generated traffic will be converted into new clients and sales.</p>\n<h3 id=\"4-build-a-community\" style=\"position:relative;\"><a href=\"#4-build-a-community\" aria-label=\"4 build a community permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4 Build a Community</h3>\n<p>The rule of a great CX-driven online community is the desire for your loyal customers to promote your company and its services. Engage people to join your Internet club of like-minded people, offer them goodies like bonuses and referral points, and force them to share your brand through different online channels.</p>\n<p>For example, <a href=\"https://inkbox.com/\">Inkbox</a> consists of a community with millions (2 million) of followers. This company makes it a priority of tattooing and shares all completed work on the Internet. The community was created around the popular Instagram hashtag #tattoosfornow. People throughout the world shared beautiful photos with tattoos and grew the community.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 65.4296875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/e03081fbf14ffc785589a038a3447367/01e7c/consumer-exp8.png\"\n        srcset=\"/static/e03081fbf14ffc785589a038a3447367/01e7c/consumer-exp8.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"5-take-advantage-of-customer-reviews\" style=\"position:relative;\"><a href=\"#5-take-advantage-of-customer-reviews\" aria-label=\"5 take advantage of customer reviews permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#5 Take Advantage of Customer Reviews</h3>\n<p>You can use reviews for your customer experience purposes. Additionally, you can increase your brand awareness and enhance SEO efforts this way. People trust companies with numerous positive reviews. There are six ways to take advantage of client testimonials:</p>\n<ol>\n<li>Use reviews on the home page and other key pages of the site. For example, the <a href=\"https://seranking.com\">seranking</a> website has reviews at the bottom of its homepage that increases and validates trust in the brand and its services.</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 46.67968750000001%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAJCAIAAAC9o5sfAAAACXBIWXMAAAsTAAALEwEAmpwYAAABEElEQVQoz3WPb0+DMBDG+eImfiDjS93ULFmcLwwgfgFfLFOEDNoCpaz/7jxgc2zOX472rn2euxI8vvplaF8SpFi94yrB5wSXb7CI7CL2T5Gbh+Yh9vPYzSI3i/1daO8jc3Wjr291wGvkFTKK0pafjAlMt+o7l4XA9YalWZ1zWH/VWenSQn9sRMYgFyAkiAYCPOLRtf0OFmE3HHQIhuqhhEHQTfQYAF0dwiM6571HTzlxOO8bwoWYTiana5rGGCOlVEq1bUu53zP0QDiZ/JsB7C9UqwRRETV9nPcVtTuTHc0wMOad1uQkN+ttFS28b1WPgqny5Nnj/zVl0UqptdHGWGvdAfzDBbMstjvV+cmE//gBw4QHs5EsyDoAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/96fb363211f2abee8c8507adc5d5780e/01e7c/consumer-exp9.png\"\n        srcset=\"/static/96fb363211f2abee8c8507adc5d5780e/01e7c/consumer-exp9.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"2\">\n<li>Use reviews for your search ranking. Add a Sitemap with reviews to engage people to visit your site and help Google consider your website as trusted.</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 40.625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAICAIAAAB2/0i6AAAACXBIWXMAAAsTAAALEwEAmpwYAAABI0lEQVQY011P2W7DMAzL/3/cHvbUbb3i1Gdsy7fjXJ2bZEAxQhAIgRLF5kHc6azvCH7OCj3g3gKloe3gclO8t+NUchnyOAxjOXoZpnl6bmgkvdPLJ+Zdy0nHqdBSGcCSUS059DqA8lpaJb3uraq8dyqWdCybnon2IihljFtjaoHWBkxOKcWYYnLWxRCDD5UDgJLKO1+r+jc5D3FDFa/r8lzXenJ9w7Iszz9SMc9z7esma3pZEM5cDKgLQiTKIuocIWEo47zswmWcp1r7wjsa9ji3p49bd/1CN8TxFaPvthJCgVPNmBHCyN7KSnQw1Xb/61iOIC1DFjQllGCspHTWxvDCntb7V8JtEKy1zjljjitNSBnq5CXxSqmc87/Me9p/k935F6B0x86UwpgdAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/a50141de9c0b46e5450c94a315009867/01e7c/consumer-exp10.png\"\n        srcset=\"/static/a50141de9c0b46e5450c94a315009867/01e7c/consumer-exp10.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 55.6640625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/85a36b5264d6a25b31f963e2d78dce0b/01e7c/consumer-exp11.png\"\n        srcset=\"/static/85a36b5264d6a25b31f963e2d78dce0b/01e7c/consumer-exp11.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"3\">\n<li>Use reviews to prove your reputation on other online communication channels (social media platforms, forums, blogs).</li>\n<li>Use client testimonials in newsletters and for other email marketing purposes. This way, you will increase the chances that your letter will be read and taken into consideration.</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 483px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 106.00414078674949%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/9c051d625aba32be93e405692fae01ce/77a9e/consumer-exp12.png\"\n        srcset=\"/static/9c051d625aba32be93e405692fae01ce/77a9e/consumer-exp12.png 483w\"\n        sizes=\"(max-width: 483px) 100vw, 483px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"5\">\n<li>Add reviews to your video marketing materials. You can use screenshots of some eye-catching and detailed testimonials in your advertising videos.</li>\n<li>Analyze your customer satisfaction rates with the help of the percentages that rank positive, neutral, and negative reviews. For example, you can offer short online surveys to get more reviews after any customer journey stage (especially at the last two) and measure them. Here is a set of survey templates by <a href=\"https://www.nicereply.com/\">NiceReply</a>.</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.7109375%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/5ceb93807bce09cabd5db9e886389e8e/01e7c/consumer-exp13.png\"\n        srcset=\"/static/5ceb93807bce09cabd5db9e886389e8e/01e7c/consumer-exp13.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"6-personalize-your-content\" style=\"position:relative;\"><a href=\"#6-personalize-your-content\" aria-label=\"6 personalize your content permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#6 Personalize Your Content</h3>\n<p>According to <a href=\"https://hbr.org/2018/01/ads-that-dont-overstep\">Harvard Business Review</a>, online users appreciate a high personalized marketing experience. It does not relate only to personalized email letters and promotions sent via messengers and SMS. You can improve your CX with personalized content on your website. For example, you can add some special features that correspond to your niche and increase the number of leads this way.</p>\n<p><a href=\"https://www.spotify.com/us/\">Spotify</a> decided to launch the option “Discover Weekly” for this purpose. A personalized playlist is generated according to the listener’s preferences. Some users like this option, while some Spotify fans dislike it. Nevertheless, this is a way to promote a personalized approach and show each customer your meaningful marketing strategy.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 47.265625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/5d23f1171365d30b567f6a0ff5269286/01e7c/consumer-exp14.png\"\n        srcset=\"/static/5d23f1171365d30b567f6a0ff5269286/01e7c/consumer-exp14.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"7-make-the-customer-experience-safer\" style=\"position:relative;\"><a href=\"#7-make-the-customer-experience-safer\" aria-label=\"7 make the customer experience safer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#7 Make the Customer Experience Safer</h3>\n<p>A significant number of Internet users are still afraid of scammers and cyber hacks regarding the user experience on a website. Assure visitors that your ecommerce platform and corporate site are risk-free for them. For example, <a href=\"https://www.loginradius.com/customer-security/\">LoginRadius</a> provides businesses with adoptive safety tools to make their CX 100% secure.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 41.40625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/d1322aef06ee5ed815dfcc54ea44a2fc/01e7c/consumer-exp15.png\"\n        srcset=\"/static/d1322aef06ee5ed815dfcc54ea44a2fc/01e7c/consumer-exp15.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Having implemented tech solutions to protect client accounts, your company strengthens its brand awareness, improves reputation and loyalty. Usually, the most challenging aspects for customers are the security of personal data and online payments. Your task in the context of CX improvement is to maintain privacy and guarantee safe transactions.</p>\n<h2 id=\"final-words\" style=\"position:relative;\"><a href=\"#final-words\" aria-label=\"final words permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Words</h2>\n<p>Your CX strategy should meet customer requirements and your business goals. Customer experience is a proven way to develop high retention, cross-sales, and up-sales. If people decide to come back and recommend your products, this is a good sign for your company. An improved user experience benefits SEO, brand awareness, and generally the online presence of your business. 2021 requires marketers, entrepreneurs, and SEO specialists to demonstrate an omnichannel CX approach with comprehensive security, reviews, and customer journey strategies.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 22, 2021","updated_date":null,"description":"If you are interested in the best practices that will come in handy for improving customer experience, read these expert tips and improve client impressions when interacting with them.","title":"7 Expert Tips on How to Improve the Customer Experience","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/d60c3bff962767b0af0a7ff5eefb7caf/eec3f/consumer-exp-cover-page.jpg","srcSet":"/static/d60c3bff962767b0af0a7ff5eefb7caf/f836f/consumer-exp-cover-page.jpg 200w,\n/static/d60c3bff962767b0af0a7ff5eefb7caf/2244e/consumer-exp-cover-page.jpg 400w,\n/static/d60c3bff962767b0af0a7ff5eefb7caf/eec3f/consumer-exp-cover-page.jpg 612w","sizes":"(max-width: 612px) 100vw, 612px"}}},"author":{"id":"Alyse Falk","github":null,"avatar":null}}}},{"node":{"excerpt":"Decentralized authentication simply means that there is no central authority needed to verify your identity, i.e., decentralized identifiers…","fields":{"slug":"/identity/what-is-decentralized-authentication/"},"html":"<p>Decentralized authentication simply means that there is no central authority needed to verify your identity, i.e., decentralized identifiers. DIDs (Decentralized Identifiers) are a special type of identifier that allows for decentralized, verified digital identification. A DID is any subject identified by the DID's controller (e.g., a person, organization, thing, data model, abstract entity, etc.). </p>\n<p>DIDs, unlike traditional federated identifiers, are designed to be independent of centralized registries, identity providers, and certificate authorities.</p>\n<h2 id=\"what-is-the-decentralized-identity-model\" style=\"position:relative;\"><a href=\"#what-is-the-decentralized-identity-model\" aria-label=\"what is the decentralized identity model permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is the Decentralized Identity Model</h2>\n<p>So, <strong>what is Decentralized Authentication</strong>, and how to achieve it? Let us try to understand it with an example. Say you move to a new country, so now, you need to verify your identity once again to every service provider to give them proof that you are the right person and not a fraud.</p>\n<p>You must register for various services, including voting, obtaining a driver's license, banking, receiving electricity, and paying for entertainment subscriptions. To open an account, you must currently register with each service provider separately and prove your identification.</p>\n<p>But decentralized authentication simplifies this process. You only have to <a href=\"https://www.loginradius.com/authentication/\">authenticate your identification</a> to a neutral third party once, and the proof of your identity is saved in an identity trust fabric (ITF). The ITF and its supporting infrastructure (i.e., decentralized identity network, services, and verified claim exchange protocols) act as a middleman between you and your service providers, handling all identification and access requests.</p>\n<h2 id=\"how-to-achieve-decentralized-authentication\" style=\"position:relative;\"><a href=\"#how-to-achieve-decentralized-authentication\" aria-label=\"how to achieve decentralized authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Achieve Decentralized Authentication</h2>\n<p>When we think of decentralization, the first word that comes to our mind is \"Blockchain\". The introduction of blockchain as a technology for implementing a decentralized and tamper-evident shared-ledger allows for new research into establishing a common trust domain.</p>\n<p>At the moment, distributed ledger technology is a viable means to construct an ITF. It provides a decentralized and relatively safe way to store and verify the proof of IDs for identities (and associated profile attributes).</p>\n<p>As of now, blockchain technology is an interesting approach to <strong>decentralized authentication.</strong> But, blockchain isn't really built for the speed and scale you'd normally associate with enterprise tech. And that's not to say business leaders should be ignoring this stuff. There's an actual sense that client stress is going to be a critical driving force around self-sovereign identity — wherein people call for that they manipulate how their private statistics are shared.</p>\n<p>Although blockchain is one promising avenue for decentralized identity, it is far from the only one. Many of the most powerful concepts behind decentralized identity can be implemented without the use of blockchain. So, we should always be looking for an alternative.</p>\n<h2 id=\"how-will-it-be-used\" style=\"position:relative;\"><a href=\"#how-will-it-be-used\" aria-label=\"how will it be used permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Will It Be Used</h2>\n<p>In one simple example, someone creates a couple of personal and public keys in an identification wallet. The public key (identifier) is hashed and saved immutably in an ITF. A dependent third party then proves the person's identification and certifies it by signing with its non-public key. </p>\n<p>The certification report is likewise saved within the ITF. If the person desires to get admission to a carrier, it's sufficient to give its identifier within the shape of a QR code or inside a token. The provider company <a href=\"https://www.loginradius.com/blog/identity/what-is-identity-verification/\">verifies the identification</a> with the aid of evaluating the hash values of identifiers with their corresponding hash facts within the ITF. </p>\n<p>If they match, admission is granted. In greater ideal scenarios, the person can derive separate key pairs from a non-public key to generate separate identifiers for one-of-a-kind relationships to allow privacy-pleasant protocols.</p>\n<h2 id=\"how-decentralized-authentication-is-influencing-industries\" style=\"position:relative;\"><a href=\"#how-decentralized-authentication-is-influencing-industries\" aria-label=\"how decentralized authentication is influencing industries permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Decentralized Authentication is Influencing Industries</h2>\n<p>Businesses and industries that understand and capture the possibility to apply rising standardized decentralized identification technology for client identification control will create a long-time period of aggressive gain. It permits them to leapfrog the opposition and preserve their lead some distance into the future.</p>\n<p>This main area will come from having a holistic approach to identification control that encompasses identification, security, and privacy. For the companies with the foresight to embody them, decentralized identification technology will:  </p>\n<ul>\n<li>Reduce the want for centralized databases to absolutely the minimum (e.g., for regulatory purposes) and accordingly provide clients complete control and possession over their non-public information.</li>\n<li><a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">Reduce vulnerability to information misuse</a> via the ones charged with coping with it, and to cyberattacks, fraud, and different monetary crimes.</li>\n<li>Give extra comfort to clients via ways of putting off passwords for login and ongoing authentication. </li>\n<li>Generate remarkable degrees of human acceptance as true among the corporation and its customers and companions.</li>\n<li>Reduce the compliance burden of dealing with clients' private information in services.</li>\n<li>Allow participation in open, trustworthy, interoperable standards.</li>\n<li>Enable interesting new enterprise alliances inside which companions can talk and trade records securely to supply services (e.g., in scientific or education).</li>\n</ul>\n<p>We know that <strong>Decentralized Authentication</strong> is the key to advancing in the future, and now it depends on how we try to implement it. Some problems may arise, but we never move ahead in the game/life if we are not up for a challenge.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 21, 2021","updated_date":null,"description":"Decentralized Authentication is the key to advancing in the future, and now it depends on how you try to implement it. This blog explains what decentralization means for the next wave of business security.","title":"Decentralized Authentication: What Is It And How It Is Changing the Industry","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.694915254237288,"src":"/static/93cdd284b9caf8254977b8b515d06797/14b42/what-is-decentralized-authentication-cover.jpg","srcSet":"/static/93cdd284b9caf8254977b8b515d06797/f836f/what-is-decentralized-authentication-cover.jpg 200w,\n/static/93cdd284b9caf8254977b8b515d06797/2244e/what-is-decentralized-authentication-cover.jpg 400w,\n/static/93cdd284b9caf8254977b8b515d06797/14b42/what-is-decentralized-authentication-cover.jpg 800w,\n/static/93cdd284b9caf8254977b8b515d06797/16310/what-is-decentralized-authentication-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"OpenID Connect has brought a revolution in the authentication process and ascended by leaps and bounds. It is primarily used in the single…","fields":{"slug":"/identity/what-is-openid-connect/"},"html":"<p>OpenID Connect has brought a revolution in the authentication process and ascended by leaps and bounds. It is primarily used in the <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">single sign-on</a> (SSO) and identity provision on the web. The main reason behind its success is the JSON-based ID tokens (JWT) delivered via the OAuth 2.0 process flow.</p>\n<p>Firstly, let’s have a quick look at OAuth 2.0. </p>\n<p>Often referred to as authorization or delegation protocol, it is a security standard where you authorize an application to access your data, or use features in another application on your behalf, without giving them your password. </p>\n<p>In simple terms, it provides applications the ability to “secure designated access.” OAuth never shares password data but instead uses authorization tokens to prove an identity between consumers and service providers. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password.</p>\n<h2 id=\"what-is-openid-connect-oidc\" style=\"position:relative;\"><a href=\"#what-is-openid-connect-oidc\" aria-label=\"what is openid connect oidc permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is OpenID Connect (OIDC)</h2>\n<p>Now, let us learn about OpenID Connect. It is an OpenID Foundation (OIDF) standard that leverage OAuth 2.0 process flow to add an identity layer in order to obtain basic profile information about the End-User in an interoperable and REST-like manner or verify the identity of the End-User on the basis of the authentication done by an Authorization Server or Identity Provider (IDP). </p>\n<p>OpenID Connect supports clients of all types, including web-based, mobile, and JavaScript clients, to request and receive information about authenticated sessions and end-users. By implementing OpenID Connect, leveraging OAuth 2.0 fabricates a unified framework that promises mobile native applications, secure APIs, and browser applications in a single, cohesive architecture.</p>\n<h2 id=\"what-openid-connect-solves\" style=\"position:relative;\"><a href=\"#what-openid-connect-solves\" aria-label=\"what openid connect solves permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What OpenID Connect Solves</h2>\n<p>It is a very common practice to deploy the same password across multiple applications and websites. Since the traditional credentials are not centrally administered, if the security of any website that you use is compromised, a hacker could gain access to your password across multiple sites. </p>\n<p>Here comes OpenID connect in the picture as it never shares a password with any website. Even then, if a compromise does occur, you can immediately prevent any malicious access to your accounts at any website by simply changing the password for your OpenID Connect.</p>\n<p><strong>Also Read: <a href=\"https://www.loginradius.com/blog/engineering/guest-post/add-authentication-to-play-framework-with-oidc-and-loginradius/\">Add Authentication to Play Framework With OIDC and LoginRadius</a></strong></p>\n<h2 id=\"how-openid-connect-works\" style=\"position:relative;\"><a href=\"#how-openid-connect-works\" aria-label=\"how openid connect works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How OpenID Connect Works</h2>\n<p>Before proceeding further, let’s have a look at some of the terminologies:</p>\n<ol>\n<li><strong>Client:</strong> The client is the application that’s trying to access the user’s account. It needs to get permission from the user before accessing the account. For example, a client application can present the user with the login page to get an access token for access to a particular resource.</li>\n<li><strong>Authorization Server:</strong> The authorization server validates the user credentials and redirects the user back to the client with an authorization code. The client communicates with the authorization server to confirm its identity and exchanges the code for an access token.</li>\n<li><strong>Scope:</strong> It specifies the level of access that the application is requesting from the client.</li>\n<li><strong>Claims:</strong> It constitutes the payload part of a JSON web token and represents a set of information exchanged between two parties.</li>\n</ol>\n<p>The application begins with an OAuth 2.0 flow that asks the user to authorize a request. As part of the flow, the client will include the OpenID Connect scope with scopes for any additional information it wants about the user. As the request is processed, the client receives an access token and an ID token issued by the authorization server. The ID token contains claims that have information about the user. </p>\n<p>The SSO is implemented by delivering ID tokens from the authorization server to the client. The client then contacts a dedicated endpoint on the authorization server known as the UserInfo endpoint to receive the remaining claims about the user using the access token. </p>\n<p>It is this ID token which is also known as the J<a href=\"https://www.loginradius.com/blog/engineering/jwt/\">SON Web Token (JWT)</a>, which contains claims, which are nothing but statements (like an email address or name) about an entity (the user) and some additional metadata. </p>\n<p>The OpenID Connect specification has a defined set of standard claims. The set of standard claims include name, email, gender, birth date, and so on. However, if you want to capture information about a user and there currently isn’t a standard claim that best reflects this piece of information, you can create custom claims and add them to your tokens.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"what-is-openid-connect-1\"\n        title=\"what-is-openid-connect-1\"\n        src=\"/static/451f1a4e5feecdeb41c4dc3cc4046e48/e5715/what-is-openid-connect-1.png\"\n        srcset=\"/static/451f1a4e5feecdeb41c4dc3cc4046e48/a6d36/what-is-openid-connect-1.png 650w,\n/static/451f1a4e5feecdeb41c4dc3cc4046e48/e5715/what-is-openid-connect-1.png 768w,\n/static/451f1a4e5feecdeb41c4dc3cc4046e48/d0143/what-is-openid-connect-1.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>For instance, let us say you want to use OpenID Connect to authenticate the user for your own application using Google’s OAuth URL.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAOCAYAAAAvxDzwAAAACXBIWXMAAAsSAAALEgHS3X78AAABn0lEQVQ4y3VUSU7DQBD0T/kD3+EBHHNEXODMEQmJQ4SisEXE29jM2LMX3TZOHC+tjMYZ9XRVd5WdxBjBwft0cThnUTctLY0Qwix3GsmQsBbSRmSlhCgLGL8MPq6RDA/WOWht0GoNbSw8MVNUTFoF/7hB/rxD6YmxDzPQMaFTwbf9J7a7d6R5CSkV0lrhoAKsFrh/ucXN0wdEG/GjCMgFGoVD09IY1hgWooKiWXEoFyEMM4loidVXQwBNTS2jK1DqgKOQKOnOrOCUsgsRKbHwIwHAv3jOs94jZ6RJy7wn06GW2iOTmmboRuf96kRgUGuRK4Pa+AuRTi0PfzSpyEkNzWggvWgl2moaSdaQkP7SSmeVqVjV2j6xdThS21OPcvDMGPSQlUgL0d2xYaFlPnw95Lh+2OPqbofNViyamBkZWjkJ8l01KAh87M+LghUhZ5VEoXTHtC+EmYF/bUBjXCdeSm27McOxIIzMbpF0Qdmw+vYIEo7FG9gu+vBsnf/WXF/U07m2rlvMhMHM5G2Z2WbpA8HRFaPLktrjxS4IK7nD8x8zVUvEoknMTQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"what-is-openid-connect-2\"\n        title=\"what-is-openid-connect-2\"\n        src=\"/static/c5975515186d2504fcffefda5c889c80/e5715/what-is-openid-connect-2.png\"\n        srcset=\"/static/c5975515186d2504fcffefda5c889c80/a6d36/what-is-openid-connect-2.png 650w,\n/static/c5975515186d2504fcffefda5c889c80/e5715/what-is-openid-connect-2.png 768w,\n/static/c5975515186d2504fcffefda5c889c80/2bef9/what-is-openid-connect-2.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Step 1:</strong> On clicking the sign-in button, you are required to pass a few parameters like <strong>scope, **which is a space-delimited list of scopes, **response_type</strong> having the value code, <strong>client_id</strong> having the client identifier, <strong>redirect_uri</strong> having the client redirect URI, and <strong>state</strong> having a random string. </p>\n<p><strong>Step 2:</strong> The OpenID provider authenticates users for a particular application instance.</p>\n<p><strong>Step 3:</strong> A one-time-use code is passed back to the client using a predefined Redirect URI.</p>\n<p><strong>Step 4:</strong> The user interface can then share this temporary code with the server</p>\n<p><strong>Step 5:</strong> The server can exchange this code in order to get access to the user’s profile. </p>\n<p>Here, technically speaking, you are not only getting the user profile but an Access Token and an ID Token having all the details of the user’s profile.</p>\n<h2 id=\"openid-connect-vs-openid-20\" style=\"position:relative;\"><a href=\"#openid-connect-vs-openid-20\" aria-label=\"openid connect vs openid 20 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OpenID Connect vs OpenID 2.0</h2>\n<p>OpenID Connect performs various tasks similar to OpenID 2.0, but it does so in such a way that it is API-friendly and usable by mobile and native applications. OpenID Connect defines optional mechanisms for encryption and robust signing. In OpenID Connect, OAuth 2.0 capabilities are integrated with the protocol itself, whereas the integration of OAuth 1.0a and OpenID 2.0 requires an extension.</p>\n<p>OpenID Connect and OpenID 2.0 have many architectural similarities. Furthermore, a very similar set of problems are solved by the protocols. However, OpenID 2.0 uses XML and a custom message signature scheme. Their implementations would sometimes abnormally refrain from interoperating. OAuth 2.0, leveraged by OpenID Connect, outsources the required encryption to the web’s built-in TLS (also called SSL or HTTPS) infrastructure, which is implemented on both client and server platforms universally. When signatures are required, OpenID Connect uses standard JSON Web Token (JWT) data structures. For this reason, OpenID Connect is easier for developers to implement, and when implemented, it results in much better interoperability.</p>\n<p>The story of OpenID Connect interoperability has been proven in practice when an extended series of interoperability trials were conducted by members of the OpenID Connect Working Group and the developers behind numerous OpenID Connect implementations.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>OpenID Connect, its predecessors, and other <a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">public-key-encryption-based authentication</a> frameworks guarantee the security of the complete internet by having the responsibility for user identity verification in the hands of the most trusted and reliable service providers. If compared with the one which is available earlier, OpenID Connect is a way easier approach to implement and integrate and is expected to achieve a much-outspread acceptance.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 21, 2021","updated_date":null,"description":"This article  discusses the basics of OpenID Connect. Its components, and strengths as well as implementation details you need to know about when using it in a real world scenario.","title":"Getting Started with OpenID Connect","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/0625350ba691ab9d9997de97feb52d80/14b42/what-is-openid-connect-cover.jpg","srcSet":"/static/0625350ba691ab9d9997de97feb52d80/f836f/what-is-openid-connect-cover.jpg 200w,\n/static/0625350ba691ab9d9997de97feb52d80/2244e/what-is-openid-connect-cover.jpg 400w,\n/static/0625350ba691ab9d9997de97feb52d80/14b42/what-is-openid-connect-cover.jpg 800w,\n/static/0625350ba691ab9d9997de97feb52d80/16310/what-is-openid-connect-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Gurjyot Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"Over the past two years, the retail industry has changed to such an extent that it is no longer recognizable. This is primarily because a…","fields":{"slug":"/growth/how-ciam-can-resolve-retail-industry-challenges/"},"html":"<p>Over the past two years, the retail industry has changed to such an extent that it is no longer recognizable. This is primarily because a major portion of the revenue that retail businesses are bringing in happens through online sales. This dependency on online platforms can be a problem for retailers, especially when it comes to access management. Fortunately, there’s a solution—Consumer Identity and Access Management (CIAM).</p>\n<h2 id=\"what-is-ciam-for-the-retail-industry\" style=\"position:relative;\"><a href=\"#what-is-ciam-for-the-retail-industry\" aria-label=\"what is ciam for the retail industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is CIAM for the Retail Industry</h2>\n<p>CIAM is generally deployed on a platform in two ways, either as a service or embedded into applications or websites through APIs, so it carries out identity and access management for users. Typically, CIAM authentication involves identity management tools like <a href=\"https://www.loginradius.com/authentication/\">logins, authentication</a>, and compliance.</p>\n<h2 id=\"5-challenges-that-consumer-facing-enterprises-face-today\" style=\"position:relative;\"><a href=\"#5-challenges-that-consumer-facing-enterprises-face-today\" aria-label=\"5 challenges that consumer facing enterprises face today permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Challenges that Consumer-Facing Enterprises Face Today</h2>\n<p>The modern retail industry has several challenges that can be solved by deploying a CIAM solution. These problems include a need for:</p>\n<ul>\n<li>Fluid platform experience</li>\n</ul>\n<p>Customers always expect a seamless <a href=\"https://www.loginradius.com/blog/fuel/improve-customer-experience-ecommerce/\">experience on an e-commerce platform</a>. This experience is facilitated by the fact that the online store should have more or less the same products as that of the offline store. The other aspect involves the wish to have an easily accessible customer profile by integrating the customer data collected from all integration points, both online as well as offline. </p>\n<ul>\n<li>Multichannel purchasing</li>\n</ul>\n<p>One of the more challenging aspects that enterprises face when extending their business online is visiting both online and offline stores. This means that both stores have to deliver the customer’s needs and engage them irrespective of which channel they plan on making the purchase.</p>\n<ul>\n<li>Presence of data silos</li>\n</ul>\n<p>Marketing in the modern <a href=\"https://www.loginradius.com/industry-retail-and-ecommerce/\">retail industry</a> occurs on various platforms. It can take place through SMS, email, social media, and more. Therefore, there is a chance that data silos will appear because the marketing efforts are spread out across so many channels.</p>\n<ul>\n<li>Underdeveloped marketing procedures</li>\n</ul>\n<p>It has been established that an <a href=\"https://www.loginradius.com/blog/fuel/Top-5-Marketing-Strategies-to-Power-up-Your-Business/\">effective marketing strategy</a> involves the use of technology for data collection and analysis. However, the challenge that enterprises face is finding a solution that can manage such vast volumes of customer information and create a cohesive picture.</p>\n<ul>\n<li>Need for customer loyalty    </li>\n</ul>\n<p>Another challenging aspect that online platforms face is the problem of personalization. Personalization, if executed properly, can urge the customer to make several purchases at a time and keep them coming back for more. In other words, it can improve the loyalty of the customer. However, this requires the platform to get to know the customer and their wants and needs, which is difficult.</p>\n<p><a href=\"https://www.loginradius.com/resource/omnichannel-retailer-customer-experience\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABbUlEQVQY0z2RO08CURCFNxawbIgxagQK0ERAYB/swnJ57vKGIEgijfFRGDtj1MpKsbEx/hGtTLTyUVhoY2zsbEz8KcfZu2Lx3Zlk5p6cmRF88QocpJUK/AmLsN2YdOOk7iBGS5DkBuYL65jTmvApLYiJKsRYGeJfj+A2W0iyKgxWgGzkCBNarohsuYaAVoM3WnZF6aNfayNS34Tc2oDERhC1LqS4W3eEBTepwLTb6A/6aHY6aBEZ04Sq6whqNrxU95K7WXIVzHSJDgLZLiKshxDlC0aHT8gFncdxqDALhVIJmRzjqLoBJa2TwyoXnDhwCJk9LBbXEC4MMC3X4Vku/a+FC0q0t1g6j5SsQM2QMxrZyOU5AdXmdSGk42B8ha/vH9w+vOD67hE39094+/jE8+s7ZpQGPDSF4B7EQorZ0E2G3nCE1uoa8lYdbYrhbJsay5haYsgPd7F/eontozG2Ds84eycX2Dk+50f0krlfoATGB3kQsskAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-omnichannel-retail\"\n        title=\"WP-omnichannel-retail\"\n        src=\"/static/65a54263b59b27c00e863e6b1891c5a6/e5715/WP-omnichannel-retail.png\"\n        srcset=\"/static/65a54263b59b27c00e863e6b1891c5a6/a6d36/WP-omnichannel-retail.png 650w,\n/static/65a54263b59b27c00e863e6b1891c5a6/e5715/WP-omnichannel-retail.png 768w,\n/static/65a54263b59b27c00e863e6b1891c5a6/81501/WP-omnichannel-retail.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"5-benefits-of-implementing-ciam-for-e-commerce-platforms\" style=\"position:relative;\"><a href=\"#5-benefits-of-implementing-ciam-for-e-commerce-platforms\" aria-label=\"5 benefits of implementing ciam for e commerce platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Benefits of Implementing CIAM for E-commerce Platforms</h2>\n<p>If an enterprise is on the fence about the ability to create a digital identity for B2C users, it can help to consider its benefits. These include:</p>\n<ul>\n<li>Storage of customer data</li>\n</ul>\n<p>Customer data can be a very useful resource while devising a marketing strategy and making sales. <a href=\"https://www.loginradius.com/press/loginradius-named-a-top-customer-identity-and-access-management-ciam-vendor-by-gartner-and-forrester/\">Top CIAM providers</a> make it possible to collect certain information about the customer while also protecting it from hackers. The data that this software can collect extends beyond just the login registration form that they fill. It can also collect information from third-party social media sites regarding their preferences.</p>\n<ul>\n<li>Secure authentication</li>\n</ul>\n<p>One major aspect of CIAM solutions is the <a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\">multi-factor authentication</a> feature that it provides. By having more than one requirement to gain access to a profile, customers can receive an extra level of protection. This feature can significantly improve the existing business customer identity as users can utilize social media logins for a more streamlined process.</p>\n<p>Also Download: <a href=\"https://www.loginradius.com/resource/whitepaper/identity-management-ecommerce/\">Identity Management Architectures for Ecommerce Products</a></p>\n<ul>\n<li>Password reset ease</li>\n</ul>\n<p>In case customers forget their passwords, the CIAM software solution offers customers the option to reset their passwords on their own. The new password is sent directly to the user’s email or SMS. Therefore, there is no need for intervention from an IT professional to reset it.</p>\n<ul>\n<li>Scalability</li>\n</ul>\n<p>CIAM solutions are a requirement for every user’s profile, whether several hundred or millions visit the platform. Therefore, the software must be capable of managing multiple identities at a time while also not interfering with the seamless running of the platform.</p>\n<ul>\n<li>Streamlined experience</li>\n</ul>\n<p>CIAM also helps to improve the overall intuitiveness of the platform. Research shows that the more <a href=\"https://www.loginradius.com/blog/identity/new-age-ciam/\">convenient a user experience</a> is on an e-commerce platform, the higher the sales skyrocket.</p>\n<p>Therefore, CIAM solutions are an integral aspect of the online shopping experience. It goes beyond just streamlining the platform to make it more intuitive, and can also help to boost the marketing and sales efforts of a business in the retail industry.</p>\n<h2 id=\"the-future-of-ciam-in-retail\" style=\"position:relative;\"><a href=\"#the-future-of-ciam-in-retail\" aria-label=\"the future of ciam in retail permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Future of CIAM in Retail</h2>\n<p>The CIAM industry is rapidly evolving to meet the growing demands of the retail sector. As retailers continue to face challenges in access management and customer engagement, CIAM solutions are poised to play an increasingly vital role. Here's a look at what the future holds for CIAM in the retail industry:</p>\n<h3 id=\"1-enhanced-personalization\" style=\"position:relative;\"><a href=\"#1-enhanced-personalization\" aria-label=\"1 enhanced personalization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Enhanced Personalization</h3>\n<p>CIAM solutions will delve deeper into customer data, allowing retailers to create highly personalized shopping experiences. By understanding customer preferences and behavior across various touchpoints, retailers can tailor promotions and product recommendations, fostering greater customer loyalty.</p>\n<h3 id=\"2-advanced-security-measures\" style=\"position:relative;\"><a href=\"#2-advanced-security-measures\" aria-label=\"2 advanced security measures permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Advanced Security Measures</h3>\n<p>With cyber threats on the rise, CIAM solutions will continue to prioritize robust security features. Multi-factor authentication, biometric verification, and adaptive access controls will become standard, ensuring customer data remains secure and protected from breaches.</p>\n<h3 id=\"3-integration-with-emerging-technologies\" style=\"position:relative;\"><a href=\"#3-integration-with-emerging-technologies\" aria-label=\"3 integration with emerging technologies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Integration with Emerging Technologies</h3>\n<p>The retail landscape is embracing innovations such as Internet of Things (IoT) and Artificial Intelligence (AI). CIAM solutions will integrate seamlessly with these technologies, enabling retailers to gather real-time insights and deliver more context-aware customer experiences.</p>\n<h3 id=\"4-omni-channel-optimization\" style=\"position:relative;\"><a href=\"#4-omni-channel-optimization\" aria-label=\"4 omni channel optimization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Omni-Channel Optimization</h3>\n<p>As customers expect a unified experience across online and offline channels, CIAM will facilitate seamless omni-channel journeys. Customers will enjoy consistent interactions, whether browsing a website, visiting a physical store, or engaging through social media platforms.</p>\n<h3 id=\"5-scalability-and-flexibility\" style=\"position:relative;\"><a href=\"#5-scalability-and-flexibility\" aria-label=\"5 scalability and flexibility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Scalability and Flexibility</h3>\n<p> CIAM solutions will be designed to scale effortlessly, accommodating the ever-growing user base of retail platforms. Whether a retailer serves hundreds or millions of customers, CIAM will ensure smooth operations without compromising performance.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In conclusion, the retail industry faces a multitude of challenges in the digital age, from data silos to the need for enhanced customer loyalty. However, CIAM solutions offer a promising way forward, providing various benefits that can transform how retailers engage with their customers.</p>\n<p>By leveraging CIAM, retailers can streamline access management, secure customer data, and deliver personalized experiences that drive sales and loyalty. As the CIAM market continues to expand and innovate, retail businesses have an opportunity to stay ahead of the curve and thrive in an increasingly competitive landscape.</p>\n<p>Incorporating CIAM solutions into e-commerce platforms is not just a trend; it's becoming a necessity for success. As the retail industry evolves, CIAM will remain a critical tool for enhancing the overall customer experience, boosting marketing efforts, and navigating the challenges of the modern retail landscape.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What problem does CIAM solve?</strong> </p>\n<p>CIAM solves challenges in access management, unifying customer data, and enhancing customer loyalty through personalized experiences.</p>\n<p><strong>2. What are the best practices of CIAM?</strong></p>\n<p>Best practices include multi-factor authentication, centralized data management, seamless omni-channel integration, and scalability for growing user bases.</p>\n<p><strong>3. What are the 3 most critical issues in retailing and why?</strong></p>\n<p>The critical issues in retailing are fluid platform experience for seamless customer journeys, integration of online and offline channels for omni-channel purchasing, and the challenge of data silos hindering marketing efforts.</p>\n<p><strong>4. What are the challenges of retail marketing?</strong></p>\n<p>Retail marketing faces challenges such as reaching customers across multiple platforms, managing data silos, and the need for personalized strategies to enhance customer loyalty.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 17, 2021","updated_date":null,"description":"The modern retail industry has several challenges that can be solved by deploying a CIAM solution. Read this blog to learn how CIAM goes beyond just streamlining a platform to make it more intuitive, and how it boosts the marketing and sales efforts of a business in the retail industry.","title":"5 Key CIAM Benefits and Challenges in the Retail Industry","tags":["mfa","ciam provider","user experience","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/3cf02a44bdfccb1d1f7f38c05f888dd6/eec3f/retail-industry.jpg","srcSet":"/static/3cf02a44bdfccb1d1f7f38c05f888dd6/f836f/retail-industry.jpg 200w,\n/static/3cf02a44bdfccb1d1f7f38c05f888dd6/2244e/retail-industry.jpg 400w,\n/static/3cf02a44bdfccb1d1f7f38c05f888dd6/eec3f/retail-industry.jpg 612w","sizes":"(max-width: 612px) 100vw, 612px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":384,"currentPage":65,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}