{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/68","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"User onboarding refers to the complete process that users go through when they first become a customer of your product or service. The…","fields":{"slug":"/growth/successful-saas-onboarding-process/"},"html":"<p>User onboarding refers to the complete process that users go through when they first become a customer of your product or service. The onboarding process can shape your customer's long-term connection with your product.</p>\n<p>Learning and implementing SaaS software into a proper user management system is not more difficult than learning a new language, going to the gym, or practicing morning meditation.</p>\n<p>When a user signs up for a free SaaS trial, it is your job to ensure they must regularly utilize your program. Therefore as a SaaS provider, you must assist new users as much as possible over the first few weeks.</p>\n<p>Here are a few phases you should know about when it comes to <a href=\"https://www.loginradius.com/blog/fuel/importance-customer-onboarding/\">consumer onboarding</a>.</p>\n<h3 id=\"user-onboarding-phase-1\" style=\"position:relative;\"><a href=\"#user-onboarding-phase-1\" aria-label=\"user onboarding phase 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Onboarding: Phase 1</h3>\n<p>The initial onboarding phase does not occur on your website or blog but typically occurs on social media, in a forum or remark, or on another person's blog. Your onboarding experience begins with a customer's first interaction with your brand.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 612px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.66666666666666%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"steps-user-onboarding\"\n        title=\"steps-user-onboarding\"\n        src=\"/static/9b453109b5a38feaa9bb4501e529553a/a18e1/user-onboarding2.jpg\"\n        srcset=\"/static/9b453109b5a38feaa9bb4501e529553a/a18e1/user-onboarding2.jpg 612w\"\n        sizes=\"(max-width: 612px) 100vw, 612px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"user-onboarding-phase-2\" style=\"position:relative;\"><a href=\"#user-onboarding-phase-2\" aria-label=\"user onboarding phase 2 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Onboarding: Phase 2</h3>\n<p>The User Onboarding process continues on your website after that. You must now educate people about the problem you are addressing while also introducing your brand and product. People don't want to spend hours on your website, so employing tools that allow you to communicate your message as clearly and quickly as possible is the ideal approach to speed things up.</p>\n<p>Also Read: <a href=\"https://www.loginradius.com/blog/fuel/user-onboarding-tools/\">Top 27 User Onboarding Tools: Highly Recommended for Businesses</a></p>\n<h3 id=\"user-onboarding-phase-3\" style=\"position:relative;\"><a href=\"#user-onboarding-phase-3\" aria-label=\"user onboarding phase 3 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Onboarding: Phase 3</h3>\n<p>At this point, you must show your product in the best possible light and sell it to your potential consumers in the most efficient manner possible because a poor conversion rate implies you will not be able to cover acquisition expenses, which would almost certainly ruin your business.</p>\n<h3 id=\"user-onboarding-phase-4\" style=\"position:relative;\"><a href=\"#user-onboarding-phase-4\" aria-label=\"user onboarding phase 4 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Onboarding: Phase 4</h3>\n<p>User engagement and feature uptake are closely linked to a well-structured user onboarding process. You control what happens and lead users through a specified set of tasks via onboarding tours and walkthroughs. To increase user engagement, you must strike a balance between directing and letting them explore your product.</p>\n<h3 id=\"user-onboarding-phase-5\" style=\"position:relative;\"><a href=\"#user-onboarding-phase-5\" aria-label=\"user onboarding phase 5 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Onboarding: Phase 5</h3>\n<p>At this point, your customer should be familiar with all of your solution's procedures and advantages, and they should have been using it regularly.</p>\n<h3 id=\"user-onboarding-phase-6\" style=\"position:relative;\"><a href=\"#user-onboarding-phase-6\" aria-label=\"user onboarding phase 6 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Onboarding: Phase 6</h3>\n<p>One should consider a comprehensive customer success strategy for featuring requests and collecting customer feedback, which will help in increasing engagements resulting in direct revenue from the referrals. If something goes wrong, customer service should take over, and you'll certainly need the best tools to be able to act quickly and address the situation.</p>\n<p>So, after getting acquainted with all the phases mentioned above, it might now have become clear how the entire process of onboarding customers for your SaaS Business is.</p>\n<p>The onboarding process should be done properly, it can take your business to new heights, and if not, it might result in its destruction. So, always choose the process carefully.</p>\n<p>Now, below we will discuss some elements that you need to keep in mind while onboarding consumers for your SaaS business.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-user-management/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-User-management\"\n        title=\"DS-User-management\"\n        src=\"/static/01c0f502c70b5e74254b6a8df86c4088/e5715/DS-User-management.png\"\n        srcset=\"/static/01c0f502c70b5e74254b6a8df86c4088/a6d36/DS-User-management.png 650w,\n/static/01c0f502c70b5e74254b6a8df86c4088/e5715/DS-User-management.png 768w,\n/static/01c0f502c70b5e74254b6a8df86c4088/81501/DS-User-management.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"4-important-saas-onboarding-elements\" style=\"position:relative;\"><a href=\"#4-important-saas-onboarding-elements\" aria-label=\"4 important saas onboarding elements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4 Important SaaS Onboarding Elements</h2>\n<h3 id=\"1-signup-process\" style=\"position:relative;\"><a href=\"#1-signup-process\" aria-label=\"1 signup process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Signup process</h3>\n<p>You start setting expectations and gathering important information about user objectives and priorities during signup. <a href=\"https://accounts.loginradius.com/auth.aspx?action=register\">LoginRadius</a>, for example, uses the signup process to obtain the information necessary to set up the product. Instead of forcing users to start from scratch and construct their teams and projects, they provide a list of options at signup. When a user completes registration, that information is auto-filled.</p>\n<h3 id=\"2-welcome-email\" style=\"position:relative;\"><a href=\"#2-welcome-email\" aria-label=\"2 welcome email permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Welcome email</h3>\n<p>The welcome email is crucial since it is your customer's initial point of contact once they've registered an account. It's also the first genuine email you've sent them, so you'll want to establish communication expectations.</p>\n<h3 id=\"3-first-login\" style=\"position:relative;\"><a href=\"#3-first-login\" aria-label=\"3 first login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. First login</h3>\n<p>A user's initial impression of an app is formed at the first login. Examine your first login experience if you want to decrease churn. It will either start the process or stop it in its tracks. Keep in mind that there should be no issues with <a href=\"https://www.loginradius.com/authenticate/\">login authentication</a>.</p>\n<h3 id=\"4-product-tutorials\" style=\"position:relative;\"><a href=\"#4-product-tutorials\" aria-label=\"4 product tutorials permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Product tutorials</h3>\n<p>It's nice to get a welcome message on the initial login, but you're here to help users in the long term. Product tours and tooltips provide on-demand training on how to use your app in your community.</p>\n<p>There are several methods to deliver product lessons for a better user experience, just as with any other onboarding component.</p>\n<p>These are some of them:</p>\n<ul>\n<li>To keep users on track, the UI includes a “getting started” checklist.</li>\n<li>An in-app learning center or a tour of a popular product</li>\n<li>Along with numerous functionalities, there are tutorial buttons.</li>\n</ul>\n<p>When it comes to <a href=\"https://www.loginradius.com/blog/fuel/why-is-consumer-onboarding-critical-for-startups/\">SaaS onboarding</a>, ask as many questions as you can and get as many answers as possible. Consult the statistics as well as user input. Communication across departments is crucial.</p>\n<p>Start working on fixing your weak points once you've recognized them. Begin by making one adjustment at a time and seeing how it affects your cohort analysis. Your onboarding strategy won't be built in a day, and it won't be modified in a day, either.\n<a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 27, 2021","updated_date":null,"description":"The onboarding process is the lifeline for your customer, and it's one of the most valuable tools that you as a company can control. Here are a few tips for a stellar SaaS company onboarding process that will greatly improve your customer retention and overall satisfaction.","title":"The ABCs of a Successful Saas Onboarding Process","tags":["user onboarding","saas","login authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/dea6be4ce25634acef1a3e06fb237ed3/eec3f/user-onboarding.jpg","srcSet":"/static/dea6be4ce25634acef1a3e06fb237ed3/f836f/user-onboarding.jpg 200w,\n/static/dea6be4ce25634acef1a3e06fb237ed3/2244e/user-onboarding.jpg 400w,\n/static/dea6be4ce25634acef1a3e06fb237ed3/eec3f/user-onboarding.jpg 612w","sizes":"(max-width: 612px) 100vw, 612px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"Privileged Access Management (PAM) includes cyber security strategies and technologies for applying control over the privileged access and…","fields":{"slug":"/identity/what-is-privileged-access-management/"},"html":"<p>Privileged Access Management (PAM) includes cyber security strategies and technologies for applying control over the privileged access and permission for users, accounts, processes, and systems across an environment.</p>\n<p>By appropriately giving privileged access control, PAM can help organizations control and reduce the possibility of the attack from third parties and prevent the internal carelessness of the individual. PAM is not only applicable to a human being, but it also applies to the non-humans such as application and machine identity.</p>\n<p><strong>Example:</strong></p>\n<p>Let's consider an admin account. So what does a PAM do? It will take the privileged account credentials and put them in a secure place or in the vault, which will isolate the use of the privileged account credentials, reducing the risk of any attacks or misleadings.</p>\n<p>Since it was kept inside the repository, the system administrator will need to go to the PAM system to <a href=\"https://www.loginradius.com/authentication/\">access their credentials</a>. When they request access to credentials, they will be authenticated at different levels. </p>\n<p>Once all the authentication is done, they will be provided access to their credentials. Also, once these credentials are put in the repository, all their processes will be reset, and for the subsequent time, all methods need to be repeated to get the credentials.</p>\n<h2 id=\"what-are-the-different-types-of-privileged-access-management-accounts\" style=\"position:relative;\"><a href=\"#what-are-the-different-types-of-privileged-access-management-accounts\" aria-label=\"what are the different types of privileged access management accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Different Types of Privileged Access Management Accounts?</h2>\n<p>The following are the different types of Privilege Access management accounts: </p>\n<h3 id=\"1-local-administrative-accounts\" style=\"position:relative;\"><a href=\"#1-local-administrative-accounts\" aria-label=\"1 local administrative accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Local Administrative Accounts</h3>\n<p>These are the shared accounts that provide admin access to the local host or session only. The IT staff typically uses these accounts to perform maintenance or set up the new workstations.</p>\n<h3 id=\"2-privileged-user-accounts\" style=\"position:relative;\"><a href=\"#2-privileged-user-accounts\" aria-label=\"2 privileged user accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Privileged User Accounts</h3>\n<p>These are the users that are granted administrative privileges to systems. Privileged User Accounts are among the most common types of accounts that have access granted on an enterprise domain. These give administrative rights to one or more systems. </p>\n<p>Generally, these accounts have <a href=\"https://www.loginradius.com/blog/identity/how-to-choose-a-secure-password/\">unique and complex passwords</a>, but most of the time are protected by passwords alone. These are the types of accounts that should be monitored closely. And these are the accounts that sometimes do not belong to the individual user instead of that they are shared among the multiple admins.</p>\n<h3 id=\"3-domain-admin-accounts\" style=\"position:relative;\"><a href=\"#3-domain-admin-accounts\" aria-label=\"3 domain admin accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Domain Admin Accounts</h3>\n<p>These super admin accounts have access to all the organization's workstations, and it provides the most extensive access across the network. They can modify the membership of every administrative account within the domain. These accounts are under the attacker's radar and should be monitored closely, and PAM should be implemented here.</p>\n<h3 id=\"4-service-accounts\" style=\"position:relative;\"><a href=\"#4-service-accounts\" aria-label=\"4 service accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Service Accounts</h3>\n<p> It is the type of accounts that are privileged local or domain accounts that are used by the application or service to interact with the operating system. In some cases, these service accounts have administrative privileges on domains depending on the requirements of the application they are used for.</p>\n<h3 id=\"5-emergency-accounts\" style=\"position:relative;\"><a href=\"#5-emergency-accounts\" aria-label=\"5 emergency accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Emergency Accounts</h3>\n<p>It is the type of account that provides the unprivileged users with admin access in case of emergency to protect the system. They are also called 'firecall' or 'break glass accounts. Access to this account requires the organization's IT management team approval. Most of the time, this is a manual process because of which it rarely lacks any security measures.</p>\n<h2 id=\"what-are-the-features-of-a-pam-software\" style=\"position:relative;\"><a href=\"#what-are-the-features-of-a-pam-software\" aria-label=\"what are the features of a pam software permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Features of a PAM software?</h2>\n<p>We have already discussed why Privileged Access Management (PAM) is useful for organizations that are growing or have an extensive IT system within the organization itself.</p>\n<p>Now, let's discuss the features that the PAM software provides:</p>\n<ul>\n<li>It provides the <a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-Factor Authentication service</a> for the administrators.</li>\n<li>It has an access manager that stores all the information about permissions and privileged user information.</li>\n<li>As we know, in PAM, passwords are stored in secret places or vaults, So this is also provided by the PAM itself.</li>\n<li>It also provides the facility of dynamic authorization, which means access to individual users for a particular period.</li>\n<li>It also has automatic provisioning and deprovisioning, which helps reduce insider threats, and the Audit logs feature that allows the organization to meet the compliance requirements.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABkklEQVQY0zWQyy9jYRjGTwQ9vYlQpTrViJ7T0lZIpeq0TqN1mWSmBAuKxCVCIqQrEqEiqUjM7GYjwcaKjQUWkxmJhZmNlZ2NZP6V33znHBZPvuR7n/e5vJJdzeBS01SVT4me/eViYpfVVp363ApSewG3msMu5gZPDmk4onk8qUkau/PYY8PIkSyykkY25gKSQXQoGt6dH/gq9ywnF0koWRKfUsj+EdzhvCBqlqDgOeMjBIZmiQ7P4EhOYYuPiv13Q/FKspLBKRLUrVWQisdIsRmkYJ6GwCS1vgKukG65C7IzohPo/4K/7zNNvaP4E2MEU19pEGnld1FT0Kji3fpO1/4lkaUT/EMlGmNFatwaro5B7OGMSa7t0MzltoECASFkoEWIm5U/BK3KabxrRyjb56jFQ5rT63jC0zg9WepEfVenjuTrYbP8jde3f9z8fOTq9hfXd795en7h4c8z9fGcaWgJGpXEcatVnepQBptIbQsZ/4M4whaqgkn6x5fY2DthvlRmbmvfxMp2hYXSgWlqE8H+AywzymSbMN5UAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GD-to-MFA\"\n        title=\"EB-GD-to-MFA\"\n        src=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png\"\n        srcset=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/a6d36/EB-GD-to-MFA.png 650w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png 768w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/81501/EB-GD-to-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"common-strategies-that-the-organization-should-use-to-ensure-the-proper-implementation-of-pam\" style=\"position:relative;\"><a href=\"#common-strategies-that-the-organization-should-use-to-ensure-the-proper-implementation-of-pam\" aria-label=\"common strategies that the organization should use to ensure the proper implementation of pam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common Strategies that the Organization Should Use to Ensure the Proper Implementation of PAM</h2>\n<p>There are some common strategies that every organization that uses the PAM should follow for the proper implementation of PAM Software, and those strategies are:</p>\n<ul>\n<li>An organization should maintain the proper inventory of all privileged accounts.</li>\n<li>Organizations should not give administrative access for sharing the accounts.</li>\n<li>Every organization should enforce or use the password policy for creating any password.</li>\n<li>Give access to the privileged account to the limited members.</li>\n<li>Use the different types of tools and monitoring systems to gather the proper knowledge of what the privileged users are doing.</li>\n<li>Update employees about changes in privileged access policies and procedures to ensure they understand how to use and manage their privileged credentials correctly.</li>\n<li>All organizations should maintain the proper documentation of account management rules and processes.</li>\n</ul>\n<h2 id=\"whats-the-difference-between-identity-and-access-management-iam-and-privileged-access-management\" style=\"position:relative;\"><a href=\"#whats-the-difference-between-identity-and-access-management-iam-and-privileged-access-management\" aria-label=\"whats the difference between identity and access management iam and privileged access management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What's the Difference Between Identity and Access Management (IAM) and Privileged Access Management?</h2>\n<p>Privileged access management is always considered one of the parts of <a href=\"https://www.loginradius.com/blog/identity/what-is-iam/\">identity and access management</a> (IAM). However, identity and privilege are both interlinked with each other. </p>\n<p>Identity management refers to the people like you, your boss, or the organization's IT management team are examples. These people are responsible for creating, updating, or even deleting attributes. The main reason for IAM is having one digital identity per user, and once this identity is established it must be maintained, modified, and monitored.</p>\n<p>Privileged Access Management is a part of IAM. Here, PAM help's the IAM in helping manage entitlements, not only of individual users but also shared accounts such as super users, administrative, and service accounts. </p>\n<p>A PAM is a tool that manages and protects all privileged accounts. It also provides a unified, robust, and—importantly—transparent platform integrated into an organization's overall identity and access management (IAM) strategy. </p>\n<p>While PAM deals explicitly with privileged accounts, Identity and Access Management deals with all the types of users and identities in an organization. They might be different in what they protect, but in the larger picture, PAM and IAM make for holistic security as they comprise Access Management and Identity Governance and Administration.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we have learnt about Privileged Access Management, which helps organizations protect privileged accounts and credentials. The details mentioned here will help you to understand how to use PAM and what are all things that should be in mind during the use of Privileged Access Management(PAM).</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 26, 2021","updated_date":null,"description":"Privileged access management—finding the right balance between security and convenience. This blog explains why PAM matters, highlights its key features and strategies that the organization should use to ensure the proper implementation of PAM.","title":"A Comprehensive Guide to Privileged Access Management (PAM)","tags":["data security","Privileged Access Management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6,"src":"/static/e9d8c753fde4fa2986799d250605b6fe/14b42/what-is-privileged-access-management-cover.jpg","srcSet":"/static/e9d8c753fde4fa2986799d250605b6fe/f836f/what-is-privileged-access-management-cover.jpg 200w,\n/static/e9d8c753fde4fa2986799d250605b6fe/2244e/what-is-privileged-access-management-cover.jpg 400w,\n/static/e9d8c753fde4fa2986799d250605b6fe/14b42/what-is-privileged-access-management-cover.jpg 800w,\n/static/e9d8c753fde4fa2986799d250605b6fe/16310/what-is-privileged-access-management-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Bhavya Tugnawat","github":null,"avatar":null}}}},{"node":{"excerpt":"In web applications, you try to decide when to use either JSON Web Tokens (JWTs) or sessions (cookies) for authentication. When you browse…","fields":{"slug":"/engineering/guest-post/jwt-vs-sessions/"},"html":"<p>In web applications, you try to decide when to use either <a href=\"https://www.loginradius.com/blog/engineering/jwt/\">JSON Web Tokens (JWTs)</a> or sessions (cookies) for authentication. When you browse the web you use HTTP, which is a stateless protocol. So, the only way to remember the states of your application is using either sessions or tokens.</p>\n<h2 id=\"goals\" style=\"position:relative;\"><a href=\"#goals\" aria-label=\"goals permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Goals</h2>\n<p>This article deep dives into:</p>\n<ul>\n<li>Differences in using sessions and JSON Web Tokens for authentication</li>\n<li>How server-side session store works</li>\n<li>Advantages of sessions over JWT</li>\n<li>Advantages of using JWT and other things concerning the structure of JWT.</li>\n</ul>\n<h2 id=\"jwt-vs-session-what-to-use\" style=\"position:relative;\"><a href=\"#jwt-vs-session-what-to-use\" aria-label=\"jwt vs session what to use permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>JWT vs. Session: What to Use?</h2>\n<p>Deciding to choose between JWT or session is not just choosing one over the other. You need to look at some factors to determine which one to use in an application. In order to figure this out, you need to compare both approaches -- JWT and session -- to authenticate users.</p>\n<h2 id=\"comparison-jwt-and-session\" style=\"position:relative;\"><a href=\"#comparison-jwt-and-session\" aria-label=\"comparison jwt and session permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Comparison: JWT and Session</h2>\n<p>This article starts with how server-side sessions with a session store work, then looks at how client-side sessions with JWT work.</p>\n<p><img src=\"https://paper-attachments.dropbox.com/s_483BCD9E50710AD4C34073FFCB4BDCD46B2FB758D7EDCF747C5F8981B4094012_1628279671087_How+sessions+work.png\" alt=\"authentication flow\"></p>\n<h2 id=\"how-server-side-sessions-work-with-a-session-store\" style=\"position:relative;\"><a href=\"#how-server-side-sessions-work-with-a-session-store\" aria-label=\"how server side sessions work with a session store permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Server-side Sessions Work With a Session Store</h2>\n<p>Suppose, you have a website with a login form. You enter your email ID and password, and your browser sends a request to the server. Your server compares the password hashes, and if those hashes match, a session is created with a specific session ID. Then, the server returns a cookie with the session ID and the cookie is HTTP only, so it can not be read by any javascript that is not yours. It is also secured so that the cookie is never transferred over an insecure connection; that is, something that is not encrypted. Otherwise, someone can intercept the communication, like a man in the middle attack.</p>\n<p><img src=\"https://paper-attachments.dropbox.com/s_483BCD9E50710AD4C34073FFCB4BDCD46B2FB758D7EDCF747C5F8981B4094012_1628279971421_sessionswork2.png\" alt=\"server-side sessions with a session store\"></p>\n<p>If you make a follow-up request, your browser automatically sends this cookie along. Take a look at the session ID and fish it out.</p>\n<h2 id=\"how-client-side-sessions-work-with-jwt\" style=\"position:relative;\"><a href=\"#how-client-side-sessions-work-with-jwt\" aria-label=\"how client side sessions work with jwt permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Client-side Sessions Work with JWT</h2>\n<p><img src=\"https://paper-attachments.dropbox.com/s_483BCD9E50710AD4C34073FFCB4BDCD46B2FB758D7EDCF747C5F8981B4094012_1628281019519_Clientside.png\" alt=\"client-side sessions with JWT\"></p>\n<p>Instead of creating a session in your session store, you check whether the password hashes match. And if they do match, you can just create a JSON signature token and the token is signed with the secret. If someone tries to modify the payload, you will know and the signature validation will fail.</p>\n<p>You can return the web signature token that can be put in a cookie, which is way better. Because, if you don't do that, there is a possibility that a third-party javascript can access it.</p>\n<h2 id=\"problems-with-jwt-and-statelessness\" style=\"position:relative;\"><a href=\"#problems-with-jwt-and-statelessness\" aria-label=\"problems with jwt and statelessness permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Problems with JWT and Statelessness</h2>\n<p>Imagine a scenario in which a bank customer's info has been breached and the customer calls the bank to lock the account. This will be an issue if the bank uses JWT for authentication as JWT is stateless. Although you can find a workaround to do this by introducing state, it just defeats the purpose of having a JWT token in the first place, standing a chance of logging everyone out including the customer.</p>\n<p>With Sessions, logging out that one particular customer won’t be a problem at all as the customer's state is stored.</p>\n<h3 id=\"data-visibility-and-control\" style=\"position:relative;\"><a href=\"#data-visibility-and-control\" aria-label=\"data visibility and control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data Visibility and Control</h3>\n<p>When using server-side sessions, you don't know who is currently logged into your application as this can be useful to inflict the history of what a person is currently doing. It’s a better idea to use sessions in industries like health care, banking, insurance, or companies that deal with money. It's also good to note that JWT is signed and anyone can read it or get an idea of how data or ID is structured, or how many rows data has, which is not the case for sessions as the data is not visible to users.</p>\n<h3 id=\"bandwidth-consumption\" style=\"position:relative;\"><a href=\"#bandwidth-consumption\" aria-label=\"bandwidth consumption permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bandwidth Consumption</h3>\n<p>Session cookies take up very little bandwidth, whereas the bandwidth consumption will be higher in the JWT-based approach because the tokens tend to get bigger and you have the signature you have to send along for each follow up request; whereas if you have the session cookie, it's really small because its just the session ID that is being sent over.</p>\n<h3 id=\"revoking-roles-and-privileges-in-jwt-and-session-based-systems\" style=\"position:relative;\"><a href=\"#revoking-roles-and-privileges-in-jwt-and-session-based-systems\" aria-label=\"revoking roles and privileges in jwt and session based systems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Revoking Roles and Privileges in JWT and Session-based Systems</h3>\n<p>A lot of breaches that happen in companies is a result of an internal breach from an employee or insider that is stealing data or doing weird things. It is really important to be able to revoke privileges immediately. Imagine a scenario where one person is locked in and has admin rights. Say, the token is valid for ten minutes or so. If for whatever reason you don't want that person to have admin privileges anymore, you can easily revoke the person's access if you use sessions, but might find it difficult if you use JSON web tokens.</p>\n<h2 id=\"jwt-advantages\" style=\"position:relative;\"><a href=\"#jwt-advantages\" aria-label=\"jwt advantages permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>JWT: Advantages</h2>\n<p>This section discusses the advantages of using JWT over sessions and scenarios where sessions do not cut it.</p>\n<h3 id=\"scalability\" style=\"position:relative;\"><a href=\"#scalability\" aria-label=\"scalability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Scalability</h3>\n<p>One of the “issues” with sessions is scalability. The argument is that sessions are stored in memory and servers are duplicated to handle the application load, therefore, limiting the scalability of the application. JWT, on the other hand, has higher scalability due to its statelessness. If you use a load balancer, you can easily pass along your users to several servers without worrying, as there is no state or session data stored anywhere, making it easy for gigantic scale workloads like that of Google and Facebook.</p>\n<h3 id=\"maintainability\" style=\"position:relative;\"><a href=\"#maintainability\" aria-label=\"maintainability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Maintainability</h3>\n<p>A downside of the sessions is their maintainability, as the sessions need to be maintained. Somewhere on someone's server, a record will need to be created every time a user is authenticated. This is done in memory. The more the users are authenticated, the greater the overhead on your server. There is no need for maintainability in JWT as no state is stored, making it a better choice in this scenario.</p>\n<h3 id=\"multiple-platforms-and-domain\" style=\"position:relative;\"><a href=\"#multiple-platforms-and-domain\" aria-label=\"multiple platforms and domain permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multiple Platforms and Domain</h3>\n<p>When using sessions in an applications, there will come a time when you need to scale or expand the data for it to be used on multiple devices. Then, you'll need to worry about things like cross-origin resource sharing or even forbidden requests.</p>\n<p>But with JWT, you don't have to bother about CORS as you can provide data to all sorts of devices and applications. Setting up a quick header configuration gets rid of any CORS problem you would have encountered.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">Access-Control-Allow-Origin: *</span></code></pre>\n<p>As long as a valid user has a valid token, data and resources are made available from any domain.</p>\n<h3 id=\"platform-independent\" style=\"position:relative;\"><a href=\"#platform-independent\" aria-label=\"platform independent permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Platform Independent</h3>\n<p>You can easily allow selective permissions for third-party applications with the help of JWT. Say, you build an application that you like to share permissions with other applications; for instance, sharing a video you watched on Facebook to friends on Instagram. You can also get creative building APIs that hand the special tokens to other applications so that user data can be accessed.</p>\n<h2 id=\"attacking-jwts-vs-session-based-authentication\" style=\"position:relative;\"><a href=\"#attacking-jwts-vs-session-based-authentication\" aria-label=\"attacking jwts vs session based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Attacking JWTs vs. Session-based Authentication</h2>\n<p>Auth tokens are usually sent over the network and as such are vulnerable to attack. These kinds of attacks are:</p>\n<ul>\n<li>Man in the Middle attack</li>\n<li>OAuth token theft</li>\n<li>XSS</li>\n<li>CSRF</li>\n<li>Database/filesystem access</li>\n<li>Session fixation</li>\n</ul>\n<p>Although it may seem that these types of attacks are not likely to happen, it's important to take security seriously and implement appropriate measures. The vulnerability of the system is based on the cumulative probabilities of all the types of attacks. In some ways, you can mitigate the above attacks:</p>\n<ol>\n<li><strong>Man in the middle attack:</strong> You can easily protect yourself from this type of attack by using secure HTTP and secure cookies throughout the app. However, this doesn't prevent attacks that use a proxy.</li>\n<li><strong>OAuth token theft:</strong> The solution to this is to have appropriate measures in place to detect stolen refresh tokens and use only short-lived access tokens.</li>\n<li><strong>XSS attack:</strong> One way to prevent this attack is to make sure that all of the dependencies are secure. This method is time-consuming and costly.</li>\n<li><strong>Cross-site request forgery (CSRF):</strong> Prevention of CSRF attacks typically requires the use of an anti-CSRF token or SameSite cookies. However, there are other methods that you can user to solve this in a way that is seamless with the whole authentication process.</li>\n<li>\n<p><strong>Database and filesystem access:</strong> To control damage caused by unauthorized access to your database or filesystem, you could do the following:</p>\n<ul>\n<li>Store only the hashed version of the tokens that are in your database to prevent unauthorized access.</li>\n<li>If the private key is compromised, the attacker can access both the current and future sessions of the JWTs. To prevent this, all current JWTs must be changed before they are invalidated.</li>\n</ul>\n</li>\n<li><strong>Session fixation:</strong> Each time a user logs in, generate a new set of tokens for that account. This method will invalidate the old ones if needed.</li>\n</ol>\n<h3 id=\"cookies-vs-local-storage\" style=\"position:relative;\"><a href=\"#cookies-vs-local-storage\" aria-label=\"cookies vs local storage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cookies vs. Local Storage</h3>\n<p>Some people who use JSON web tokens return the token and store it in local storage. This can be very dangerous as third party javascript, browser extensions, and malicious CDN scripts can have access to the token. But if you put it in a cookie, no javascript access, or even you has access to it.</p>\n<p>Another thing to note is that when using cookies, you need to mitigate CSRF. Preventing it most of the time will have to do with installing a library and writing a few lines of code.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In the article, you've learned the differences in using sessions and JSON web tokens for authentication, how serverside session store works, the advantages of sessions over JWT, and other things concerning the structure of JWT.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"August 26, 2021","updated_date":null,"description":"In this article, you'll learn the differences between JWT and Sessions, and which one to use for authentication.","title":"How to Authenticate Users: JWT vs. Session","tags":["Authentication","JWT","Sessions"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/b7fe0cb57f0d4924df0a0f47634eb844/14b42/ArticleHead.jpg","srcSet":"/static/b7fe0cb57f0d4924df0a0f47634eb844/f836f/ArticleHead.jpg 200w,\n/static/b7fe0cb57f0d4924df0a0f47634eb844/2244e/ArticleHead.jpg 400w,\n/static/b7fe0cb57f0d4924df0a0f47634eb844/14b42/ArticleHead.jpg 800w,\n/static/b7fe0cb57f0d4924df0a0f47634eb844/47498/ArticleHead.jpg 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Uma Victor","github":"uma-victor1","avatar":null}}}},{"node":{"excerpt":"Every country is progressively inching towards diverse smart city projects that eventually become the new driving force behind a state’s…","fields":{"slug":"/identity/smart-cities-improve-unified-identity/"},"html":"<p>Every country is progressively inching towards diverse smart city projects that eventually become the new driving force behind a state’s overall development. </p>\n<p>However, the key aspect determining whether these projects are a failure or a success is the involvement of civilians living and working in that city. </p>\n<p>Undoubtedly, civilian engagement is a significant factor that can offer valuable insights to enhance the current services that pave the path for the region’s overall development. </p>\n<p>But the big question is how to enhance civilian engagement?</p>\n<p>Well, delivering a flawless user experience and online services can help increase civilian engagement. </p>\n<p>The key lies in leveraging a robust <a href=\"https://www.loginradius.com/b2b-identity/\">identity management solution</a> that delivers a great user experience to citizens across multiple platforms and devices and ensures adequate security and privacy. </p>\n<p>Let’s understand the role of digital identity for smart cities in improving civilians’ digital experience through unified identity.</p>\n<h2 id=\"the-role-of-digital-identity-for-smart-cities\" style=\"position:relative;\"><a href=\"#the-role-of-digital-identity-for-smart-cities\" aria-label=\"the role of digital identity for smart cities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Digital Identity for Smart Cities</h2>\n<p>With population growth and the expansion of public services, cities need to be innovative about providing services to all people without compromising service quality. There is a need for a single platform where all facilities are centralized, and customer experience is considered.</p>\n<p>Digital identity is a great way to get started as it can prove a citizen’s identity through diverse government channels and is crucial for citizens to avail government services. </p>\n<p>As the government invokes the potential of secure digital identities, citizens would access core services and resources without any hassle. </p>\n<p>Moreover, every citizen requires some kind of public service, and that’s why handling a unique number of identities securely becomes a tough nut to crack for the government. Here’s where the need for digital identity management comes into play. </p>\n<p>A smart CIAM (consumer identity and access management) solution like LoginRadius helps public sector organizations manage heaps of identities efficiently without hampering user experience. </p>\n<p>Let’s learn how a CIAM solution like LoginRadius can deliver a flawless digital experience to civilians that pushes overall development reinforced by adequate security.</p>\n<h2 id=\"centralized-online-services\" style=\"position:relative;\"><a href=\"#centralized-online-services\" aria-label=\"centralized online services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Centralized Online Services</h2>\n<p>Cities need one unified self-service portal so that their constituents have a seamless, efficient experience as they access the services they need. The LoginRadius Identity Platform enables cities to centralize their customer-facing digital applications into one portal. </p>\n<p>This portal enables a frictionless experience across multiple services that improve user experience and <a href=\"https://www.loginradius.com/customer-experience-solutions/\">enhance user engagement</a>. </p>\n<p> <br>\nThis single locus of access delivers a connected experience across multiple touchpoints and channels. LoginRadius has supported applications such as Account Summary, Customer Profile, Permit Applications, and Bill Payment. </p>\n<h2 id=\"maintaining-one-digital-identity-across-all-customer-service\" style=\"position:relative;\"><a href=\"#maintaining-one-digital-identity-across-all-customer-service\" aria-label=\"maintaining one digital identity across all customer service permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Maintaining One Digital Identity Across All Customer Service</h2>\n<p>What good is a centralized portal if citizens create multiple identities for individual web and mobile applications? Operating in this way creates identity silos that prevent a thorough view of the customer’s journey and preferences, which means the customer experience can’t be optimized for each individual.</p>\n<p>Without a seamless user experience, engagement rates drop. But with <a href=\"https://www.loginradius.com/single-sign-on/\">LoginRadius Single Sign-on (SSO),</a> cities and companies can allow customers to access all applications within their platform with a single set of unified credentials, rather than having to register and log in to each service separately. </p>\n<h2 id=\"integrating-with-third-party-applications\" style=\"position:relative;\"><a href=\"#integrating-with-third-party-applications\" aria-label=\"integrating with third party applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Integrating with Third-Party Applications</h2>\n<p>Many public sector organizations have a hard time using customer data to improve the digital experience. </p>\n<p>The LoginRadius Identity Platform offers pre-built integrations with over 150 third-party applications such as CRM, email marketing tools, online communities, payment systems, and more.</p>\n<p>This enables organizations to use that customer data to understand their customers better, offer more useful information and deliver that information more directly.</p>\n<h2 id=\"how-loginradius-helped-hydro-ottawa-in-creating-a-solid-architectural-foundation\" style=\"position:relative;\"><a href=\"#how-loginradius-helped-hydro-ottawa-in-creating-a-solid-architectural-foundation\" aria-label=\"how loginradius helped hydro ottawa in creating a solid architectural foundation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Helped Hydro Ottawa in Creating a Solid Architectural Foundation</h2>\n<p>Hydro Ottawa is a regulated electricity local distribution company in eastern Ontario. </p>\n<p>As the third-largest municipally-owned electric utility in Ontario, Hydro Ottawa maintains one of the safest, most reliable, and most cost-effective electricity distribution systems in the province.  They serve about 332,000 residential and commercial customers across 1,116 square kilometers.</p>\n<p><a href=\"https://www.loginradius.com/resource/case-study-page-hydro-ottawa/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"smart-cities-improve-unified-identity-Hydro-Ottawa\"\n        title=\"smart-cities-improve-unified-identity-Hydro-Ottawa\"\n        src=\"/static/b6964cfa0103e3728d3c44a7135854a7/e5715/smart-cities-improve-unified-identity-Hydro-Ottawa.png\"\n        srcset=\"/static/b6964cfa0103e3728d3c44a7135854a7/a6d36/smart-cities-improve-unified-identity-Hydro-Ottawa.png 650w,\n/static/b6964cfa0103e3728d3c44a7135854a7/e5715/smart-cities-improve-unified-identity-Hydro-Ottawa.png 768w,\n/static/b6964cfa0103e3728d3c44a7135854a7/63ff0/smart-cities-improve-unified-identity-Hydro-Ottawa.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"client-requirements\" style=\"position:relative;\"><a href=\"#client-requirements\" aria-label=\"client requirements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Client Requirements</h3>\n<p>The Hydro Ottawa team wanted to create a solid architectural foundation for digital growth and innovation. They decided that the core of this new system would be a <a href=\"https://www.loginradius.com/\">customer identity solution</a>  that centralizes and unifies customer identity data.</p>\n<p>With the launch of their mobile app and a revamp of their customer web portal underway, Hydro Ottawa needed an SSO solution to log in with a single profile that included social media validation.</p>\n<h3 id=\"result\" style=\"position:relative;\"><a href=\"#result\" aria-label=\"result permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Result</h3>\n<ul>\n<li>By implementing the LoginRadius customer identity solution, Hydro Ottawa now offers their customers a secure, streamlined login and registration system. </li>\n<li>Single sign-on (SSO) capabilities removed the previous accessibility barriers. With SSO, customers can move seamlessly through different Hydro Ottawa web applications without signing up or logging in again. </li>\n<li>Customers can easily access their accounts online to see their electricity usage and billing activities.</li>\n<li>By leveraging the identity solution and digital infrastructure already in place, Hydro Ottawa was able to release an award-winning mobile application. It’s the first app in North America that lets customers track their household’s electricity usage and costs, access their billing information, and find out about current power outages using a single tool.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Digital identity is paving the path for a rich unified experience for citizens that require public services in daily routines. </p>\n<p>Robust consumer identity and access management solutions like <a href=\"https://www.loginradius.com/contact-sales/\">LoginRadius</a> can help public sectors deliver great experiences tacked by adequate security to their civilians, reinforcing different smart city projects. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 25, 2021","updated_date":null,"description":"Civilian engagement is a significant factor that can offer valuable insights to enhance the current services that pave the path for the region’s overall development. This post highlights the role of digital identities in supporting the idea of smart cities.","title":"How Cities Can Improve Civilians’ Digital Experience with Unified Identity","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6129032258064515,"src":"/static/7667de49e49fc737acd82123663210c6/14b42/smart-cities-improve-unified-identity-cover.jpg","srcSet":"/static/7667de49e49fc737acd82123663210c6/f836f/smart-cities-improve-unified-identity-cover.jpg 200w,\n/static/7667de49e49fc737acd82123663210c6/2244e/smart-cities-improve-unified-identity-cover.jpg 400w,\n/static/7667de49e49fc737acd82123663210c6/14b42/smart-cities-improve-unified-identity-cover.jpg 800w,\n/static/7667de49e49fc737acd82123663210c6/16310/smart-cities-improve-unified-identity-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The modern digital landscape demands robust security, which significantly relies on access tokens that securely authenticate users.  A token…","fields":{"slug":"/identity/refresh-tokens-jwt-interaction/"},"html":"<p>The modern digital landscape demands robust security, which significantly relies on access tokens that securely authenticate users. </p>\n<p>A token plays a crucial role in enhancing the overall security mechanism of an organization that helps to deliver flawless and secure authentication and authorization on their website or application.</p>\n<p>For years, businesses have been using <a href=\"https://www.loginradius.com/blog/identity/pros-cons-token-authentication/\">token-based authentication</a> that allows users to access resources. These tokens have a minimal lifetime, ensuring that cybercriminals have minimum time to exploit a user’s identity. </p>\n<p>With token security, users have to re-authenticate themselves for obvious security reasons by offering credentials to sign in if the access token is expired. </p>\n<p>However, this can be tedious and hampers user experience. To overcome this, the concept of refresh tokens was introduced.</p>\n<p>A refresh token ensures that a user can regain the access token without providing login credentials. </p>\n<p>Let’s dig deeper about refresh tokens, their use, and how they interact with JWTs (JSON Web Token). </p>\n<h2 id=\"what-is-a-token\" style=\"position:relative;\"><a href=\"#what-is-a-token\" aria-label=\"what is a token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Token?</h2>\n<p>A token can be defined as a digitally encoded signature used to authenticate and authorize a user to access specific resources on a network.</p>\n<p>A token is always generated in the form of an OTP (One-Time Password), which depicts that it could only be used once and is generated randomly for every transaction.</p>\n<p>The token-based authentication allows users to verify their unique identity, and in return, they receive a special token that provides access to specific resources for a particular time frame.</p>\n<p>Apart from this, users can easily access the website or network for which the token is issued and need not enter the credentials again and again until the token expires.</p>\n<p>Tokens are widely used for regular online transactions for enhancing overall security and accuracy.</p>\n<h2 id=\"what-is-a-refresh-token\" style=\"position:relative;\"><a href=\"#what-is-a-refresh-token\" aria-label=\"what is a refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Refresh Token?</h2>\n<p>Since access tokens aren’t valid for an extended period because of security reasons, a refresh token helps re-authenticate a user without the need for login credentials. </p>\n<p>The primary purpose of a refresh token is to get long-term access to an application on behalf of a particular user. </p>\n<p>In a nutshell, a refresh token allows any website or application to regrant the access token without bothering the user. Here are its benefits:</p>\n<ul>\n<li>Balances security with usability</li>\n<li>Reinforces authentication</li>\n<li>Improves user experience </li>\n</ul>\n<h2 id=\"what-is-a-jwt-json-web-token\" style=\"position:relative;\"><a href=\"#what-is-a-jwt-json-web-token\" aria-label=\"what is a jwt json web token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a JWT (JSON Web Token)?</h2>\n<p>JWT (JSON Web Token) is used to provide a standard way for two parties to communicate securely. JWT is commonly used for managing authorization.</p>\n<p>There is an open industry standard called RFC-7519, which defines how JWT should be structured and how to use it to exchange information (called “claims”) in the form of JSON objects. This information can be verified and trusted as it is digitally signed.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/jwt/\">JWT (JSON Web Token)</a> is a popular method of SSO, which is widely used by B2C applications, and through this system, you can allow your consumers to log in to an application that supports JWT.</p>\n<h2 id=\"when-to-use-a-refresh-token\" style=\"position:relative;\"><a href=\"#when-to-use-a-refresh-token\" aria-label=\"when to use a refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>When to Use a Refresh Token?</h2>\n<p>Before inching towards refresh tokens, one should understand that <a href=\"https://www.loginradius.com/blog/engineering/oauth2/\">OAuth 2.0</a> specifications define both access tokens and refresh tokens. </p>\n<p>Enterprises can leverage a refresh token in scenarios where the API needs authentication through an access token but users aren’t always available to provide credentials again and again. </p>\n<p>Hence, to enhance usability and improve user experience, refresh tokens can be used. </p>\n<p><strong>Also read:</strong> <strong><a href=\"https://www.loginradius.com/blog/identity/oauth2-0-guide/\">Working With Industry Authorization: A Beginner's Guide to OAuth 2.0</a></strong></p>\n<h2 id=\"best-practices-to-secure-refresh-tokens\" style=\"position:relative;\"><a href=\"#best-practices-to-secure-refresh-tokens\" aria-label=\"best practices to secure refresh tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices to Secure Refresh Tokens</h2>\n<p>Since browser-based web applications cannot start using a refresh token, refresh tokens always require additional security. </p>\n<p>Whenever a refresh token is being utilized, the security token service quickly issues another access token and a new refresh token. The user can now make API calls through a refresh token. </p>\n<p>Whenever the overall security token service suspects that any refresh token is being used more than once, it automatically assumes something isn’t right. As a result, the refresh token gets immediately revoked and hence ensures adequate security. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">RBA (Risk-based Authentication) </a>can be the finest way to enhance the security of a refresh token since it helps to analyze a vulnerability and automatically adds another stringent security layer in the mechanism. </p>\n<p>RBA works seamlessly with token-based authentication and can help improve overall security in high-risk scenarios where businesses need a stringent mechanism to prevent a security breach. </p>\n<h2 id=\"authentication-using-jwt-token-and-refresh-token\" style=\"position:relative;\"><a href=\"#authentication-using-jwt-token-and-refresh-token\" aria-label=\"authentication using jwt token and refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication Using JWT Token and Refresh Token</h2>\n<p>JWTs represent a set of claims as JSON objects encoded in a JWS and JWE structure. This JSON object is called “JWT Claims Set.” The JSON object consists of zero or more name/value pairs (or members), where the names are strings, and the values are arbitrary JSON values. These members are the claims represented by the JWT.</p>\n<p>Your JWTs can contain any information you want; the user's name, birth date, email, etc. You do this with claims-based authorization. You then just tell your provider to make a JWT with these claims from the claims principle.</p>\n<p>Authentication is implemented through JWT access tokens along with refresh tokens. The API returns a short-lived token (JWT), which expires in 15 minutes, and in HTTP cookies, the refresh token expires in 7 days. </p>\n<p>JWT is currently used for accessing secure ways on API, whereas a refresh token generates another new JWT access token when it expires or even before. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Refresh tokens can be the ideal way to enhance security and improve user experience since users need not enter login credentials again and again. </p>\n<p>LoginRadius helps enterprises get maximum benefits in terms of security, scalability, and usability when implementing token-based authentication on web and mobile devices. </p>\n<p>Businesses can leverage LoginRadius’ authentication and authorization services for a seamless experience that fosters business growth. <a href=\"https://www.loginradius.com/contact-sales\">Schedule a call today</a>! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 24, 2021","updated_date":null,"description":"A token plays a crucial role in enhancing the overall security mechanism of an organization. This blog provides an overview of using refresh tokens and how it helps securely authenticate users without hampering their overall experience.","title":"Refresh Tokens: When to Use Them and How They Interact with JWTs","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6129032258064515,"src":"/static/3e53bf0d14b0304e647258612eee7deb/14b42/refresh-tokens-jwt-interaction-cover.jpg","srcSet":"/static/3e53bf0d14b0304e647258612eee7deb/f836f/refresh-tokens-jwt-interaction-cover.jpg 200w,\n/static/3e53bf0d14b0304e647258612eee7deb/2244e/refresh-tokens-jwt-interaction-cover.jpg 400w,\n/static/3e53bf0d14b0304e647258612eee7deb/14b42/refresh-tokens-jwt-interaction-cover.jpg 800w,\n/static/3e53bf0d14b0304e647258612eee7deb/16310/refresh-tokens-jwt-interaction-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Saikiran Babladi","github":null,"avatar":null}}}},{"node":{"excerpt":"Hi, I am the Senior Operations Manager and feel really proud of being a part of the socially responsible company, LoginRadius.  The concept…","fields":{"slug":"/growth/loginradius-csr-activities/"},"html":"<p><em>Hi,</em> I am the Senior Operations Manager and feel really proud of being a part of the socially responsible company, <em>LoginRadius.</em> </p>\n<p>The concept of CSR is essentially based on the notion that organizations should not only strive to optimize profits and shareholder value but should also make a conscientious effort to minimize or eliminate impact on the environment and society.</p>\n<p>Society has changed how it interacts with companies. Consumers have become more aware and educated about the impact that businesses have on society. They are looking for corporations that positively address the needs of society. </p>\n<p>At LoginRadius, we check all the boxes in the category with our sustainable and thriving Corporate Social Responsibility (CSR) culture. The company has been carrying out CSR activities since its inception and has been focused on giving back in any way possible to society.</p>\n<h2 id=\"a-little-backdrop\" style=\"position:relative;\"><a href=\"#a-little-backdrop\" aria-label=\"a little backdrop permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Little Backdrop</h2>\n<p>LoginRadius is a leading cloud-based CIAM solution that empowers organizations to deliver a delightful consumer experience. The company was established in 2012 by Mr. Rakesh Soni and is headquartered in San Francisco with offices in Jaipur and Hyderabad, India.</p>\n<p>The company offers customizable login interfaces, open-source SDKs, best-in-class data security products, and integrations with over 150 third-party applications. We are already loved by 3,000 businesses with 1.17 billion consumers worldwide and raised $17 million in Series A funding from Microsoft.</p>\n<h2 id=\"building-a-sustainable-csr-program\" style=\"position:relative;\"><a href=\"#building-a-sustainable-csr-program\" aria-label=\"building a sustainable csr program permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Building A Sustainable CSR Program</h2>\n<p><strong>In addition to focusing on economic growth, the founders also have a personal desire to contribute to the community. According to them, it is imperative to integrate social and environmental concerns into the organization and support the community. They also believe in strengthening the roles and responsibilities of the employee to drive the CSR Program.</strong></p>\n<p>I will always be thankful to them for encouraging me to voice my views on carrying out the CSR exercises.</p>\n<h2 id=\"corporate-responsibilities-endorsed-from-all-angles\" style=\"position:relative;\"><a href=\"#corporate-responsibilities-endorsed-from-all-angles\" aria-label=\"corporate responsibilities endorsed from all angles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Corporate Responsibilities, Endorsed from All Angles</h2>\n<p>As we strive to contribute towards a better future, we have partnered with Naya Savera, a socially oriented organization that aims to empower economically backward communities.</p>\n<p>We always focus on our employees to make a difference in the community. This allows them to volunteer or give back to their community. For example, our <em><a href=\"https://loginradius.org/\">Dhan Utsav</a></em> is an event where we encourage employees to donate clothes, toys, shoes, stationery, utensils, etc., to the kids of Naya Savera in the spirit of Diwali.</p>\n<p>Our <em>Kick for a Cause</em> initiative is a one-day friendly football tournament to raise funds for underprivileged women. We also help them sell their handicrafts by hosting exhibits in various hotspots within Jaipur.</p>\n<p>Through Naya Savera and Kartavya NOG, we're currently supporting the education of ten and five children respectively each year, and we're committed to giving more children a chance at a great education in the coming years.</p>\n<h2 id=\"driving-initiatives-in-the-times-of-covid-19\" style=\"position:relative;\"><a href=\"#driving-initiatives-in-the-times-of-covid-19\" aria-label=\"driving initiatives in the times of covid 19 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Driving Initiatives in the Times of COVID-19</h2>\n<p><img src=\"/ffa4d0e2b5f4590ecb8370724c56f0d7/loginradius-csr-activities-1.jpg\" alt=\"loginradius-csr-activities-1\"></p>\n<p>We also extended a helping hand to people by financially supporting them at times of economic breakdown and unemployment.</p>\n<p>We extended our support at the time of the Covid-19 pandemic, which led the central and state governments to announce lockdowns from March 2020 throughout the country. This economic slump led to thousands of people losing their jobs and creating a financial crunch in many families. </p>\n<p>During this challenging time when it was difficult for the poor and unemployed to arrange food for themselves, we distributed ration to 200 families of laborers, construction workers, and local migrants who live in slum areas of Jaipur with the help of local NGOs.</p>\n<p>Apart from our community initiatives, we are proud to contribute significantly to the PM Cares Fund. </p>\n<p><img src=\"/a1c87716f2a3e7d6fbdbb5fc241f7650/loginradius-csr-activities-2.jpg\" alt=\"loginradius-csr-activities-2\"></p>\n<h2 id=\"bottom-line-it-is-difficult-to-describe-a-culture-without-being-a-part-of-it\" style=\"position:relative;\"><a href=\"#bottom-line-it-is-difficult-to-describe-a-culture-without-being-a-part-of-it\" aria-label=\"bottom line it is difficult to describe a culture without being a part of it permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bottom line: It is Difficult to Describe a Culture Without Being a Part of It.</h2>\n<p>I remember the day when I joined LoginRadius. My first impression was that it was a beautiful, diligent company, and everyone in the organization was very dynamic, humble, and driven with a commitment to excellence. <em>I am proud that I stand true to my option to this day.</em></p>\n<h2 id=\"i-would-like-to-conclude-that-working-with-loginradius-has-helped-me-develop-a-better-understanding-of-corporate-citizenship-the-company-empowers-its-employees-to-go-above-and-beyond-the-call-of-duty-its-social-initiatives-encourage-us-all-to-individually-make-a-difference-in-society\" style=\"position:relative;\"><a href=\"#i-would-like-to-conclude-that-working-with-loginradius-has-helped-me-develop-a-better-understanding-of-corporate-citizenship-the-company-empowers-its-employees-to-go-above-and-beyond-the-call-of-duty-its-social-initiatives-encourage-us-all-to-individually-make-a-difference-in-society\" aria-label=\"i would like to conclude that working with loginradius has helped me develop a better understanding of corporate citizenship the company empowers its employees to go above and beyond the call of duty its social initiatives encourage us all to individually make a difference in society permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>I would like to conclude that working with Loginradius has helped me develop a better understanding of corporate citizenship. The company empowers its employees to go above and beyond the call of duty. Its social initiatives encourage us all to individually make a difference in society.</h2>\n<p>Engaging in civic and social activities also re-energizes us in the workplace. The more we participate in these activities, the better we feel about our work. We gain a sense of accomplishment that we have contributed something toward the welfare of others.</p>\n<p>We are an organization that's committed to working for the good of the people. We believe in community development and will continue to make a difference.</p>\n<p>I feel honored to be a part of the LoginRadius family :)   </p>\n<p><a href=\"https://www.loginradius.com/careers/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"browse-positions\"\n        title=\"browse-positions\"\n        src=\"/static/f31e24d3c870b2ea17ea36cfb8459637/e5715/browse-positions.png\"\n        srcset=\"/static/f31e24d3c870b2ea17ea36cfb8459637/a6d36/browse-positions.png 650w,\n/static/f31e24d3c870b2ea17ea36cfb8459637/e5715/browse-positions.png 768w,\n/static/f31e24d3c870b2ea17ea36cfb8459637/63ff0/browse-positions.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 19, 2021","updated_date":null,"description":"LoginRadius has been carrying out CSR activities since its inception and has been focused on giving back in any way possible to society. Learn how the company fosters a CSR culture within its organization.","title":"A Glimpse of LoginRadius' CSR Activities: How Do We Foster a Culture of Care","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.550387596899225,"src":"/static/ae2161f541a9937ce42f584f422199d0/14b42/loginradius-csr-activities-cover.jpg","srcSet":"/static/ae2161f541a9937ce42f584f422199d0/f836f/loginradius-csr-activities-cover.jpg 200w,\n/static/ae2161f541a9937ce42f584f422199d0/2244e/loginradius-csr-activities-cover.jpg 400w,\n/static/ae2161f541a9937ce42f584f422199d0/14b42/loginradius-csr-activities-cover.jpg 800w,\n/static/ae2161f541a9937ce42f584f422199d0/16310/loginradius-csr-activities-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Naveen Soni","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":402,"currentPage":68,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}