{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/70","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"When it comes to finding and interacting with insurance carriers, consumers have high expectations. They demand a secure and reliable…","fields":{"slug":"/growth/enhance-customer-experience-in-insurance-companies-with-ciam/"},"html":"<p>When it comes to finding and interacting with insurance carriers, consumers have high expectations. They demand a secure and reliable consumer experience in addition to excellent coverage and competitive costs. Savvy online consumers expect the same individualized attention they get when chatting with a live agent over the phone due to digital transformation. They demand that experience be consistent no matter which device they use.</p>\n<p>A <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">consumer identity and access management</a> (CIAM) solution is vital for insurance businesses aiming to develop trusted digital connections with their users and deliver tailored experiences that enhance revenues, build brand loyalty, and expedite internal processes.</p>\n<h2 id=\"concerns-of-insurance-companies\" style=\"position:relative;\"><a href=\"#concerns-of-insurance-companies\" aria-label=\"concerns of insurance companies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Concerns of Insurance Companies</h2>\n<p>The seamless user onboarding of new consumers, the overall <a href=\"https://www.loginradius.com/resource/how-customer-identity-drives-digital-transformation-for-insurance-companies-2/\">consumer experience</a>, and good authentication services and identification process when individuals use their online apps are some of the primary concerns. Other issues include managing multiple brands within a single organization and managing personal data both within and outside the company.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-customer-identity-drives-digital-transformation-for-insurance-companies-2/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-dig-trans-insurance\"\n        title=\"DS-dig-trans-insurance\"\n        src=\"/static/aa7dd923e05553e104b65af4fd50903c/e5715/DS-dig-trans-insurance.png\"\n        srcset=\"/static/aa7dd923e05553e104b65af4fd50903c/a6d36/DS-dig-trans-insurance.png 650w,\n/static/aa7dd923e05553e104b65af4fd50903c/e5715/DS-dig-trans-insurance.png 768w,\n/static/aa7dd923e05553e104b65af4fd50903c/81501/DS-dig-trans-insurance.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a>   </p>\n<h2 id=\"what-businesses-use-ciam\" style=\"position:relative;\"><a href=\"#what-businesses-use-ciam\" aria-label=\"what businesses use ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Businesses Use CIAM</h2>\n<p>Businesses use Consumer Identity and Access Management (CIAM) systems to manage social networks and associated features. Consumers may sign up for and log in to online apps and services using CIAM solutions. They aid in protecting data privacy and preventing identity theft and other forms of corruption and theft.</p>\n<h2 id=\"how-ciam-can-assist-insurance-companies\" style=\"position:relative;\"><a href=\"#how-ciam-can-assist-insurance-companies\" aria-label=\"how ciam can assist insurance companies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How CIAM can Assist Insurance Companies</h2>\n<p>A CIAM platform helps with smooth and safe experiences throughout the online insurance lifecycle. It can assist in the following ways:</p>\n<h3 id=\"access-management\" style=\"position:relative;\"><a href=\"#access-management\" aria-label=\"access management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Access Management</h3>\n<p>Create and manage secure IDs for your prospective consumers for easy, frictionless access to insurance information across all platforms and touchpoints.</p>\n<ul>\n<li>With single sign-on and multi-factor authentication, you can simplify and secure access to digital assets.</li>\n<li>With extensive preferences and <a href=\"https://www.loginradius.com/consent-management/\">consent management</a> solutions, you can improve consumer connections.</li>\n<li>Use real-time consumer profile information to provide customized user experiences.</li>\n</ul>\n<h3 id=\"smooth-user-interaction\" style=\"position:relative;\"><a href=\"#smooth-user-interaction\" aria-label=\"smooth user interaction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Smooth User Interaction</h3>\n<p>Users must have a smooth integration when retrieving their data once they have created an account that provides access to their online insurance resources. The authentication procedure should provide for just-in-time, just-enough verification without interfering with the user's journey or jeopardizing security.</p>\n<p>The proper CIAM solution combines authentication flexibility with cutting-edge technologies such as <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">password-less authentication</a>, reauthentication, step-up, and platform independence.</p>\n<h3 id=\"secure-consumer-data\" style=\"position:relative;\"><a href=\"#secure-consumer-data\" aria-label=\"secure consumer data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Secure Consumer Data</h3>\n<p>With complete authentication, access management, and data governance capabilities, you can safeguard your company's reputation. Reliable CIAM software follows the industry's best security and privacy best practices.</p>\n<ul>\n<li><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-factor authentication</a> demands an extra layer of security for additional safeguard.</li>\n<li>Rigorous data analysis and scoped permissions, such as role-based and attribute-based access control (RBAC/ABAC), can help reduce risk.</li>\n<li>The consumer care portal's features can streamline user provisioning, consumer service, and consumer support.</li>\n</ul>\n<h3 id=\"services-to-multiple-users\" style=\"position:relative;\"><a href=\"#services-to-multiple-users\" aria-label=\"services to multiple users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Services to multiple users</h3>\n<p>An insurance company gears the majority of its information towards average end users like us. However, insurance firms also service businesses and frequently work with agents and brokers to generate new business.</p>\n<p>Businesses usually employ a mandate model, in which they provide permissions to specific people within their organization to manage insurance company relationships, which necessitates access to the insurance company infrastructure. Likewise, agents require access to essential applications in order to submit orders and assist the end-user.</p>\n<p>You want to encourage business users and agencies regardless of the business agreement; you don't want to have the regulatory burden while still being in charge. Business users and agents can establish and manage users within their designated scope by assigning authority and approvals.</p>\n<h3 id=\"frictionless-consumer-on-boarding\" style=\"position:relative;\"><a href=\"#frictionless-consumer-on-boarding\" aria-label=\"frictionless consumer on boarding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Frictionless Consumer On-boarding</h3>\n<p>Organizations must understand consumers' channels of engagement for getting products and services to develop a best-in-class safe consumer experience. It all starts with  <a href=\"https://www.loginradius.com/blog/fuel/importance-customer-onboarding/\">user onboarding</a> for new consumers with a seamless user journey tailored to the specific demands of the brand with which the user is registering.</p>\n<p>Because there are various points of interest in the <a href=\"https://www.loginradius.com/blog/identity/user-onboarding-revamp-application/\">onboarding process</a>, it always necessitates a meaningful discussion. On the one hand, the onboarding and signup process must be seamless in order to provide a positive consumer experience. On the other hand, the need for the appropriate level of security is pressing.</p>\n<p>Insurance companies will have to make trade-offs between protection and the client experience when developing the secure trip. Users get a smooth journey—creating better economic opportunities for digital banking. If they strike the appropriate balance, it <a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">reduces the risk</a> of opportunistic attackers.</p>\n<h2 id=\"bottom-line\" style=\"position:relative;\"><a href=\"#bottom-line\" aria-label=\"bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bottom line</h2>\n<p>Insurance companies often operate in a fast-paced environment, serving both consumers and businesses. They also deal with a complex IT infrastructure resulting from the multiple acquisitions that make up a typical contemporary insurance company.</p>\n<p><a href=\"https://www.loginradius.com/\">Implementing the right CIAM</a> solution is critical in the digital world of insurance firms in order to achieve their objectives and go above and beyond. This <a href=\"https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/\">CIAM digital strategy</a> can assist in the transformation of a conventional life insurance product into a more modern digital banking offering geared at wider consumer segments while still utilizing the traditional agent channel.\n<a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 09, 2021","updated_date":null,"description":"Unaided consumer interactions are a lost opportunity. The main goal of an insurance company should be to reduce the time taken in all their consumer interactions and increase the consumer experience level. This can only happen by implementing excellent systems and processes, which is where a CIAM comes into play.","title":"Enhance Your Consumer Experience in Insurance Companies With CIAM","tags":["ciam solution","mfa","passwordless authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.694915254237288,"src":"/static/d61459e196c4efa37b541dc59ad294eb/1d671/couple-meeting-with-insurance-agent.jpg","srcSet":"/static/d61459e196c4efa37b541dc59ad294eb/f836f/couple-meeting-with-insurance-agent.jpg 200w,\n/static/d61459e196c4efa37b541dc59ad294eb/2244e/couple-meeting-with-insurance-agent.jpg 400w,\n/static/d61459e196c4efa37b541dc59ad294eb/1d671/couple-meeting-with-insurance-agent.jpg 680w","sizes":"(max-width: 680px) 100vw, 680px"}}},"author":{"id":"Deependra Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Azure Key Vault is a highly secure, dependable, and simple method to store your keys and secrets in the cloud. This article…","fields":{"slug":"/engineering/guest-post/using-azure-key-vault-with-an-azure-web-app-in-c-sharp/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Azure Key Vault is a highly secure, dependable, and simple method to store your keys and secrets in the cloud. This article talks about:</p>\n<ul>\n<li>Azure Key Vault</li>\n<li>Why it is useful?</li>\n<li>How to set up and configure it?</li>\n<li>How to read a secret value stored inside it in C#?</li>\n</ul>\n<p>Use the following steps to read a secret stored in an Azure Key Vault instance.</p>\n<ol>\n<li>Create a Web App in the Azure Portal</li>\n<li>Enable Managed Service Identity for your Web App</li>\n<li>\n<p>Create and Configure Azure Key Vault</p>\n<ul>\n<li>Create a new Azure Key Vault Instance</li>\n<li>Create an App Secret in Azure key Vault</li>\n<li>Authorize the Web App to Access Key Vault</li>\n</ul>\n</li>\n<li>\n<p>Create a new ASP.NET 5 Core application</p>\n<ul>\n<li>Install NuGet Packages</li>\n<li>Read Azure Key Vault Secrets in .NET Core</li>\n<li>Specify the \"VaultUri\" in AppSettings</li>\n<li>Access Secrets from AzureKeyVault</li>\n<li>Retrieve Secret Value from AzureKeyVault</li>\n<li>Register the Dependencies in the ConfigureServices method</li>\n</ul>\n</li>\n<li>Deploy the Application to Azure</li>\n<li>Execute the Application</li>\n</ol>\n<h2 id=\"prerequisites\" style=\"position:relative;\"><a href=\"#prerequisites\" aria-label=\"prerequisites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prerequisites</h2>\n<p>To execute the code examples provided in this article, you should have each of the following:</p>\n<ol>\n<li>Visual Studio 2019 (preferred)</li>\n<li>Azure Account</li>\n</ol>\n<p>If you don't have an Azure account, you can create one for free here: <a href=\"https://portal.azure.com\">Azure Login</a></p>\n<h2 id=\"what-is-azure-key-vault\" style=\"position:relative;\"><a href=\"#what-is-azure-key-vault\" aria-label=\"what is azure key vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Azure Key Vault?</h2>\n<p>Azure Key Vault is a cloud service that helps you store your application's secrets securely: You can store and manage the keys, passwords, certificates, and other secrets. You can also leverage Azure Key Vault to set parameters shared among multiple applications, including applications running in App Service.</p>\n<p>It enables you to isolate the sensitive and non-sensitive data in your application. For example, you can use application settings to store default parameters or key-value pairs containing some default settings used by the application. On the contrary, you can use Azure Key Vault to store API keys, secret keys, database connection strings, or Client IDs used in your application.</p>\n<h2 id=\"understanding-managed-identity\" style=\"position:relative;\"><a href=\"#understanding-managed-identity\" aria-label=\"understanding managed identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding Managed Identity</h2>\n<p>Managed identity is a concept that eliminates the need of having to store credentials once an application has been deployed in the cloud. By using managed identity, you can securely access a variety of Azure services without having to store any credentials like connection strings or passwords. Managed identity may be used to connect to Key Vault from an Azure Function App or an Azure Web App, as well as to connect to Azure Blob Storage from an Azure Web App.</p>\n<p>Managed identities are of the following two types:</p>\n<ul>\n<li><strong>System-assigned</strong> -- this is activated directly on the Azure cloud service. For example, you can create a managed identity for your web app that will be automatically deleted once the web app instance is deleted</li>\n<li><strong>User-assigned</strong> -- this is a stand-alone Azure resource that is created independent of the actual service instance. You can assign this identifier to one or more Azure resources simultaneously. As an example, you can set this identity to both an Azure Web App and an Azure Function at the same time</li>\n</ul>\n<h2 id=\"create-a-web-app-in-the-azure-portal\" style=\"position:relative;\"><a href=\"#create-a-web-app-in-the-azure-portal\" aria-label=\"create a web app in the azure portal permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a Web App in the Azure Portal</h2>\n<p>You'll now create an Azure Web App instance with the permissions to access Azure Key Vault. Adhere to the steps given below that would guide you to create a new Azure Web App instance while you’re within the Azure portal:</p>\n<ol>\n<li>In the Azure Portal, click on \"Create a resource\" from the Home screen</li>\n<li>\n<p>Select \"Web App\" from the list</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.92307692307692%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Create a new resource in Azure\"\n        title=\"Create a new resource in Azure\"\n        src=\"/static/881710611150de6c542f6656de3b727e/e5715/881710611150de6c542f6656de3b727e.png\"\n        srcset=\"/static/881710611150de6c542f6656de3b727e/a6d36/881710611150de6c542f6656de3b727e.png 650w,\n/static/881710611150de6c542f6656de3b727e/e5715/881710611150de6c542f6656de3b727e.png 768w,\n/static/881710611150de6c542f6656de3b727e/77f8f/881710611150de6c542f6656de3b727e.png 1353w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n</li>\n<li>Specify the name and a region for your web app</li>\n<li>\n<p>Mention the resource group and app service plan for your web app</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 46.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAJCAIAAAC9o5sfAAAACXBIWXMAACHVAAAh1QEEnLSdAAABDklEQVQoz4WRTUsDMRCG9///C8Gjggh69gOKisVDsfSgLQULVXc335NkJps4u0vFQ3FfnjkMJHnnnVQnT/vT58+zhbpb29mbuFl9z9ZqvvPzj1/gZQf3G3u+UJdLxScvXvX1Sl8tRZVAkzel5FIKBResThiGlunKv6qEdgaCD5EoCaVbIZmmFa3UUmljrQPgopRSl2kgHahsoJTz+FJd103TgHOWgXCQZ3XdkSmqv41lGcMeHsBI6R1EHslHD56IJi7HGDkAp7Uh7SW62BFlZJCN87QzYu/wZelhazeNj5QBs3I+TDpzWkLsR0AMzmLso2auxGs55kyDxn08bvXtu4YQMUbes9YGEfOoY1/1A/MGCG8yzXf1AAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Create a Web App\"\n        title=\"Create a Web App\"\n        src=\"/static/5624143e58bd0b77651c034c295db13c/e5715/5624143e58bd0b77651c034c295db13c.png\"\n        srcset=\"/static/5624143e58bd0b77651c034c295db13c/a6d36/5624143e58bd0b77651c034c295db13c.png 650w,\n/static/5624143e58bd0b77651c034c295db13c/e5715/5624143e58bd0b77651c034c295db13c.png 768w,\n/static/5624143e58bd0b77651c034c295db13c/2f6f6/5624143e58bd0b77651c034c295db13c.png 1377w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n</li>\n<li>In the Publish section, there are two choices: \"Code\" and \"Docker Container\". Choose \"Code\"</li>\n<li>Specify \".NET 5\" as the Runtime stack</li>\n<li>Set the Operation system to \"Windows\"</li>\n<li>For the region, specify the one that is closest to you</li>\n<li>You can leave the other options with their default values, and then, click on \"Review + Create\"</li>\n<li>Verify the configuration you've specified. If all is good, click \"Create\"</li>\n</ol>\n<p>Once the Web App has been created successfully, you'll be able to see it on the Home screen of the Azure Portal.</p>\n<h3 id=\"enable-managed-service-identity-for-your-web-app\" style=\"position:relative;\"><a href=\"#enable-managed-service-identity-for-your-web-app\" aria-label=\"enable managed service identity for your web app permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable Managed Service Identity for your Web App</h3>\n<p>To enable the system-assigned managed identity for the Azure Web App we just created, follow the steps given below:</p>\n<ol>\n<li>Select \"Identity\" from the left-side menu in the Azure Web App</li>\n<li>Change the \"Status\" toggle pertaining to the System-assigned tab to \"On\"</li>\n<li>Copy the \"Object ID\" that would be available after a few seconds</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 44.61538461538462%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAJCAIAAAC9o5sfAAAACXBIWXMAABJ0AAASdAHeZh94AAABJklEQVQoz41QyUoEMRDNv/oByhw8edCf8OxRxAUdBT149Ca4MAwiggw92sz0kj2prD1liyLMoX08XqXyKpVKyOb5fDSebxzN9u8WJ4/14UNz/ETPJvyXpxN+MeUH9+3osty5WWyNy+2rcvd2uXddkOiE4W3ULBgerepS7P4NsqSiZtKlThkoympZNy2lQkqpELoPWhrgGpiy2oIBZ5234JwPhNNWcmaNds7lFGIIgJ4FdGPErAcueqY/yDmTijKw2MsbJV8/aVGr4AHr0BseW+BgUuIlbds8T1/e3mcf84IxBgDYfuCwNkYKgaXeRymN0iakLsTsQ0K6XteJ+1hDGs6D913OxqWKQcNMI/B7PFcelfX6TfaTolLltI1EapvS1wsHh1zHCr7RADXHQl2uAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Enable Managed Service Identity for your Web App\"\n        title=\"Enable Managed Service Identity for your Web App\"\n        src=\"/static/2e9e15c8ac1dfa31c0399b8d95112706/e5715/2e9e15c8ac1dfa31c0399b8d95112706.png\"\n        srcset=\"/static/2e9e15c8ac1dfa31c0399b8d95112706/a6d36/2e9e15c8ac1dfa31c0399b8d95112706.png 650w,\n/static/2e9e15c8ac1dfa31c0399b8d95112706/e5715/2e9e15c8ac1dfa31c0399b8d95112706.png 768w,\n/static/2e9e15c8ac1dfa31c0399b8d95112706/7ebf9/2e9e15c8ac1dfa31c0399b8d95112706.png 1919w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"create-and-configure-azure-key-vault\" style=\"position:relative;\"><a href=\"#create-and-configure-azure-key-vault\" aria-label=\"create and configure azure key vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create and Configure Azure Key Vault</h2>\n<p>In this section, you’ll examine how to create and configure an Azure Key Vault instance.</p>\n<h3 id=\"create-a-new-azure-key-vault-instance\" style=\"position:relative;\"><a href=\"#create-a-new-azure-key-vault-instance\" aria-label=\"create a new azure key vault instance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a new Azure Key Vault Instance</h3>\n<p>You'll now create an Azure Key Vault in the Azure Portal and then add a secret to it. To create a new Azure Key Vault instance, navigate to the Azure Portal and follow the steps below:</p>\n<ol>\n<li>Select \"Create a resource\" in the Azure Portal menu or the Home page</li>\n<li>Specify \"Key Vault\" in the search box</li>\n<li>When the results are listed, choose \"Key Vault\"</li>\n<li>Click \"Create\"</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Create a new Key Vault Instance in Azure\"\n        title=\"Create a new Key Vault Instance in Azure\"\n        src=\"/static/9216ad5fd03240b518e4facf1d4e7127/e5715/9216ad5fd03240b518e4facf1d4e7127.png\"\n        srcset=\"/static/9216ad5fd03240b518e4facf1d4e7127/a6d36/9216ad5fd03240b518e4facf1d4e7127.png 650w,\n/static/9216ad5fd03240b518e4facf1d4e7127/e5715/9216ad5fd03240b518e4facf1d4e7127.png 768w,\n/static/9216ad5fd03240b518e4facf1d4e7127/95e59/9216ad5fd03240b518e4facf1d4e7127.png 1460w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"5\">\n<li>In the \"Create key vault\" screen provide the name, subscription, resource group name, and location. Leave the other options to their default values.</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAANCAIAAAAmMtkJAAAACXBIWXMAABJ0AAASdAHeZh94AAABTElEQVQoz5VSzUoDMRjMcwqeFd/D56iiB3spiHfBgxcpFrx5c9dq6dbNZvOfrMk6m7WlZRfBYQhffiaZTEKOp8uT2efZ7eroZnk6+7icl5Onr54X8/J6UQ159VxNX9j5fUEkZ8V6XRQbLUXbtrH9B4jSGjRaW8AY3zTWOmNMCOFvZYwtgYgLoZSSPVIthNj2+i7HziMnVxXNsrc8z98TsizbtXlCX8DLiBhbMsa01k2C3wN6id3g6C0IZJTSnex7i35ktyNGxgJTqqoqTDvQOcSHi0olUXcROtsXaEfE8IMJuEsJtpTymgmjrLfNPp3xw2ck8COV6sKM3aQysBm6dYeMYeQHEHjqvkforoQFGyZXJV8zWZvmkH4oJ1ToTW24TeIQON5VW20caF3j/C+t83EA8vBaTh6Xd4uVlIrzGukgQjwefk2E1z2EAX4AgaPo7/e6GKUAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Specify name, subscription, resource group name, and location for the Key Vault Instance\"\n        title=\"Specify name, subscription, resource group name, and location for the Key Vault Instance\"\n        src=\"/static/9af0907aec14ae465c57c97a6c4ec146/e5715/9af0907aec14ae465c57c97a6c4ec146.png\"\n        srcset=\"/static/9af0907aec14ae465c57c97a6c4ec146/a6d36/9af0907aec14ae465c57c97a6c4ec146.png 650w,\n/static/9af0907aec14ae465c57c97a6c4ec146/e5715/9af0907aec14ae465c57c97a6c4ec146.png 768w,\n/static/9af0907aec14ae465c57c97a6c4ec146/6edca/9af0907aec14ae465c57c97a6c4ec146.png 1351w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"6\">\n<li>Click “Review + Create”</li>\n<li>Review the entered configuration. If all is fine, click \"Create\"</li>\n</ol>\n<h3 id=\"create-an-app-secret-in-azure-key-vault\" style=\"position:relative;\"><a href=\"#create-an-app-secret-in-azure-key-vault\" aria-label=\"create an app secret in azure key vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create an App Secret in Azure Key Vault</h3>\n<p>Now that you've created a Key Value instance, you'll add a secret to it and then make the secret accessible to the Azure Web App we created earlier. Follow the steps below to create a secret:</p>\n<ol>\n<li>Select \"Secrets\" from the \"Settings\" section of the \"Key Vault configuration\" page</li>\n<li>Click \"Generate/Import\" to add a secret</li>\n<li>Select \"Manual\" from the \"Upload options\" dropdown</li>\n<li>Next, mention the name and value of the secret</li>\n<li>Optionally specify the \"Content type\"</li>\n<li>Optionally set the \"activation and expiration date\" options</li>\n<li>Click \"Create\"</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.92307692307691%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAANCAIAAAAmMtkJAAAACXBIWXMAABJ0AAASdAHeZh94AAABGUlEQVQoz6WRu04DMRBF/Zu0iArxIfT8ACkWJKQU6eiQkKgCRCCB6CgSsrAv7yOxZ8YeL042LCFaoUS5OoWv7dEdj8Vh/+NkEB4PwoPL8elNFDyk58O0N0x692nwKC9G+QbBKL96Ks7ukqP+ROQyi5IkTjNjud5RggwhArP1hp2z1rpW9Qpu3Jrc4nItEFEpXS+P2HIhC9Jo0PwC5HeYO/oSoDURNcanfk6TKEzjL9kyr1DNyJquYp9clqVSyhuyXIKtkCu0a3CJbNh1JYP2xQC4TLZItPG8/wYGAG3bivj6rZCVH8FWkxf1HhLstm9zv2T3V+JlOptkuvn3nZNvX6Pn95gtmR8RklboAb2gWXvUHHJZyGyFX38DgoDxSx+YEVEAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Create a new Secret\"\n        title=\"Create a new Secret\"\n        src=\"/static/f0c25e31cb9de4940c50cf37bf04e26d/e5715/f0c25e31cb9de4940c50cf37bf04e26d.png\"\n        srcset=\"/static/f0c25e31cb9de4940c50cf37bf04e26d/a6d36/f0c25e31cb9de4940c50cf37bf04e26d.png 650w,\n/static/f0c25e31cb9de4940c50cf37bf04e26d/e5715/f0c25e31cb9de4940c50cf37bf04e26d.png 768w,\n/static/f0c25e31cb9de4940c50cf37bf04e26d/07a9c/f0c25e31cb9de4940c50cf37bf04e26d.png 1440w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"authorize-the-web-app-to-access-your-key-vault\" style=\"position:relative;\"><a href=\"#authorize-the-web-app-to-access-your-key-vault\" aria-label=\"authorize the web app to access your key vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authorize the Web App to access Your Key Vault</h3>\n<p>To provide access to the secret you created, follow the steps below:</p>\n<ol>\n<li>Select \"Access policies\" from the \"Key Vault\" screen</li>\n<li>Click \"Add Access Policy\"</li>\n<li>Provide the \"Get\" and \"List\" permissions</li>\n<li>In the “Select a Principal” option, specify the value for the \"Object ID\" you\ncopied earlier for the Azure Web App</li>\n<li>Paste, search and then select it from the list</li>\n<li>Click \"Add\"</li>\n<li>Click \"Save\" to persist the changes and complete the process</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAABJ0AAASdAHeZh94AAABD0lEQVQoz5WQPU/DMBCG8+tYkRiZmJH6cxBLqRAslVhg4BcgBqiYGRhQi0ILSdM4duyzzx+cUyJFCBL66tXJp/Oj+0j2LxaH0/To6n1vMh/dpJOH7OT+87Tx+HF9Nit+eDwrzp+K4+v04HKebEqWrrK3VZ5tSh+CC8G3dj7a/maqkhINSgpuQFnUYUclACCE0FobYyxiLYShZ8yiNMAwbK2lxGhkBUON1lgD2Nj0w6pijJpQUiuz/Mh5xaWU3sW9tvFPuJZQlBXouPBiLV+WJRHYDBJh3wvfvYrbZ+YcnTnQ5qyquuUBWFsP9vsHInLOu8AA3E0IZoxR3A6yG0xny/OcmiulXKv/wt1WvlUP/AUpNLW8EED0XAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Add Access Policy for the Key Vault\"\n        title=\"Add Access Policy for the Key Vault\"\n        src=\"/static/20064fe32ee34d74ab431409b7b3fcf6/e5715/20064fe32ee34d74ab431409b7b3fcf6.png\"\n        srcset=\"/static/20064fe32ee34d74ab431409b7b3fcf6/a6d36/20064fe32ee34d74ab431409b7b3fcf6.png 650w,\n/static/20064fe32ee34d74ab431409b7b3fcf6/e5715/20064fe32ee34d74ab431409b7b3fcf6.png 768w,\n/static/20064fe32ee34d74ab431409b7b3fcf6/bb5d0/20064fe32ee34d74ab431409b7b3fcf6.png 1453w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"create-a-new-aspnet-5-core-application\" style=\"position:relative;\"><a href=\"#create-a-new-aspnet-5-core-application\" aria-label=\"create a new aspnet 5 core application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a New ASP.NET 5 Core application</h2>\n<p>First of all, you'll create an ASP.NET Core 5 web application. The project type comes bundled with all the template files to create a web application, even before you add something. Follow the steps given below to create a new ASP.NET Core Web application within the Visual Studio 2019 IDE.</p>\n<ol>\n<li>Launch Visual Studio 2019</li>\n<li>In the start window, choose \"Create a new project\"</li>\n<li>In the \"Add a new project\" window, choose \"ASP.NET Core Web API\" from the list of the project templates</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Create a new project in Visual Studio\"\n        title=\"Create a new project in Visual Studio\"\n        src=\"/static/68f5590f4a272da6dca010ff6f0bcfde/e5715/68f5590f4a272da6dca010ff6f0bcfde.png\"\n        srcset=\"/static/68f5590f4a272da6dca010ff6f0bcfde/a6d36/68f5590f4a272da6dca010ff6f0bcfde.png 650w,\n/static/68f5590f4a272da6dca010ff6f0bcfde/e5715/68f5590f4a272da6dca010ff6f0bcfde.png 768w,\n/static/68f5590f4a272da6dca010ff6f0bcfde/53ac9/68f5590f4a272da6dca010ff6f0bcfde.png 1287w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"4\">\n<li>Select \"C#\" as the programming language from the \"Language\" list</li>\n<li>Click \"Next\"</li>\n<li>In the \"Configure your new project\" screen, enter the name and location of the new project</li>\n<li>Then, choose \"Next\"</li>\n<li>In the \"Additional information\" window, ensure that .NET 5.0 (current) is selected as the framework version</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAANCAIAAAAmMtkJAAAACXBIWXMAABJ0AAASdAHeZh94AAAA8klEQVQoz5WR226EMAxE+f+/RBQKIRsn4Dixw0o16UXtstB2NA+WwvEYu2EWAO+c8z6oag2IWEoR2f1VfLdSOXMjIi9d17Zt13XDMIzj1Pe99mJ9F+GqUlsc1eg3wYMPezAR3asUyykpljmrROQUni2MxnnMMQlGXiMjyV7Tbkpcynmymd00g18zKXPwL7CDBQK6EGvmo69g/R0AN5k5IN237amvkie7vN6iDWkGerABuoVYTta9n0r3bKwzFtySiDj+9PXYsn2Od6Yj9n675uyGT6VtPpLu2/9gnSBG8n7xC1mPLHVhf1dKCTFiTKteleUNMgfzej8PmXgAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Specify additional information for the new ASP.NET Core 5 project\"\n        title=\"Specify additional information for the new ASP.NET Core 5 project\"\n        src=\"/static/307b2784a56ac53e9fac3730a568c92d/e5715/307b2784a56ac53e9fac3730a568c92d.png\"\n        srcset=\"/static/307b2784a56ac53e9fac3730a568c92d/a6d36/307b2784a56ac53e9fac3730a568c92d.png 650w,\n/static/307b2784a56ac53e9fac3730a568c92d/e5715/307b2784a56ac53e9fac3730a568c92d.png 768w,\n/static/307b2784a56ac53e9fac3730a568c92d/1320e/307b2784a56ac53e9fac3730a568c92d.png 1292w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol>\n<li>Since you'll not be using authentication, HTTPS or Docker, or OpenAPI, ensure that all these checkboxes are disabled</li>\n<li>Click \"Create\" to complete the process</li>\n</ol>\n<p>A new ASP.NET 5 Core application will be created in Visual Studio.</p>\n<h3 id=\"install-the-nuget-packages\" style=\"position:relative;\"><a href=\"#install-the-nuget-packages\" aria-label=\"install the nuget packages permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Install the NuGet Packages</h3>\n<p>To work with AzureKeyVault, you must install <code>Microsoft.Extensions.Azure</code> and <code>Azure.Security.KeyVault.Secrets</code> packages. While you can use the former for injecting dependencies for accessing Azure services, you can use the latter to access secrets via a SecretClient instance.</p>\n<p>You may install these packages in one of two ways: Either via the NuGet Package Manager integrated into the Visual Studio 2019 IDE or by running the following command(s) in the Package Manager Console:</p>\n<p><code>Install-Package Microsoft.Extensions.Azure</code></p>\n<p><code>Install-Package Azure.Security.KeyVault.Secrets</code></p>\n<h3 id=\"read-azure-key-vault-secrets-in-net-core\" style=\"position:relative;\"><a href=\"#read-azure-key-vault-secrets-in-net-core\" aria-label=\"read azure key vault secrets in net core permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Read Azure Key Vault Secrets in .NET Core</h3>\n<p>In this section, you’ll examine how to read secrets from AzureKeyVault.</p>\n<h4 id=\"specify-the-vault-uri-in-appsettings\" style=\"position:relative;\"><a href=\"#specify-the-vault-uri-in-appsettings\" aria-label=\"specify the vault uri in appsettings permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Specify the Vault Uri in AppSettings</h4>\n<p>Create a section named \"KeyVault\" in the <code>appsettings.json</code> file and specify a key named \"VaultUri\" in there as shown below:</p>\n<p><code>\"KeyVault\": {</code></p>\n<p><code>\"VaultUri\": \"https://applicationsecretsdemo.vault.azure.net/\"</code></p>\n<p><code>}</code></p>\n<h4 id=\"access-secrets-from-azurekeyvault\" style=\"position:relative;\"><a href=\"#access-secrets-from-azurekeyvault\" aria-label=\"access secrets from azurekeyvault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Access Secrets from AzureKeyVault</h4>\n<p>To access the secrets stored in the AzureKeyVault, you can take advantage of SecretClient pertaining to the  <code>Azure.Security.KeyVault.Secrets</code> namespace. Create an interface named \"IKeyVaultManager\" with the following code in there:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">interface</span><span class=\"mtk1\"> </span><span class=\"mtk10\">IKeyVaultManager</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">public </span><span class=\"mtk10\">Task</span><span class=\"mtk1\">&lt;</span><span class=\"mtk4\">string</span><span class=\"mtk1\">&gt; </span><span class=\"mtk11\">GetSecret</span><span class=\"mtk1\">(</span><span class=\"mtk4\">string</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>Create a class named \"KeyVaultManager\" that extends the \"IKeyVaultManager\" interface and implements the <code>GetSecret</code> method as follows:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">KeyVaultManager</span><span class=\"mtk1\">:</span><span class=\"mtk10\">IKeyVaultManager</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">private</span><span class=\"mtk1\"> </span><span class=\"mtk4\">readonly</span><span class=\"mtk1\"> </span><span class=\"mtk10\">SecretClient</span><span class=\"mtk1\"> </span><span class=\"mtk12\">_secretClient</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk11\">KeyVaultManager</span><span class=\"mtk1\">(</span><span class=\"mtk10\">SecretClient</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretClient</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">_secretClient</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">secretClient</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">async</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Task</span><span class=\"mtk1\">&lt;</span><span class=\"mtk4\">string</span><span class=\"mtk1\">&gt; </span><span class=\"mtk11\">GetSecret</span><span class=\"mtk1\">(</span><span class=\"mtk4\">string</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">try</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk10\">KeyVaultSecret</span><span class=\"mtk1\"> </span><span class=\"mtk12\">keyValueSecret</span><span class=\"mtk1\"> = </span><span class=\"mtk4\">await</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">_secretClient</span><span class=\"mtk1\">.</span><span class=\"mtk11\">GetSecretAsync</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk12\">keyValueSecret</span><span class=\"mtk1\">.</span><span class=\"mtk12\">Value</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">catch</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">throw</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>The \"KeyVaultManager\" class leverages the \"SecretClient\" class to retrieve secrets stored inside the AzureKeyVault.</p>\n<h4 id=\"the-keyvaluecontroller-class\" style=\"position:relative;\"><a href=\"#the-keyvaluecontroller-class\" aria-label=\"the keyvaluecontroller class permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The KeyValueController Class</h4>\n<p>The \"KeyValueController\" takes advantages of the \"KeyValueManager\" class to read the secret value for a given secret name and returns the value stored in there.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">KeyVaultController</span><span class=\"mtk1\"> : </span><span class=\"mtk10\">ControllerBase</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">private</span><span class=\"mtk1\"> </span><span class=\"mtk4\">readonly</span><span class=\"mtk1\"> </span><span class=\"mtk10\">IKeyVaultManager</span><span class=\"mtk1\"> </span><span class=\"mtk12\">_secretManager</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk11\">KeyVaultController</span><span class=\"mtk1\">(</span><span class=\"mtk10\">IKeyVaultManager</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretManager</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">_secretManager</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">secretManager</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">[</span><span class=\"mtk10\">HttpGet</span><span class=\"mtk1\">]</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">async</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Task</span><span class=\"mtk1\">&lt;</span><span class=\"mtk10\">IActionResult</span><span class=\"mtk1\">&gt; </span><span class=\"mtk11\">Get</span><span class=\"mtk1\">([</span><span class=\"mtk10\">FromQuery</span><span class=\"mtk1\">] </span><span class=\"mtk4\">string</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">try</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">if</span><span class=\"mtk1\"> (</span><span class=\"mtk12\">string</span><span class=\"mtk1\">.</span><span class=\"mtk11\">IsNullOrEmpty</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">))</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk11\">BadRequest</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">string</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretValue</span><span class=\"mtk1\"> = </span><span class=\"mtk4\">await</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">_secretManager</span><span class=\"mtk1\">.</span><span class=\"mtk11\">GetSecret</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">if</span><span class=\"mtk1\"> (!</span><span class=\"mtk12\">string</span><span class=\"mtk1\">.</span><span class=\"mtk11\">IsNullOrEmpty</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretValue</span><span class=\"mtk1\">))</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk11\">Ok</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretValue</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">else</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk11\">NotFound</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;Secret key not found.&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">catch</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk11\">BadRequest</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;Error: Unable to read secret&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h4 id=\"register-the-dependencies-in-the-configureservices-method\" style=\"position:relative;\"><a href=\"#register-the-dependencies-in-the-configureservices-method\" aria-label=\"register the dependencies in the configureservices method permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Register the Dependencies in the ConfigureServices Method</h4>\n<p>You should specify the necessary code for dependency injection to work in the \"ConfigureServices\" method of the \"Startup\" class as shown in the code snippet given below:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">void</span><span class=\"mtk1\"> </span><span class=\"mtk11\">ConfigureServices</span><span class=\"mtk1\">(</span><span class=\"mtk10\">IServiceCollection</span><span class=\"mtk1\"> </span><span class=\"mtk12\">services</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">services</span><span class=\"mtk1\">.</span><span class=\"mtk11\">AddAzureClients</span><span class=\"mtk1\">(</span><span class=\"mtk12\">azureClientFactoryBuilder</span><span class=\"mtk1\"> =&gt;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">azureClientFactoryBuilder</span><span class=\"mtk1\">.</span><span class=\"mtk11\">AddSecretClient</span><span class=\"mtk1\">(</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">Configuration</span><span class=\"mtk1\">.</span><span class=\"mtk11\">GetSection</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;KeyVault&quot;</span><span class=\"mtk1\">));</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">});</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">services</span><span class=\"mtk1\">.</span><span class=\"mtk11\">AddSingleton</span><span class=\"mtk1\">&lt;</span><span class=\"mtk10\">IKeyVaultManager</span><span class=\"mtk1\">,</span><span class=\"mtk10\">KeyVaultManager</span><span class=\"mtk1\">&gt;();</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">services</span><span class=\"mtk1\">.</span><span class=\"mtk11\">AddControllersWithViews</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h2 id=\"deploy-the-application-to-azure\" style=\"position:relative;\"><a href=\"#deploy-the-application-to-azure\" aria-label=\"deploy the application to azure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Deploy the Application to Azure</h2>\n<p>To deploy the application, follow the steps below:</p>\n<ol>\n<li>Right-click on the project in the \"Solution Explorer Window\"</li>\n<li>Select \"Publish\"</li>\n<li>Select \"Azure\" as the target from the \"Publish\" window as shown below:</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 67.38461538461537%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Deploy the application to Azure\"\n        title=\"Deploy the application to Azure\"\n        src=\"/static/8e627ca65b5d868ab7fca443032bc43c/e5715/8e627ca65b5d868ab7fca443032bc43c.png\"\n        srcset=\"/static/8e627ca65b5d868ab7fca443032bc43c/a6d36/8e627ca65b5d868ab7fca443032bc43c.png 650w,\n/static/8e627ca65b5d868ab7fca443032bc43c/e5715/8e627ca65b5d868ab7fca443032bc43c.png 768w,\n/static/8e627ca65b5d868ab7fca443032bc43c/91608/8e627ca65b5d868ab7fca443032bc43c.png 1251w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"4\">\n<li>Select \"Azure App Service (Windows)\" as the specific target as shown below:</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Specify the Azure service to host your application\"\n        title=\"Specify the Azure service to host your application\"\n        src=\"/static/f80e91e7daf51e89558a3e863ce72e2a/e5715/f80e91e7daf51e89558a3e863ce72e2a.png\"\n        srcset=\"/static/f80e91e7daf51e89558a3e863ce72e2a/a6d36/f80e91e7daf51e89558a3e863ce72e2a.png 650w,\n/static/f80e91e7daf51e89558a3e863ce72e2a/e5715/f80e91e7daf51e89558a3e863ce72e2a.png 768w,\n/static/f80e91e7daf51e89558a3e863ce72e2a/6bfd0/f80e91e7daf51e89558a3e863ce72e2a.png 1011w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"5\">\n<li>Specify, or associate, the \"App Service instance\" with your application</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Publish your application\"\n        title=\"Publish your application\"\n        src=\"/static/89177ae5689c32f917b8d609f07f8ecc/e5715/89177ae5689c32f917b8d609f07f8ecc.png\"\n        srcset=\"/static/89177ae5689c32f917b8d609f07f8ecc/a6d36/89177ae5689c32f917b8d609f07f8ecc.png 650w,\n/static/89177ae5689c32f917b8d609f07f8ecc/e5715/89177ae5689c32f917b8d609f07f8ecc.png 768w,\n/static/89177ae5689c32f917b8d609f07f8ecc/d6a46/89177ae5689c32f917b8d609f07f8ecc.png 1008w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ol start=\"6\">\n<li>Click \"Finish\"</li>\n</ol>\n<h2 id=\"execute-the-application\" style=\"position:relative;\"><a href=\"#execute-the-application\" aria-label=\"execute the application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Execute the Application</h2>\n<p>Lastly, you can use Postman to send a <code>Http Get</code> request to the endpoint to retrieve the stored secret as shown below:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 43.84615384615385%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAJCAIAAAC9o5sfAAAACXBIWXMAABJ0AAASdQHHfS45AAAA/ElEQVQoz4VSO3bEIAzk0DlN7pEyB0iRetuUW3j5Yz4SkAE2+9ikyDyePQhrNBIWTt6ivnGOxNzqQGvrXfsf4Mh7TyWD9s7CWKuNVVprpdXEoEpJKWOMpRTakHO2Rl9VfL+4zy8vfICWXwnaaGPMyl8Ez/M8oZImQBulyzW/vJ2vH0l4ayAJk8RUp9+1BZj5YXi1szVQeyVxHAe+nvu+jlHBWtueEUJA/cWhAwuICHS1VB9AQcjtESgiuFW+E3EXmxN+MrahcqXRBHMdi7gVHikCU3HBWwenFk5ySiWlX9dDhTLuZ65CJVGVLoWYBUYdfHA/QD5G1//D+he+AWHuDW/cX8wPAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Execute the application\"\n        title=\"Execute the application\"\n        src=\"/static/383d2af1fcf9e2a16f2960de147ca549/e5715/383d2af1fcf9e2a16f2960de147ca549.png\"\n        srcset=\"/static/383d2af1fcf9e2a16f2960de147ca549/a6d36/383d2af1fcf9e2a16f2960de147ca549.png 650w,\n/static/383d2af1fcf9e2a16f2960de147ca549/e5715/383d2af1fcf9e2a16f2960de147ca549.png 768w,\n/static/383d2af1fcf9e2a16f2960de147ca549/aa878/383d2af1fcf9e2a16f2960de147ca549.png 1385w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summary</h2>\n<p>Azure key vault helps you to keep your application's secrets out of the application. You can use it to isolate secrets from your code files. These secrets include connection strings, API keys, environment variables, etc. You can take advantage of Azure Key Vault to keep secrets out of source control or out of your application in a centralized storage place. In this article, you've used managed identity to connect an Azure web app in .NET to an Azure Key Vault and retrieve secret value from there.</p>\n<p>The complete source code of the application discussed in this article can be found here: <a href=\"https://github.com/LoginRadius/engineering-blog-samples/pull/118\">Source Code</a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk10 { color: #4EC9B0; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n</style>","frontmatter":{"date":"August 09, 2021","updated_date":null,"description":"In this tutorial, you'll learn how to work with Azure Key Vault in C#.","title":"How to Use Azure Key Vault With an Azure Web App in C#","tags":["Azure","Key Vault","C#"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/bed799b83db7c1ce0146aeab64f8703a/ee604/image.png","srcSet":"/static/bed799b83db7c1ce0146aeab64f8703a/69585/image.png 200w,\n/static/bed799b83db7c1ce0146aeab64f8703a/497c6/image.png 400w,\n/static/bed799b83db7c1ce0146aeab64f8703a/ee604/image.png 800w,\n/static/bed799b83db7c1ce0146aeab64f8703a/f3583/image.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Joydip Kanjilal","github":"joydipkanjilal","avatar":null}}}},{"node":{"excerpt":"In a world where data breaches aren’t uncommon, businesses are always on the verge of compromising sensitive information, and cybersecurity…","fields":{"slug":"/identity/beginners-guide-zero-trust-security/"},"html":"<p>In a world where data breaches aren’t uncommon, businesses are always on the verge of compromising sensitive information, and cybersecurity best practices become the need of the hour. </p>\n<p>For years, enterprises have modeled cybersecurity around a specific virtual perimeter of trust, including trusted users, devices, and trusted network infrastructure. </p>\n<p>Although these fundamental entities are considered safe and trustworthy, this cybersecurity model is the one that’s been exploited by cybercriminals for years. </p>\n<p>Undoubtedly, there’s an immediate need for a robust mechanism that doesn’t leave any loophole in the entire system consisting of numerous devices, users, and digital touchpoints and provides a risk-free ecosystem. </p>\n<p>Here’s where the <a href=\"https://www.loginradius.com/blog/identity/sase-zero-trust/\">zero trust security model</a> comes into play. </p>\n<p>The shortcomings of the current cybersecurity system that can be quickly analyzed by hackers that are always on a hunt for finding loopholes can be fixed by implementing a zero trust security model across the entire network. </p>\n<p>Let’s understand the concept of zero trust in detail and why businesses need to put their best foot forward in deploying zero trust security without further delay. </p>\n<h2 id=\"what-is-zero-trust-security\" style=\"position:relative;\"><a href=\"#what-is-zero-trust-security\" aria-label=\"what is zero trust security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Zero Trust Security</h2>\n<p>Zero trust can be defined as the security concept based on a belief that enterprises shouldn’t automatically trust any device or individual, whether inside or outside its perimeters and should strictly verify everything before granting access. </p>\n<p>In a nutshell, zero trust relies on the principle of “don’t trust anyone.” This architecture cuts all the access points until proper verification is done and trust is established. </p>\n<p>No access is provided until the system verifies the individual or device demanding n access to the IP address, device, or storage. </p>\n<p>This strategic initiative helps prevent data breaches as the concept of trusting anyone is eliminated, even if the access request is from within the network. </p>\n<p>Hence, implementing zero trust architecture ensures the highest level of security and mitigates the risk of a data breach or unauthorized access.</p>\n<h2 id=\"why-do-you-need-zero-trust-security\" style=\"position:relative;\"><a href=\"#why-do-you-need-zero-trust-security\" aria-label=\"why do you need zero trust security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Do You Need Zero Trust Security</h2>\n<p>The zero trust security model strictly believes that everything inside is by default secure, and the only thing that requires adequate security is outside network access. </p>\n<p>Moreover, security experts now firmly believe that the conventional security approach is good for nothing, especially in a world where most data breaches are caused by bypassing the corporate firewalls and the hackers could move inside a private network without enough resistance. </p>\n<p>Many businesses are letting too many things run way too openly on too many connections, which is perhaps why they get targeted by cybercriminals that are always on a hunt for enterprise networks with minimal layers of security. </p>\n<p>Since the network is too open for all inside the organization, anyone can share everything, which is alarming. </p>\n<p>Hence enterprises today need a whole new way of thinking regarding access management within the organization, which helps minimize data compromise by a bad external actor. </p>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-zero-trust-1\"\n        title=\"WP-zero-trust-1\"\n        src=\"/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-1.png\"\n        srcset=\"/static/1899738346b212558cc624397cb31d32/a6d36/WP-zero-trust-1.png 650w,\n/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-1.png 768w,\n/static/1899738346b212558cc624397cb31d32/81501/WP-zero-trust-1.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"benefits-of-getting-zero-trust-security-mechanism\" style=\"position:relative;\"><a href=\"#benefits-of-getting-zero-trust-security-mechanism\" aria-label=\"benefits of getting zero trust security mechanism permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Getting Zero Trust Security Mechanism</h2>\n<h3 id=\"1-safeguards-sensitive-business-information-and-brand-repute\" style=\"position:relative;\"><a href=\"#1-safeguards-sensitive-business-information-and-brand-repute\" aria-label=\"1 safeguards sensitive business information and brand repute permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Safeguards Sensitive Business Information and Brand Repute</h3>\n<p>Securing sensitive business data should be the #1 priority for enterprises embarking on a journey to digital transformation, which not only prevents losses worth millions of dollars but eventually preserves brand reputation. </p>\n<p>Lack of a robust security mechanism could also lead to compromised consumer identities that further cause financial losses.</p>\n<p>Moreover, consumers’ refusal to do business with a breached enterprise will naturally affect the overall revenues.</p>\n<p>Enforcing an effective Zero Trust solution will not only ensure that only authenticated and authorized individuals and devices have access to resources and applications but will also help <a href=\"https://www.loginradius.com/blog/identity/how-to-handle-data-breaches/\">mitigate data breaches</a>, preventing many of these negative consequences.</p>\n<h3 id=\"2-greater-visibility\" style=\"position:relative;\"><a href=\"#2-greater-visibility\" aria-label=\"2 greater visibility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Greater Visibility</h3>\n<p>Since Zero Trust never trusts anyone, you can always decide what resources, data, and activity you’ll need to add to your security strategy.</p>\n<p>All information and computing sources are secure, and every user needs to go through a stringent authentication process to gain access to specific resources. Once you have set up the monitoring that covers all your activities and resources, you gain complete visibility into how and who accesses your organization’s network.</p>\n<p>This means you have precise data regarding the time, location, and application involved in each request.</p>\n<p>Moreover, your overall security system helps to flag suspicious behaviors and keeps track of every activity that occurs.</p>\n<h3 id=\"3-secures-remote-workforce\" style=\"position:relative;\"><a href=\"#3-secures-remote-workforce\" aria-label=\"3 secures remote workforce permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Secures Remote Workforce</h3>\n<p>One of the biggest challenges IT organizations face today is the sudden shift to the remote working ecosystem.</p>\n<p>As per the latest<a href=\"https://lp.skyboxsecurity.com/WICD-2020-11-WW-Distributed-Workforce-Report-Reg.html\"> stats</a>, around 73% of IT professionals C-level executives are concerned that the distributed workforce has eventually introduced new vulnerabilities along with a sudden increase in exposure.</p>\n<p>With Zero Trust in place, identity is undeniably the perimeter and is attached to users, applications, and devices seeking access, reinforcing security.</p>\n<p>Moreover, the dependency on firewalls, which aren’t the best line of defense, is reduced as a robust security mechanism reassuring that users spread across the world can securely access data across the cloud.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>With the increasing risk of security breaches from within a network, the need for a zero trust mechanism becomes more crucial than ever before. </p>\n<p>Decision-makers and IT department heads of an organization should consider putting their best foot forward in <a href=\"https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/\">securing important consumer information</a> and business data by leveraging robust layers of defense through a zero trust security model. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 05, 2021","updated_date":null,"description":"With the rising number of cyberattacks, there’s an immediate need for a robust mechanism that provides a risk-free digital ecosystem. Zero trust helps businesses create the most secure environment that mitigates the risk of any kind of security breach.","title":"A Beginner's Guide to Zero Trust Security Model","tags":["zero trust security","cybersecurity","mfa"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9047619047619047,"src":"/static/43443aadbfa7657687a7b897f80a33f8/14b42/beginners-guide-zero-trust-security-cover.jpg","srcSet":"/static/43443aadbfa7657687a7b897f80a33f8/f836f/beginners-guide-zero-trust-security-cover.jpg 200w,\n/static/43443aadbfa7657687a7b897f80a33f8/2244e/beginners-guide-zero-trust-security-cover.jpg 400w,\n/static/43443aadbfa7657687a7b897f80a33f8/14b42/beginners-guide-zero-trust-security-cover.jpg 800w,\n/static/43443aadbfa7657687a7b897f80a33f8/16310/beginners-guide-zero-trust-security-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Leaving your employees defenseless during remote work can make your business vulnerable to potential risks. The internet poses numerous…","fields":{"slug":"/growth/secure-your-remote-workforce-with-identity-management/"},"html":"<p>Leaving your employees defenseless during remote work can make your business vulnerable to potential risks. The internet poses numerous threats for remote workers. They can easily fall prey to hackers, scammers, and fraudsters. You can protect them by implementing remote  work <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-best-practices-for-enterprises/\">security best practices</a>  in your digital workplace, such as identity management, for instance.</p>\n<p><a rel=\"nofollow\" href=\"https://www.statista.com/statistics/417602/global-market-forecast-identity-and-access-management/\">According to Statista</a>, business spending for identity management systems will reach $13.92 billion by the end of 2021. This is an organizational process that ensures individuals have appropriate access to tools and resources to do their jobs. It associates user rights and restrictions with established identities. This way, only authenticated users can access specific data and applications within your organization. Hence, many businesses consider identity management an essential tool for security.</p>\n<p>With that, here are some of the best practices to ensure cybersecurity for remote workers  using identity management.</p>\n<h2 id=\"1-choose-the-right-software\" style=\"position:relative;\"><a href=\"#1-choose-the-right-software\" aria-label=\"1 choose the right software permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Choose the right software</h2>\n<p>Nowadays, there are numerous identity access management tools to choose from. All of which offer different sets of features and functions to secure your business from potential threats. And while there is no such thing as a “correct” software, make sure to choose the right one for your business. Start by determining what your organization’s specific needs to tighten security are. Ask questions such as:</p>\n<ul>\n<li>How many employees work remotely?</li>\n<li>What type of applications do they use?</li>\n<li>What data do they have authorized access to?</li>\n<li>How secure is your IT infrastructure?</li>\n<li>What <a href=\"https://www.loginradius.com/blog/identity/pii-compliance-enterprise/\">security compliances</a> do you have to consider?</li>\n</ul>\n<p>After answering these questions, you can determine the features and functions you need for your identity management software. As a result, you can narrow down the list of software to choose from, making it easier to compare and contrast solutions.</p>\n<h2 id=\"2-develop-a-zero-trust-approach\" style=\"position:relative;\"><a href=\"#2-develop-a-zero-trust-approach\" aria-label=\"2 develop a zero trust approach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Develop a zero-trust approach</h2>\n<p>Zero trust refers to a network of security models that believe both users and applications shouldn’t be trusted. It requires mandatory verification, both inside and outside your network, to be able to access data and resources from your system. This ensures data security for remote workers  who use multiple devices and applications outside your networks.</p>\n<p>Businesses should be wary of everything on the internet. In fact, even on-premises or offline applications can be breached by hackers, scammers, and fraudsters. You need to start living and breathing zero-trust philosophy by continuously authenticating identities and user access.</p>\n<p>Consider adopting this approach into your remote work policies and protocols so your remote employees will be guided accordingly. One great example would be implementing multi-factor authentication for each login. This will add an extra layer of protection and verification for your users.</p>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-zero-trust-1\"\n        title=\"WP-zero-trust-1\"\n        src=\"/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-1.png\"\n        srcset=\"/static/1899738346b212558cc624397cb31d32/a6d36/WP-zero-trust-1.png 650w,\n/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-1.png 768w,\n/static/1899738346b212558cc624397cb31d32/81501/WP-zero-trust-1.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"3-perform-routine-review-of-accounts\" style=\"position:relative;\"><a href=\"#3-perform-routine-review-of-accounts\" aria-label=\"3 perform routine review of accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Perform routine review of accounts</h2>\n<p>A common practice among businesses is encouraging their employees to update and change their passwords and account details periodically. This way, your database remains updated. Likewise, frequent password changes can minimize potential risks of password breaches.</p>\n<p>With that, it only follows that you perform a routine review of all the accounts you manage in your identity management system. This is where you constantly authenticate and validate the identities of your users and monitor the security of your database. Consider <a href=\"https://www.loginradius.com/blog/engineering/guest-post/user-authentication-in-python/\">implementing user authentication in a Python application</a> to help cover all bases during the process.</p>\n<p>You should also watch out for orphan accounts in your system. Whenever a user moves to a different company, you need to make sure that their accounts are properly off-boarded from your network. Orphaned accounts are often goldmines for hackers where they can gather credentials and identities to breach and attack your business. Hence, you must remove all orphaned accounts from your system.</p>\n<h2 id=\"4-centralize-data-and-identities\" style=\"position:relative;\"><a href=\"#4-centralize-data-and-identities\" aria-label=\"4 centralize data and identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Centralize data and identities</h2>\n<p>Create a robust identity management system by centralizing the data you collect from your users. Having data silos can make it harder to keep track of all the credentials and information about your remote workers. As a result, this makes your system more vulnerable to data leaks and breaches. By creating a single location for user profiles, you can secure and monitor user authentication and access.</p>\n<p>Proper data management often requires two things—a reliable software or system to store the data in and an expert or group of experts to maintain the database. This makes Management Information Systems (MIS) one of the <a rel=\"nofollow\" href=\"https://www.guide2research.com/research/highest-paying-college-majors\">highest paying majors</a> nowadays as more businesses focus on strengthening their IT infrastructures and security. With their background and expertise, they ensure that your databases are secured and well-maintained.</p>\n<h2 id=\"5-consider-single-sign-on-authentication\" style=\"position:relative;\"><a href=\"#5-consider-single-sign-on-authentication\" aria-label=\"5 consider single sign on authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Consider single sign-on authentication</h2>\n<p>For businesses that require their remote employees to use several applications at once, you need to be aware of the various hazards it can bring. For one, your remote employees need to remember the details of all their accounts such as passwords, email addresses, and more. This can be frustrating for others and might even lead to some security issues in the process. It can result in some forgetting their own credentials. Worse, others might end up writing or typing it down, leaving their account details vulnerable.</p>\n<p>Allow your workers to <a href=\"https://www.loginradius.com/blog/identity/bring-your-own-identity/\">bring their own identity</a> in various employee applications through single sign-on (SSO) authentication. Through SSO, your remote employees can access any of your web properties, mobile apps, and third-party systems with a single identity, streamlining their logins each time they go to work.</p>\n<h2 id=\"6-go-passwordless\" style=\"position:relative;\"><a href=\"#6-go-passwordless\" aria-label=\"6 go passwordless permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Go passwordless</h2>\n<p>Forgetting passwords is a common issue for many users. This is especially true nowadays since almost everyone juggles several accounts all at once—both for personal and work-related reasons. Worse, <a rel=\"nofollow\" href=\"https://www.statista.com/statistics/1147830/common-password-habits-adults-country/\">around 32% of users</a> still manually enter their passwords for every account they have. This can pose potential security risks for your remote employees and your business if left ignored.</p>\n<p>Consider going passwordless with your employees’ logins for various business applications. Instead, opt to add a magic link feature to your mobile apps or email accounts, making it easier and more secure for users to sign in. You will simply send the link through your users’ respective email. By clicking on it, they will directly be logged in to their accounts. This process is almost like when you receive a one-time-password (OTP), but this time, you won’t have to enter any code or pin to get into your account. This helps prevent password-based attacks on your remote employees’ accounts.</p>\n<h2 id=\"7-integrate-with-other-solutions\" style=\"position:relative;\"><a href=\"#7-integrate-with-other-solutions\" aria-label=\"7 integrate with other solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Integrate with other solutions</h2>\n<p>One of the common remote access security best practices  among businesses is integration. By connecting your identity management system to your other business solutions, you can easily sync your data across all your applications. This includes your remote workers details and login credentials.</p>\n<p>A great example is <a href=\"https://www.loginradius.com/\">LoginRadius</a>. You can integrate it with any software that has an API. This streamlines real-time data flow and dismantles data silos within your systems. You can configure and monitor your integrations through their turnkey connections from their admin console.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>As your business migrates to a virtual workplace, you must learn how to maintain security when employees work remotely. Leaving them defenseless is also tantamount to making your organization vulnerable to potential risks. Protect your business by leveraging identity management.</p>\n<p>Through identity management, you reduce password issues and enhance security for your remote teams. It streamlines the process of logging in, authenticating, and authorizing access to your organization’s data and resources. To find out more about the benefits of identity management, <a href=\"https://www.loginradius.com/contact-sales2/\">contact our team</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/loginradius-free-Consultation.png\"\n        srcset=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/a6d36/loginradius-free-Consultation.png 650w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/loginradius-free-Consultation.png 768w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/63ff0/loginradius-free-Consultation.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 04, 2021","updated_date":null,"description":"Learn about the best practices to ensure cybersecurity for remote workers using identity management","title":"7 Best Practices for Securing Your Remote Workforce with Identity Management","tags":["zero trust security","identity management","cybersecurity","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0e4e26e05893d198f6adb18502ad7ea1/14b42/remote-workforce.jpg","srcSet":"/static/0e4e26e05893d198f6adb18502ad7ea1/f836f/remote-workforce.jpg 200w,\n/static/0e4e26e05893d198f6adb18502ad7ea1/2244e/remote-workforce.jpg 400w,\n/static/0e4e26e05893d198f6adb18502ad7ea1/14b42/remote-workforce.jpg 800w,\n/static/0e4e26e05893d198f6adb18502ad7ea1/47498/remote-workforce.jpg 1200w,\n/static/0e4e26e05893d198f6adb18502ad7ea1/0e329/remote-workforce.jpg 1600w,\n/static/0e4e26e05893d198f6adb18502ad7ea1/c128d/remote-workforce.jpg 5760w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"In the past couple of years, the internet has become one of the indispensable parts of our lives, and we can’t imagine a day without it.  As…","fields":{"slug":"/identity/what-is-identity-security/"},"html":"<p>In the past couple of years, the internet has become one of the indispensable parts of our lives, and we can’t imagine a day without it. </p>\n<p>As of October 2023, the <a href=\"https://www.statista.com/statistics/617136/digital-population-worldwide/#:~:text=Worldwide%20digital%20population%202023&#x26;text=As%20of%20October%202023%2C%20there,population%2C%20were%20social%20media%20users.\">global internet user count reached 5.3 billion</a>, encompassing 65.7 percent of the world's population.</p>\n<p>However, this doesn’t mean that everyone who’s surfing the internet is secure and can’t be on the radar of cybercriminals. </p>\n<p>Thousands of individuals compromise their identities every day because of a weak line of defense and poor authentication mechanism at the service providers’ end. </p>\n<p>Moreover, the COVID-19 pandemic has also increased as the internet became the second home for every individual while everyone was locked inside their homes. </p>\n<p>As per global stats, the <a href=\"https://www.statista.com/statistics/1175657/increase-identity-theft-coronavirus-outbreak/\">total number of identity thefts has increased</a> substantially amid the global pandemic and is expected to inflate further. </p>\n<p>So what does it portray? </p>\n<p>Do we need a stringent mechanism to secure user identities as the conventional systems cannot handle massive amounts of user signups and logins?</p>\n<p>Yes, identity security undeniably needs the hour to secure all identities within a network (whether employees or consumers). </p>\n<p>Let’s understand what identity security is and why it’s crucial for businesses, especially in 2024 and beyond.</p>\n<h2 id=\"what-is-identity-security\" style=\"position:relative;\"><a href=\"#what-is-identity-security\" aria-label=\"what is identity security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity Security</h2>\n<p>Identity security can be defined as a comprehensive way to secure digital identities within a network in the most basic sense. </p>\n<p>Any identity- whether an employee, third-party vendor, consumer, or IT admin can be privileged in specific ways that can lead to a security breach causing losses worth millions of dollars for an organization. </p>\n<p>Adding multiple layers of security through robust authentication and authorization can help mitigate the risk of identity theft. </p>\n<p>Since the outbreak of COVID-19 encouraged remote working ecosystems that aren’t as secure as traditional working environments, there’s an immediate need for an identity security solution for businesses adopting these remote working scenarios. </p>\n<h2 id=\"why-do-you-need-identity-security\" style=\"position:relative;\"><a href=\"#why-do-you-need-identity-security\" aria-label=\"why do you need identity security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Do You Need Identity Security</h2>\n<p>In the past couple of years, businesses are compromising consumer identities that lead to financial losses and tarnished reputations. </p>\n<p>Even the most robust security system can’t ensure identity security without stringent authentication and authorization mechanisms in place. </p>\n<p>Apart from this, the sudden paradigm shift towards online platforms has also increased the number of signups and registrations on diverse platforms leading to an increased risk of data breaches since most users aren’t aware of online security best practices.</p>\n<p>Also, specific privacy and data security compliances like the GDPR and CCPA requires organizations storing consumer information to adhere to their regulations to ensure maximum safety to consumers while their data is being collected, stored, and managed. </p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-future-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-future-dig-id\"\n        title=\"WP-future-dig-id\"\n        src=\"/static/905087c8e93a56396d43f84c7f3bd9ce/e5715/WP-future-dig-id.png\"\n        srcset=\"/static/905087c8e93a56396d43f84c7f3bd9ce/a6d36/WP-future-dig-id.png 650w,\n/static/905087c8e93a56396d43f84c7f3bd9ce/e5715/WP-future-dig-id.png 768w,\n/static/905087c8e93a56396d43f84c7f3bd9ce/81501/WP-future-dig-id.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Hence there’s an immediate need to deploy a reliable <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">consumer identity and access management solution</a> (CIAM) that can offer identity security without hampering user experience.  </p>\n<p>Since we’ve learned the importance of identity security, now just glance at what benefits an enterprise gets with a CIAM solution in place. </p>\n<h3 id=\"1-multi-factor-authentication-mfa-and-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#1-multi-factor-authentication-mfa-and-risk-based-authentication-rba\" aria-label=\"1 multi factor authentication mfa and risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Multi-Factor Authentication (MFA) and Risk-Based Authentication (RBA)</h3>\n<p>Multi-factor authentication is one of the essential aspects when it comes to consumer identity security best practices. </p>\n<p>Adding multiple layers of authentication through a reliable CIAM helps prevent a network breach and eventually decreases any chance of identity misuse. </p>\n<p>Moreover, LoginRadius CIAM offers adaptive authentication through its RBA that helps protect consumer identity and sensitive business information, especially in high-risk situations. </p>\n<p>The LoginRadius RBA kicks in whenever a suspicious login attempt is detected and automatically adds another authentication layer to protect consumer identity and network. </p>\n<p>The best thing about RBA is that it gets automatically activated if it detects something fishy based on the number of unsuccessful attempts, geographical location, or other similar situations. Else, the user can normally sign in, which preserves a great user experience. </p>\n<h3 id=\"2-protecting-consumer-accounts\" style=\"position:relative;\"><a href=\"#2-protecting-consumer-accounts\" aria-label=\"2 protecting consumer accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Protecting Consumer Accounts</h3>\n<p>With a cutting-edge CIAM like LoginRadius, businesses can ensure the highest level of security when it comes to protecting their consumers’ accounts against different types of security threats. </p>\n<p>Enterprises can ensure that passwords are harder to crack with rigorous password policies and LoginRadius Multi-Factor Authentication and can leverage hashing and encryption to protect account credentials and data in transit and at rest.</p>\n<p>Also, our modern cloud infrastructure is protected to the highest industry standards. LoginRadius maintains all major security compliances for our application and data storage, including the <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">GDPR and CCPA</a>. </p>\n<h3 id=\"3-streamlined-customer-experience\" style=\"position:relative;\"><a href=\"#3-streamlined-customer-experience\" aria-label=\"3 streamlined customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Streamlined Customer Experience</h3>\n<p>A streamlined customer experience delivered by an organization reflects that it’s up-to-date and concerned about providing the most accessible login possible.</p>\n<p>By providing a smooth login experience for your applications and services, you encourage customers to try out more of your digital offerings. The result is a customer who is more embedded in your digital ecosystem without extra effort.</p>\n<p>For instance, <a href=\"https://www.loginradius.com/single-sign-on/\">implementing a single sign-on</a> through a customer identity and access management system like LoginRadius means a customer only needs one account for all of your digital touchpoints. Whether your customers are signing in from a browser or a mobile device, they’ll benefit from not having to sign in repeatedly. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Protecting consumers’ identity should be the top priority of enterprises collecting user information.</p>\n<p>However, creating a perfect harmony between identity security and delivering a flawless user experience requires a reliable CIAM in place. </p>\n<p>A robust cloud-based CIAM solution like <a href=\"https://www.loginradius.com/contact-sales2/\">LoginRadius</a> can be a game-changer, especially in a world where data breaches are pretty frequent, leading to losses worth millions of dollars.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 03, 2021","updated_date":null,"description":"Thousands of individuals compromise their identities every day because of weak defense and poor authentication at the service providers’ end. Businesses need a robust identity management solution to navigate their digital transformation journey without compromising user identities and sensitive business information.","title":"What is Identity Security?","tags":["digital identity management","ciam solution","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/b78963f3b4bd3abc9bc7054e32da4998/14b42/purpose-identity-security-2021-cover.jpg","srcSet":"/static/b78963f3b4bd3abc9bc7054e32da4998/f836f/purpose-identity-security-2021-cover.jpg 200w,\n/static/b78963f3b4bd3abc9bc7054e32da4998/2244e/purpose-identity-security-2021-cover.jpg 400w,\n/static/b78963f3b4bd3abc9bc7054e32da4998/14b42/purpose-identity-security-2021-cover.jpg 800w,\n/static/b78963f3b4bd3abc9bc7054e32da4998/16310/purpose-identity-security-2021-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Personalized marketing is a promotional strategy tailored to the individual at the precise moment they require it, and there's…","fields":{"slug":"/growth/how-to-make-personalized-marketing-effective-with-consumer-identity/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Personalized marketing is a promotional strategy tailored to the individual at the precise moment they require it, and there's no other communication like it. The question is, how will you fulfill that promise? You may utilize tools to acquire and aggregate information about your clients' preferences. Read on to find out what these tools are and how they benefit your business.</p>\n<h2 id=\"what-is-consumer-identity-and-access-management-ciam\" style=\"position:relative;\"><a href=\"#what-is-consumer-identity-and-access-management-ciam\" aria-label=\"what is consumer identity and access management ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Consumer Identity and Access Management (CIAM)?</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Customer identity and access management</a> (CIAM) is a digital identity management software solution for businesses that combines login verification with customer data storage. CIAM aims to improve the customer's sign-up and login experience while securely managing customer identities.</p>\n<p>Consumer identity management through a CIAM offers the luxury of a centralized customer database that links all other apps and services to provide a secure and seamless customer experience. </p>\n<p>CIAM solutions typically include features such as customer registration, authentication, authorization, and profile management. They allow customers to create and manage their own accounts, and provide a unified view of customer data across different channels and devices. </p>\n<p>CIAM solutions also typically offer self-service capabilities for customers, such as password resets and profile updates.</p>\n<h2 id=\"grow-your-business-with-ciam\" style=\"position:relative;\"><a href=\"#grow-your-business-with-ciam\" aria-label=\"grow your business with ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Grow Your Business with CIAM</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 97.26562500000001%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"personalized-marketing-experience\"\n        title=\"personalized-marketing-experience\"\n        src=\"/static/1ec4ee654eb37abd9af75af48ecfeca3/01e7c/personalized-marketing-experience.png\"\n        srcset=\"/static/1ec4ee654eb37abd9af75af48ecfeca3/01e7c/personalized-marketing-experience.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Providing consumers with digital services is a delicate balancing act. You must provide an exceptional client experience while also establishing trust in the security of your services. If you get one of these things incorrect, the consequences can be devastating.</p>\n<p>CIAM (Consumer Identity and Access Management) allows you to collect and maintain customer IDs to support digital efforts securely. You can gain a better understanding of the whole customer relationship, improve processes, and provide a consistent and unified consumer experience.</p>\n<p>CIAM is a subset of Identity and Access Management (IAM) that combines login and authorization into customer-facing apps. CIAM is responsible for three key tasks:</p>\n<ul>\n<li>Enhances the user login service for consumers and provides security services by lowering the danger of unauthorized parties (a prevalent difficulty in the consumer area because of password reuse.)</li>\n<li>Provides consumers, companies, and corporate customers with personalized and unique experiences.</li>\n<li>Provides a scalable system with the ability to accommodate hundreds of millions of users.</li>\n</ul>\n<h2 id=\"iam-vs-ciam\" style=\"position:relative;\"><a href=\"#iam-vs-ciam\" aria-label=\"iam vs ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IAM vs. CIAM</h2>\n<p>IAM is considered the basis that guarantees that the appropriate people, systems, and objects have access to the correct assets at the right times and for the correct purposes. Employee access to privacy compliance was secured using conventional identity and access management (IAM). Cloud apps are secured within the stateful network.</p>\n<p>When you have to integrate individuals from outside the organization, conventional IAM begins to show flaws. Such personalized marketing systems were not designed for a firm where the bulk of contacts are made from outside the organization and are often beyond the IT team's authority.</p>\n<p>The finest CIAM software allows you to manage data protection depending on user characteristics, ensuring that authorized clients have accessibility to what they need and that others aren't allowed to go where they aren't. Structurally, the finest CIAM solutions are designed to work with a wide range of services and devices, are readily scalable, grow to millions of users, fulfill performance SLAs reliably, and satisfy industry standards.</p>\n<h2 id=\"key-benefits-of-ciam\" style=\"position:relative;\"><a href=\"#key-benefits-of-ciam\" aria-label=\"key benefits of ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Benefits of CIAM</h2>\n<p>Customer identity management is a critical security precaution for organizations of all sizes. Violation costs may add up rapidly, and they can have a significant impact on the bottom line. According to <a rel=\"nofollow\" href=\"https://www.ibm.com/security/data-breach\">IBM Security</a>, 80 percent of hacked businesses have claimed that customer PII was exposed during the breach in privacy compliance, with a cost of $150 per client on average.</p>\n<p>CIAM solutions are simple to connect with platforms that handle typical customer functions, including account self-management, bill payment, order tracking, data protection, and refunds, lowering the dangers of bad password security.</p>\n<p>The key benefits include:</p>\n<ul>\n<li>Identity and Access Management: Advancement in technology and their exposure to various apps and systems are securely managed by IAM solutions. They look after individuals as well as other types of identities like the software (apps or programs) and hardware (such as IoT devices).</li>\n<li>Customer data protection (MFA and <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">Adaptive Authentication</a>): Consumers are infamous for repeating passwords across various online sites. Advanced CIAM solutions use adaptive multi-factor authentication (MFA), which considers aspects such as position, the hour of the day, and gadgets to safeguard passwords. It promotes even greater <a href=\"https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/\">password security</a> by requiring more verification for high-risk password resets.</li>\n<li>Digital consumer interactions that are seamless and trustworthy: Many businesses have numerous online apps and interfaces, with its identification database, making it necessary for users to verify multiple times when moving between them. During the login procedure, this adds to the friction. You can create a more seamless customer experience by connecting all of your platforms with a single CIAM solution: There is a single point of entry for all applications.</li>\n<li>Users migrate quickly without disrupting their experience: <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">CIAM solution</a> should integrate with your current system to allow you to transfer your clients fast and without disrupting their interaction.</li>\n<li>Flexible APIs for customization: When it comes to safeguarding access to information, developers strive to provide a seamless client experience. APIs provide developers with the freedom to define authentication requirements at any point in the planning process.</li>\n<li>Support for several channels: The smartest solutions provide a variety of entrance points throughout all devices, making it as simple as possible for clients to get the tools they need to operate their company.</li>\n</ul>\n<h2 id=\"how-to-choose-the-best-ciam-platform\" style=\"position:relative;\"><a href=\"#how-to-choose-the-best-ciam-platform\" aria-label=\"how to choose the best ciam platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Choose the Best CIAM Platform?</h2>\n<p>Many companies are turning to third-party CIAM suppliers to supply the customer identity management services they require as the range of Consumer Identity and Access Management use cases grows. The appropriate <a href=\"https://www.loginradius.com/blog/identity/perfect-ciam-platform/\">CIAM platform</a> for your company will be determined by its specific business needs. However, it's a good idea to search for a CIAM supplier that offers based hosting so you can be sure you have not just the CIAM structure but also the CIAM expertise and assets you require.</p>\n<p>With <a href=\"https://www.loginradius.com/\">LoginRadius</a>, your business is assured of a seamless customer experience. Personalize the experience of every customer that visits your page with the tools offered by us. Give your customers a delightful experience each time they visit your page with a custom login process while complying with data protection regulations.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>A consumer identity and access management solution provide a comprehensive view of customer data, enabling organizations to create personalized and relevant experiences for their customers. </p>\n<p>By using a robust CIAM solution, organizations can build trust and loyalty with their customers, which is essential in today's digital age. CIAM solutions also ensure compliance with privacy regulations, protecting both the organization and the customer. </p>\n<p>In a nutshell, CIAM enables organizations to deliver an exceptional and secure personalized experience that meets the needs of their customers, ultimately leading to increased customer satisfaction and brand loyalty.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 30, 2021","updated_date":null,"description":"Personalized marketing is a promotional strategy tailored to the individual at the precise moment they require it, and there's no other communication like it. The question is, how will you fulfill that promise? You may utilize tools to acquire and aggregate information about your clients' preferences. Read on to find out what these tools are and how they benefit your business.","title":"Personalize Your Marketing With The Help Of A CIAM Platform","tags":["ciam solution","data security","cx","authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f41d499fb2ad973a46485ce20da19b19/14b42/personalized-marketing.jpg","srcSet":"/static/f41d499fb2ad973a46485ce20da19b19/f836f/personalized-marketing.jpg 200w,\n/static/f41d499fb2ad973a46485ce20da19b19/2244e/personalized-marketing.jpg 400w,\n/static/f41d499fb2ad973a46485ce20da19b19/14b42/personalized-marketing.jpg 800w,\n/static/f41d499fb2ad973a46485ce20da19b19/9842e/personalized-marketing.jpg 900w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":414,"currentPage":70,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}