{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/83","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"With cloud computing evolving leaps and bounds, enterprises are exploring new horizons to streamline processes and scale business growth…","fields":{"slug":"/identity/cloud-governance-business/"},"html":"<p>With cloud computing evolving leaps and bounds, enterprises are exploring new horizons to streamline processes and scale business growth.</p>\n<p>Since many businesses are inching towards cloud services, it’s becoming quite challenging for them to provide a governance model that not only provides visibility of every cloud service but eventually offers appropriate access with proper security.</p>\n<p>It would be great for businesses to learn about the fact that migrating from on-premises to cloud isn’t a piece of cake and requires an adequate governance model in place.</p>\n<p>You might be thinking about what governance model is and why your business requires it implemented within the organization.</p>\n<p>Well, just like on-premise IT infrastructure, companies relying on the cloud must have control over which apps or software can be accessed within the organization and by which department.</p>\n<p>In the cloud, the same can be implemented in a couple of seconds. To handle the overall efficiency and costs, businesses must have a certain set of rules.</p>\n<p>Let’s learn what cloud governance is and reasons to rely on cloud governance solutions for streamlined processes.</p>\n<h2 id=\"what-is-cloud-governance\" style=\"position:relative;\"><a href=\"#what-is-cloud-governance\" aria-label=\"what is cloud governance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Cloud Governance</h2>\n<p>Cloud governance could be defined as the set of rules and protocols that <a href=\"https://www.loginradius.com/blog/identity/2020/12/data-security-best-practices/\">enhance data security</a> and helps to manage risks to ensure smooth functioning in a cloud environment.</p>\n<p>With cloud governance in place, organizations can ensure that all the systems interactions along with access are precisely measured and managed without hampering the overall security.</p>\n<p>There are endless complexities whenever a business migrates from on-premise to cloud, which impacts the architecture as well.</p>\n<p>Cloud governance streamlines access for users with rules that simplify establishment, verification, and <a href=\"https://www.loginradius.com/blog/identity/2021/03/privacy-compliance/\">reinforces policy compliance</a>.   </p>\n<p>Here are the reasons why your business needs cloud governance:</p>\n<p><strong>1. Easy management of cloud resources.</strong></p>\n<p>One of the biggest advantages of cloud governance is the delivery of precise access control coupled with cost management without breaking the first line of defense.</p>\n<p>A strong governance strategy allows enterprises to organize multiple accounts and provide access as per their requirement and designation. This not only strengthens data security but also lends a hand in organizing and maintaining resource allocation on the cloud.</p>\n<p><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Future-proof-your-security\"\n        title=\"Future-proof-your-security\"\n        src=\"/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png\"\n        srcset=\"/static/a164480ea3177cb0422ee6104202f8b3/a6d36/Future-proof-your-security.png 650w,\n/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png 768w,\n/static/a164480ea3177cb0422ee6104202f8b3/63ff0/Future-proof-your-security.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>2. Cloud governance minimizes compliance risk.</strong></p>\n<p>It doesn’t matter which industry vertical you serve, you need to conduct regular security and compliance audits and assessments. Cloud governance can help you in preparing a long list of compliances that are under security frameworks.</p>\n<p>Most businesses aren’t aware of data and security compliances, which is perhaps the reason they have to pay hefty fines whenever there are any legal consequences.</p>\n<p>It’s always a great decision to audit the compliances and implement the required compliances that can ensure data and privacy security for your clients and employees accessing data over the cloud.</p>\n<p><strong>3. Cloud governance reduces costs.</strong></p>\n<p>Gone are the days when you had to deploy a team that can manually track accounts, compliance, and costs. You can now leverage automation to control access, policy, and the overall budget for your specified projects.</p>\n<p>Apart from this, the governance solutions can provide enforcement actions that can further allow you to do the follow-ups whenever you receive an alert. This prevents non-compliant activities and saves time and effort as well.</p>\n<p><strong>4. Cloud governance improves security.</strong></p>\n<p>As an organization moves to the cloud, certain risks linked to data storage, maintenance, and retrieval arise. Here’s where cloud governance comes into play.</p>\n<p>Enterprises can be sure enough that their data is securely managed and stored in the cloud with certain protocols in place. This reduces the chances of employees and consumers inching towards shadow IT to get the job done as they would already have a solution for every issue.</p>\n<p>Organizations that are consistently worried regarding the concept of shadow IT and its consequences for their company can leverage cloud governance to avoid any similar issues.</p>\n<p><strong>5. Cloud governance regulates and monitors data access.</strong></p>\n<p>Another great aspect associated with cloud governance is that enterprises can regulate and monitor data access in real-time. This means if there’s unauthorized access to data stored over the cloud, the same would be reported to the admin in real-time.</p>\n<p>This enhances the overall data security and the admin can keep an eye on insignificant data access requests even within the organizational network.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Cloud governance should be the top-most priority for businesses leveraging <a href=\"https://www.loginradius.com/blog/identity/2021/02/strategies-secure-cloud-operations/\">cloud infrastructure</a> in today’s era as the data regulations are getting stringent day-by-day.</p>\n<p>The aforementioned aspects depict the role of cloud governance and how it lays the foundation of security and data access within an organization.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 07, 2021","updated_date":null,"description":"Security management platforms are designated systems that work towards providing network security to an enterprise for the storage of data that they have collected. This process involves security and compliance as well.","title":"5 Reasons Why Cloud Governance Matters For Your Business","tags":["cloud governance","compliance","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/2f5ee86519d1f7d59eeab6f238dba479/14b42/cloud-governance-business-cover.jpg","srcSet":"/static/2f5ee86519d1f7d59eeab6f238dba479/f836f/cloud-governance-business-cover.jpg 200w,\n/static/2f5ee86519d1f7d59eeab6f238dba479/2244e/cloud-governance-business-cover.jpg 400w,\n/static/2f5ee86519d1f7d59eeab6f238dba479/14b42/cloud-governance-business-cover.jpg 800w,\n/static/2f5ee86519d1f7d59eeab6f238dba479/16310/cloud-governance-business-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Did you know adding social login to your website can drastically enhance engagement and bump-up registrations? If you’re a business with an…","fields":{"slug":"/identity/social-authentication/"},"html":"<p>Did you know adding social login to your website can drastically enhance engagement and bump-up registrations?</p>\n<p>If you’re a business with an online platform that has a significant amount of traffic but unable to generate a good amount of leads, you probably need to rework your website’s authentication process.</p>\n<p>Yes, nobody wishes to squander their precious time when it comes to registrations on a website. Or we can say, no one wants to juggle separate passwords and ids for different platforms.</p>\n<p>Social login enables users to use existing login credentials from a social networking platform including Facebook, Google, Twitter, and more enabling simplified logins and registrations.</p>\n<p>Let’s learn how LoginRadius’ social authentication helps to scale business growth and how to implement social login.</p>\n<h2 id=\"why-social-login\" style=\"position:relative;\"><a href=\"#why-social-login\" aria-label=\"why social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Social Login?</h2>\n<p>While social login bypasses the conventional registration forms that eventually eat up a lot of time, it also builds credibility on an online service provider that is not asking for your details in a single go.</p>\n<p>Moreover, another hurdle for businesses seeking business growth through online platforms is the overall security of user data while the information is being collected, stored, and retrieved.</p>\n<p>One needs to follow the necessary compliances while collecting PII to ensure that the data is securely collected and managed.</p>\n<p>Apart from this, maintaining compliance with enhanced user experience is yet another uphill battle for businesses, especially when all it takes is a couple of seconds to decide whether you have a lead or an increase in the bounce rate of the site.</p>\n<p>Here’s the place where you need a smart and efficient social login in place.</p>\n<p>LoginRadius’ social authentication not only offers compliance to international privacy and data security regulations but eventually provides a smooth login experience.</p>\n<p>Users can quickly sign up for a platform in just a couple of seconds through LoginRadius’ social authentication solution.</p>\n<h2 id=\"why-loginradius-social-login\" style=\"position:relative;\"><a href=\"#why-loginradius-social-login\" aria-label=\"why loginradius social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why LoginRadius Social Login?</h2>\n<p>LoginRadius is the leading <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">consumer identity and access management (CIAM) </a>solution provider that has woven a trust among global clients ranging from startups to Fortune 500 enterprises.</p>\n<p>Our social authentication solution is helping diverse businesses securely manage millions of identities along and offering quick sign-ups without hampering user experience.</p>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABcUlEQVQY01WRO08CURCFiQUsu8AiipEsIYTnCgiKuKysCy5vfEYbFY1RS42SmFgJNjbGP2JsTIyFUQsLKm0sbUz8KcfZBUkszp2bzJ1vzsw1WSPz0MWSOFGFTcyDi6p0z4Ol+JfXxYRyYONFjMrrGEmWYE2UwYgFMGGll6doMmBU6J7UMCwq4IJZ2EMy3KkSPJkG+PjCoMBK0ZaswKdtI1beBCttgEnWyIwCpt/UAFqoc1hZgbq2h0xtC46wDDYgwUZwPqY76L1xkSthtgFPuoqx6SqETI1Uxzhp4FA/9AIhXUGUoIFsA65oDs7IHAElA/g3siXUcypIi/Bml+CVl+FMaDAHc/+B+r4cUQUWXxpmbwpMrAhmQgPnn6GRC8ZeTZ4pHHdu8PX9g/unN9w+POPu8QXdj0+8dt/B98EDIC+SCwKy+qc0z8DVD2CPl8hhnrqrGPJLyK7u4+jiGjutDponbTRP2zg8v8Ju69JoaiHWLw3/wWxRywZmAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social-login-wp\"\n        title=\"social-login-wp\"\n        src=\"/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-wp.png\"\n        srcset=\"/static/bf408b3bda215542fe05da49cb06b853/a6d36/social-login-wp.png 650w,\n/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-wp.png 768w,\n/static/bf408b3bda215542fe05da49cb06b853/63ff0/social-login-wp.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Let’s learn why LoginRadius is the one-stop-solution for your online platform:</p>\n<p><strong>1. Endless Connection Options - One Unified Social API</strong></p>\n<p>With LoginRadius, businesses can enjoy the benefits of social login and experience seamless connectivity with our unified social API.</p>\n<p>Our social authentication solution flawlessly combines the APIs of over 40 social networks that create a unified social API fully equipped to handle all the specific features of these platforms.</p>\n<p>This not only saves the time and efforts of the developers while they learn each network’s API but ultimately delivers a smooth implementation experience.</p>\n<p><strong>2. Maintenance - Free Solution</strong></p>\n<p>Since every social media platform keeps on rolling updates in their APIs, LoginRadius ensures every API is up-to-date.</p>\n<p>This enhances security and ensures that our clients and their consumers need not worry regarding any issues.</p>\n<p>LoginRadius’ social authentication is completely maintenance-free.</p>\n<p><strong>3. More than Just Login - A Wealth of First-Party Consumer Data</strong></p>\n<p>Enhance your marketing reach with complete access to your consumers’ social profile data that also includes verified email addresses, their interests, contacts, and much more.</p>\n<p>With LoginRadius’ <a href=\"https://www.loginradius.com/blog/identity/2021/02/social-login-infographic/\">social login</a>, you get endless marketing opportunities through which you can convert your visitors into buyers by leveraging real-time data with behavior analysis.</p>\n<p>Moreover, the data is collected from the user after their consent and you can have access to their contacts, addresses, interests, likes, and much more.</p>\n<p>Here’s the list of social profile data points that you can access through LoginRadius’ advanced social login platform.  </p>\n<p><strong>4. Easy to Manage Admin Console</strong></p>\n<p>LoginRadius not only offers the finest user experience to your clients while they sign-up but eventually delivers rich experience to the site owners through an intuitive admin console.</p>\n<p>With LoginRadius Admin Console, you get a single dashboard for social login, data gathering, and other social permissions. You can quickly set configurations through the dashboard and make changes including, but not limited to:</p>\n<p>· Add/remove social ID providers</p>\n<p>· Configure social ID</p>\n<p>· Choose which social data to gather from social networks</p>\n<p>· Quickly enable profile access and permissions</p>\n<p>· Set token expiration for each social id</p>\n<p><strong>5.Native Mobile Support and Responsive Apps</strong>   </p>\n<p>LoginRadius works harmoniously with mobile platforms and integrates natively. The smart login solution quickly detects consumer’s mobile app and authenticates without the need for any social credentials.</p>\n<p>This enables users to quickly sign-up for your application without the hassle of entering credentials for their social profiles.  </p>\n<p><strong>Final Thoughts</strong></p>\n<p>While social login inches towards the verge of becoming an industry standard for <a href=\"https://www.loginradius.com/blog/identity/2020/12/login-security/\">secure and quick login</a>, businesses need to understand its true potential in improving business growth.</p>\n<p>LoginRadius’ social authentication, driven by cutting-edge technology and backed by the highest level of security ensures clients get a seamless user experience that further improves conversion rate.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 07, 2021","updated_date":null,"description":"Social login enables users to use existing login credentials from a social networking platform including Facebook, Google, Twitter, and more enabling simplified logins and registrations. Let’s learn how LoginRadius simplifies social authentication and improves the overall user experience.","title":"Implementing Effective Social Authentication Solution with LoginRadius","tags":["social authentication","social login","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/63597f5ae5a331ddd6f0bdcc93b52fa6/14b42/social-authentication-cover.jpg","srcSet":"/static/63597f5ae5a331ddd6f0bdcc93b52fa6/f836f/social-authentication-cover.jpg 200w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/2244e/social-authentication-cover.jpg 400w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/14b42/social-authentication-cover.jpg 800w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/16310/social-authentication-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"With the search engine algorithm of Google getting stringent to enhance page experience, duplicate content can be a massive disaster for a…","fields":{"slug":"/growth/duplicate-content-and-seo/"},"html":"<p>With the search engine algorithm of <a href=\"https://developers.google.com/search/blog/2020/11/timing-for-page-experience\">Google getting stringent to enhance page experience</a>, duplicate content can be a massive disaster for a website.</p>\n<p>Most of us aren’t aware of the consequences of publishing duplicate content, which is perhaps why we ignore this critical aspect.</p>\n<p>But how it affects our <a href=\"https://www.loginradius.com/blog/growth/how-to-drive-in-the-highest-quality-leads-in-2021-with-content-and-seo/\">SEO ranking</a>? Well, Google finds it difficult to analyze which content is more relevant to a query if similar content is available on more than one website on the internet.</p>\n<p>Moreover, the overall ranking of the website in Google search is also affected if the content isn’t relevant to the audience and is available on more than one source.</p>\n<p>Let’s have a quick look at some of the aspects associated with duplicate content and how to fix such issues.</p>\n<h2 id=\"how-duplicate-content-impacts-site-owners\" style=\"position:relative;\"><a href=\"#how-duplicate-content-impacts-site-owners\" aria-label=\"how duplicate content impacts site owners permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Duplicate Content Impacts Site Owners</h2>\n<p>Every business seeks substantial growth by leveraging best-in-class <strong><a href=\"https://www.loginradius.com/blog/fuel/2021/03/How-to-Drive-in-the-Highest-Quality-Leads-in-2021-with-Content-and-SEO/\">content marketing</a></strong> and website optimization tactics that also build a brand reputation.</p>\n<p>But if the content on a website is duplicated, the owner may face traffic issues and dwindling website rankings.<p>\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 38.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAIABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAAUD/8QAFQEBAQAAAAAAAAAAAAAAAAAAAQL/2gAMAwEAAhADEAAAAaGAzIFH/8QAGBAAAwEBAAAAAAAAAAAAAAAAAAECEyL/2gAIAQEAAQUC0SNSp6//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAEDAQE/AT//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAECAQE/AT//xAAaEAACAwEBAAAAAAAAAAAAAAAAAQIRMRJx/9oACAEBAAY/AudkioxV+Go//8QAGRABAAMBAQAAAAAAAAAAAAAAAQARMSHR/9oACAEBAAE/IRqRD0yWqoWnqNaH/9oADAMBAAIAAwAAABCMD//EABURAQEAAAAAAAAAAAAAAAAAABAR/9oACAEDAQE/EKf/xAAVEQEBAAAAAAAAAAAAAAAAAAAQEf/aAAgBAgEBPxCH/8QAGxABAAICAwAAAAAAAAAAAAAAAREhAGExQYH/2gAIAQEAAT8QpIeAEHDLV4CT49jayD3Jhatg0az/2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Content-Writing-Skills\"\n        title=\"Content-Writing-Skills\"\n        src=\"/static/01043ca92be538ba45e1283343ab92db/212bf/content-writing-skills.jpg\"\n        srcset=\"/static/01043ca92be538ba45e1283343ab92db/6aca1/content-writing-skills.jpg 650w,\n/static/01043ca92be538ba45e1283343ab92db/212bf/content-writing-skills.jpg 768w,\n/static/01043ca92be538ba45e1283343ab92db/efc8b/content-writing-skills.jpg 1240w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Since search engines precisely crawl content on every website and won’t show multiple versions of content that is already published on different websites, there’s a huge chance that the duplicate one wouldn’t be listed in the search results.</p>\n<p>Apart from this, many businesses aren’t intentionally adding duplicate content to their website. In fact, they’re not even aware of the fact that their website contains duplicate content.</p>\n<p>This is because many websites, for instance, <a href=\"https://www.loginradius.com/industry-retail-and-ecommerce/\">e-Commerce</a> websites that are selling similar products, may contain common content. Search engines aren’t able to recognize which one is the most relevant link.</p>\n<p>The same goes for businesses offering similar services and they may or may not be aware of duplicate content published on their website.</p>\n<p>Now, this thing would surely affect the overall search visibility.</p>\n<h2 id=\"technical-issues-leading-to-duplicate-content\" style=\"position:relative;\"><a href=\"#technical-issues-leading-to-duplicate-content\" aria-label=\"technical issues leading to duplicate content permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Technical Issues Leading to Duplicate Content</h2>\n<p>Several technical issues may lead to duplicate content, or we can say that multiple URLs pointing to a single content source.</p>\n<p>Many websites aren’t aware that their website’s different URLs are referring to a single page, which can further affect search engine crawling, and search engines like Google would consider it two separate links with similar content.</p>\n<p>Furthermore, another technical glitch is the www vs. non-www duplicate content. This thing usually gets unnoticed as both the versions of a website’s page are accessible with or without www in the URL.</p>\n<p>Businesses need to quickly analyze their website and figure out the actual cause that is restricting the website to rank in the top search result pages of Google.</p>\n<h2 id=\"best-practices-to-avoid-duplicate-content-on-your-website\" style=\"position:relative;\"><a href=\"#best-practices-to-avoid-duplicate-content-on-your-website\" aria-label=\"best practices to avoid duplicate content on your website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices to Avoid Duplicate Content on Your Website</h2>\n<p>Here are few effective ways to ensure your website contains any duplicate content pages, especially due to some technical glitches. <p></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 55.69230769230769%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Avoid-Duplicate-Content\"\n        title=\"Avoid-Duplicate-Content\"\n        src=\"/static/5815b6ae71ff07af424c9c0308878ebc/212bf/duplicate-content.jpg\"\n        srcset=\"/static/5815b6ae71ff07af424c9c0308878ebc/6aca1/duplicate-content.jpg 650w,\n/static/5815b6ae71ff07af424c9c0308878ebc/212bf/duplicate-content.jpg 768w,\n/static/5815b6ae71ff07af424c9c0308878ebc/51568/duplicate-content.jpg 882w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"1-check-your-websites-indexed-pages\" style=\"position:relative;\"><a href=\"#1-check-your-websites-indexed-pages\" aria-label=\"1 check your websites indexed pages permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Check your website’s indexed pages.</h3>\n<p>One of the best ways to hunt for duplicate content is to check the total number of indexed pages of your website.</p>\n<p>You can check the same by searching it in the Google search bar. Add your website name in this way: site: XYZ(dot)com in the Google search bar.</p>\n<p>Now in the Google Search Console, you can find your indexed pages. You must carefully check the number of pages in the console and ensure you created the same number of pages manually.</p>\n<p>If the number of indexed pages is greater than what you created, there are multiple pages with duplicate content.</p>\n<h3 id=\"2-correct-redirection\" style=\"position:relative;\"><a href=\"#2-correct-redirection\" aria-label=\"2 correct redirection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Correct redirection.</h3>\n<p>Another issue that can cause issues like duplicate ranking is incorrect redirection. In this scenario, the www version of your webpage isn’t redirecting to the non-www version or vice-versa.</p>\n<p>This can be a result of switching your website from SSL and haven’t redirected your website to the new secure (HTTPS) URL.</p>\n<p>Make sure all versions of your URL should redirect to a single place.</p>\n<h3 id=\"3-using-third-party-seo-tools\" style=\"position:relative;\"><a href=\"#3-using-third-party-seo-tools\" aria-label=\"3 using third party seo tools permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Using third-party SEO tools</h3>\n<p>Finding duplicate content across your website can be challenging and exhausting at the same time. It’s a great idea to leverage third-party tools that can quickly help you find duplicate content across your website.</p>\n<p>Once you’re able to trace them, it’s time to either delete them or just redirect them to the source page.</p>\n<p>This way, you can ensure that Google crawls only a single page with specific content, which further improves SEO rankings.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Duplicate content is an issue that every business is facing in direct or indirect ways. It’s something that businesses must consistently keep an eye on.</p>\n<p>Besides the fact that duplicate content leads to traffic and ranking issues, some severe scenarios may even lead to legal consequences.</p>\n<p>It’s advised to consider auditing your website frequently to shun any chance of availability of duplicate content or pages.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/book-a-demo-Consultation.png\"\n        srcset=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/a6d36/book-a-demo-Consultation.png 650w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/book-a-demo-Consultation.png 768w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/63ff0/book-a-demo-Consultation.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 06, 2021","updated_date":null,"description":"Dealing with duplicate content is a huge challenge for businesses seeking substantial growth through internet marketing practices. Learn about the aspects associated with duplicate content that depict the reasons behind it and how a business can overcome this lingering issue.","title":"Duplicate Content and SEO: What’s the Big Deal","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/84c92fa2e5406b58d41bf620b373ce4e/14b42/duplicate-content-and-seo.jpg","srcSet":"/static/84c92fa2e5406b58d41bf620b373ce4e/f836f/duplicate-content-and-seo.jpg 200w,\n/static/84c92fa2e5406b58d41bf620b373ce4e/2244e/duplicate-content-and-seo.jpg 400w,\n/static/84c92fa2e5406b58d41bf620b373ce4e/14b42/duplicate-content-and-seo.jpg 800w,\n/static/84c92fa2e5406b58d41bf620b373ce4e/47498/duplicate-content-and-seo.jpg 1200w,\n/static/84c92fa2e5406b58d41bf620b373ce4e/0e329/duplicate-content-and-seo.jpg 1600w,\n/static/84c92fa2e5406b58d41bf620b373ce4e/d8255/duplicate-content-and-seo.jpg 1920w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Deependra Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"Do you know that WordPress powers more than 41% of the web? Also, are you aware that 75% of people never go past the first page on Google…","fields":{"slug":"/growth/top-5-seo-tools-for-auditing-wordpress-website/"},"html":"<p>Do you know that <a href=\"https://wordpress.org/about/features/#:~:text=WordPress%20powers%20more%20than%2041,applications%2C%20are%20built%20with%20WordPress.\">WordPress powers more than 41% of the web</a>? Also, are you aware that <a href=\"https://blog.hubspot.com/blog/tabid/6307/bid/14416/100-Awesome-Marketing-Stats-Charts-Graphs-Data.aspx\">75% of people never go past the first page on Google</a>?</p>\n<p>What do these two statistics tell you?</p>\n<p>Well, they show that by just having a <strong><a href=\"https://wordpress.org/plugins/loginradius-for-wordpress/\">WordPress (WP)</a></strong> website, you cannot be sure that people will click on it and consume content. You need to be aware of the parameters that search engines use to rank websites.</p>\n<p>But the challenge is that search engines don't reveal how their algorithm works.</p>\n<p>Fortunately, website optimization tools and techniques help rank your website at the top of the page and allow you to drive more <strong><a href=\"https://www.loginradius.com/blog/fuel/2021/02/attract-consumers-to-your-website/\">website traffic</a></strong> and consequently increase conversions.</p>\n<p>SEO tools provide a detailed report on how your website performs on search engines like Google and the steps you can take to increase its rank.</p>\n<p>Here are the top 5 SEO tools you can use to audit your WordPress website and improve its rank on Google and other search engines.</p>\n<h2 id=\"1-google-search-console\" style=\"position:relative;\"><a href=\"#1-google-search-console\" aria-label=\"1 google search console permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Google Search Console</h2>\n<p>The best way to understand how Google, the largest search engine globally, sees your website is to go straight to the source. Google Search Console, formerly known as Webmaster Tools, allows you to monitor, maintain and troubleshoot your website. It is undoubtedly the best way to optimize your website as it helps to identify security problems, duplicate metadata, and the number of pages indexed.</p>\n<h3 id=\"some-of-its-features-are-as-follows\" style=\"position:relative;\"><a href=\"#some-of-its-features-are-as-follows\" aria-label=\"some of its features are as follows permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Some of its features are as follows:</h3>\n<ul>\n<li>You can submit the sitemaps of your WordPress website for crawling.</li>\n<li>You can speed up your WordPress SEO optimization by resolving website indexing issues.</li>\n<li>You can accelerate WordPress search engine optimization by checking the page speed through Google's PageSpeed insights.</li>\n<li>You can also monitor how the website is performing on mobile phones.</li>\n<li>You can improve WordPress SEO optimization by identifying broken links, URLs with poor SEO performance, and the keywords and queries your website ranks on.</li>\n</ul>\n<p>The best part is that it provides a user-friendly interface and is free to use.</p>\n<h2 id=\"2-semrush\" style=\"position:relative;\"><a href=\"#2-semrush\" aria-label=\"2 semrush permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. SEMRush</h2>\n<p>SEMRush is another highly recognized WordPress SEO optimization tool that helps identify your search engine rank and provides insights about improving it. You will also get a comprehensive understanding of your competitor's paid and organic searches, display advertising, and link-building strategies.</p>\n<p>Some of the benefits of SEMRush are listed below:</p>\n<ul>\n<li>Learn how your Cost Per Click (CPC) campaigns are performing.</li>\n<li>You can accelerate your WordPress SEO optimization by conducting SEO audits periodically to know the strength of your website.</li>\n<li>SEMRush's Domain vs. Domain feature lets you draw deep insights by comparing your website with your competitors’.</li>\n<li>SEMRush is an SEO-friendly WP optimization tool as it allows searching and comparing keywords and domains that you wish to rank.</li>\n<li>The On-Page SEO checker tool helps you monitor your website's ranking and gives suggestions on improving it.</li>\n</ul>\n<h2 id=\"3-yoast-seo\" style=\"position:relative;\"><a href=\"#3-yoast-seo\" aria-label=\"3 yoast seo permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Yoast SEO</h2>\n<p>Yoast SEO is one of the best WP SEO plugins that can help you get fantastic search results for your website. You will get everything in one package, from keyword optimization and internal linking suggestions to content insights and improving the readability of your posts and pages.</p>\n<p>Let's dig deep to understand the benefits of this excellent SEO tool:</p>\n<ul>\n<li>It lets you <strong><a href=\"https://www.loginradius.com/blog/growth/how-to-drive-in-the-highest-quality-leads-in-2021-with-content-and-seo/\">optimize content</a></strong> for synonyms, keywords, related keywords, and key phrases.</li>\n<li>It accelerates your WordPress SEO optimization by suggesting relevant internal links by analyzing your text.</li>\n<li>You can preview your website by looking at it through a Google user's eyes. You can see how a page will appear on the mobile phone and across social media platforms.</li>\n<li>You can take complete control of breadcrumbs. Yoast SEO will help you set a primary category for your post and determine the taxonomy for each page on your WordPress website.</li>\n<li>The Yoast SEO for WooCommerce will allow you to upgrade your social media cards, optimize your XML sitemap, configure metadata for your products such as brand, color, manufacturer, GSTIN, and much more.</li>\n</ul>\n<h2 id=\"4-moz\" style=\"position:relative;\"><a href=\"#4-moz\" aria-label=\"4 moz permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. MOZ</h2>\n<p>MOZ is gradually emerging as one of the most popular WordPress search engine optimization tools for rank tracking, site auditing, keyword research, and backlink analysis. The best part is that MOZ offers free training on how to operate SEO tools of all levels.</p>\n<p>Here are a few features of this SEO-friendly WP optimization tool:</p>\n<ul>\n<li>Accelerate your WordPress optimization by viewing website performance metrics using Mozbar, which is a user-friendly toolbar.</li>\n<li>Post your queries on the active chat portal and get answers quickly and conveniently.</li>\n<li>Improve your WordPress search engine optimization using the site audit feature that identifies errors in your website.</li>\n<li>You can enhance the SEO of each page on your website by using the page optimization feature.</li>\n</ul>\n<h2 id=\"5-screaming-frog\" style=\"position:relative;\"><a href=\"#5-screaming-frog\" aria-label=\"5 screaming frog permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Screaming Frog</h2>\n<p>Experts suggest using the Screaming Frog SEO tool for website auditing as it quickly identifies missing tags, broken links, and duplicate content.</p>\n<p>Here are other features of this SEO-friendly WP optimization tool:</p>\n<ul>\n<li>Generate XML sitemaps for your WordPress website.</li>\n<li>Identify which pages are returning a 404 error and take corrective action quickly.</li>\n<li>Use Screaming Frog's SEO spider tool to gather insights about your website and competitors'.</li>\n<li>Improve your WordPress search engine optimization by detecting permanent and temporary redirect chains on your website.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>SEO tools help rank your website on the first page of Google and other search engines. They monitor and audit your website's content and optimize it. You also receive a detailed report of what is working and what needs a change to improve the website's rank further. SEO tools also analyze your competitors’ websites and derive valuable insights.</p>\n<p>It would be best if you begin by using free SEO tools available on the internet. If you notice any visible improvements on your website, you can purchase the paid version to get maximum benefits.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/book-a-demo-Consultation.png\"\n        srcset=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/a6d36/book-a-demo-Consultation.png 650w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/book-a-demo-Consultation.png 768w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/63ff0/book-a-demo-Consultation.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 06, 2021","updated_date":null,"description":"SEO tools help rank your website on the first page of Google and other search engines. They monitor and audit your website's content and optimize it. You also receive a detailed report of what is working and what needs a change to improve the website's rank further.","title":"Top 5 tools to Audit Wordpress Website","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/59098f9d1d7072e52f5196143753176e/14b42/top-5-wp-seo-tools.jpg","srcSet":"/static/59098f9d1d7072e52f5196143753176e/f836f/top-5-wp-seo-tools.jpg 200w,\n/static/59098f9d1d7072e52f5196143753176e/2244e/top-5-wp-seo-tools.jpg 400w,\n/static/59098f9d1d7072e52f5196143753176e/14b42/top-5-wp-seo-tools.jpg 800w,\n/static/59098f9d1d7072e52f5196143753176e/47498/top-5-wp-seo-tools.jpg 1200w,\n/static/59098f9d1d7072e52f5196143753176e/0e329/top-5-wp-seo-tools.jpg 1600w,\n/static/59098f9d1d7072e52f5196143753176e/39635/top-5-wp-seo-tools.jpg 1884w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Tanvi Soni","github":null,"avatar":null}}}},{"node":{"excerpt":"While logging on to your social media account or a bank account online, there are several credentials you tend to feed in before being able…","fields":{"slug":"/identity/passwordless-magic-links/"},"html":"<p>While logging on to your social media account or a bank account online, there are several credentials you tend to feed in before being able to access your account. The process is a tad bit lengthy, and there are even chances of you mismatching or forgetting the passwords for a particular account. But with the help of passwordless magic links, these issues are easily resolved.</p>\n<h2 id=\"what-is-a-passwordless-magic-link\" style=\"position:relative;\"><a href=\"#what-is-a-passwordless-magic-link\" aria-label=\"what is a passwordless magic link permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What is a Passwordless Magic Link?</strong></h2>\n<p>A <strong>passwordless magic link</strong> allows you to log in directly with the help of a link that is received through an email. This process is similar to when you receive a one-time-password (OTP) though you might have to physically enter the OTP once you are redirected to the page or application. In the case of passwordless magic links, all you have to do is click on the link sent through an email, allowing you to log in directly.</p>\n<h2 id=\"how-magic-links-work\" style=\"position:relative;\"><a href=\"#how-magic-links-work\" aria-label=\"how magic links work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Magic Links Work?</strong></h2>\n<p>Passwordless magic links follow three steps that enable the user a hassle-free login. The three steps are as follows.</p>\n<ul>\n<li>When a consumer is about to log in/ sign in, they go to the sign-in screen and enter their email address.</li>\n<li>If the email address entered is a registered type, they will receive the magic link through the email provided.</li>\n<li>To complete the sign-in process, they have to click on the link received through the entered email.</li>\n</ul>\n<p>Optionally, they might be sent a live link during registration, which can be made use of eventually for authentication. </p>\n<p>It is similar to the password reset flow process, where you receive a secret link that allows you to sidestep the password and create a new one. </p>\n<p>The app designers have to follow a process and take out the password and any other approach to resetting protocols. Doing so ensures that you receive a one-time-use <strong><a href=\"https://www.loginradius.com/passwordless-login/\">passwordless magic link</a></strong> at the time of your login.</p>\n<p>The app designers or developers can program the link depending on whether the link should be valid for a particular time or for as long as the session is valid. After clicking on the link, the consumer’s information is verified, and a cookie is set up; this ensures that they stay logged in for the entire process of the session.</p>\n<p>Even though passwordless magic links display hundreds of password resets, consumers need not remember the password to access the account. Magic links are a user-friendly feature that ensures an inviting user experience without any hardware requirement.</p>\n<h2 id=\"pros-and-cons-of-magic-links\" style=\"position:relative;\"><a href=\"#pros-and-cons-of-magic-links\" aria-label=\"pros and cons of magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pros and Cons of Magic Links</h2>\n<h3 id=\"pros-of-magic-links\" style=\"position:relative;\"><a href=\"#pros-of-magic-links\" aria-label=\"pros of magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pros of Magic Links</h3>\n<ol>\n<li><strong>Enhanced User Experience</strong>: Magic links offer a seamless login experience, reducing friction and enhancing user satisfaction.</li>\n<li><strong>Improved Security</strong>: Magic links mitigate password-related risks like breaches and phishing, providing added security without compromising convenience.</li>\n<li><strong>Simplified Onboarding</strong>: Magic links streamline the signup process by eliminating the need for users to create and remember passwords.</li>\n<li><strong>Convenient Access</strong>: Users can access their accounts with a single click, making login across devices effortless.</li>\n<li><strong>Flexible Implementation</strong>: Magic links can be used across various platforms, making them versatile for applications.</li>\n</ol>\n<h3 id=\"cons-of-magic-links\" style=\"position:relative;\"><a href=\"#cons-of-magic-links\" aria-label=\"cons of magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cons of Magic Links</h3>\n<ol>\n<li><strong>Dependency on Email</strong>: Magic links rely on email delivery, which can be problematic if users have limited access or if emails are delayed.</li>\n<li><strong>Potential for Email Compromise</strong>: Email account security becomes crucial as magic links are sent via email, posing a risk if the account is compromised.</li>\n<li><strong>Lack of Control Over Link Sharing</strong>: Administrators may struggle to monitor and control link sharing, raising concerns about unauthorized access.</li>\n<li><strong>Limited Offline Access</strong>: Magic links typically require an internet connection for verification, posing challenges in offline scenarios.</li>\n</ol>\n<h2 id=\"how-can-organizations-use-magic-links\" style=\"position:relative;\"><a href=\"#how-can-organizations-use-magic-links\" aria-label=\"how can organizations use magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Can Organizations Use Magic Links?</strong></h2>\n<p>By opting to add the magic link feature to your mobile apps or email accounts, you are likely trying to make your mobile app or site user-friendly, contributing to a strong security strategy. Here are some reasons for which you can opt passwordless magic links.</p>\n<ul>\n<li><strong>Ideal for infrequent login demands:</strong> Passwordless magic link is provided at the beginning of each user session, verifying the user through a single-use basis. This type of magic link login implementation is well suited with mobile apps or the login process of an email account that require single or infrequent authentication, enabling easy access.</li>\n<li><strong>Prevent password-based attacks:</strong> Data breaches, hacking, and phishing are ever increasing in today's times. There is a major loss of necessary credentials, and magic link login security ensures the safety of the same by warding off security risks implicating passwords.</li>\n</ul>\n<h2 id=\"benefits-of-using-magic-links\" style=\"position:relative;\"><a href=\"#benefits-of-using-magic-links\" aria-label=\"benefits of using magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Using Magic Links</h2>\n<p>There are plenty of benefits of using a passwordless magic link. They are as follows -</p>\n<ul>\n<li><strong>Easy authentication, deployment, and use:</strong> When the user clicks the magic link, though the flow is similar to that of password reset, <strong><a href=\"https://www.loginradius.com/blog/identity/2020/10/loginradius-launches-passwordless-login-with-magic-link-or-otp/\">magic link login implementation</a></strong> includes some minor changes in the code at no extra cost.</li>\n<li><strong>Seamless onboarding:</strong> Earlier, logging into applications used to be more tedious than the present times as you would get a message through email or SMS. Only when the user clicks the required redirecting option would they be able to log in. The most feasible is the magic link alternative, where you need to enter your email address, and by clicking the link, you would be able to register for the app.</li>\n<li><strong>Increase app adoption</strong>: Any user would prefer a trouble-free login process. For instance, as soon as the user clicks the magic link, the process is completed. Since magic link login implementation reduces the troubles faced during the login process, it is possible to get a loyal and returning fanbase.</li>\n</ul>\n<h2 id=\"what-are-the-challenges-of-using-magic-links\" style=\"position:relative;\"><a href=\"#what-are-the-challenges-of-using-magic-links\" aria-label=\"what are the challenges of using magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What are the Challenges of Using Magic Links?</strong></h2>\n<p>Though there are numerous benefits of using a passwordless magic link, there are some challenges that particularly come with security blind spots. Magic links may help secure the transfer of information, ensuring the valid identity of the user. But since the security is tied with the user's account, it is wise that the email account is protected with multi-factor authentication. </p>\n<p>Another challenge you might face with magic link apps is that the admins have no control over link sharing. Regardless of the user, admins are unable to keep track of the confidential or sensitive information shared with others. Apart from these challenges the major one is the increased cyber-attacks with nearly <a href=\"https://thepaypers.com/thought-leader-insights/goodbye-passwords-passwordless-authentication-is-here-to-stay--1245019\">7K global data breaches </a>in 2019 that risked about 15 billion user records.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABiElEQVQY00WQvUtCURjGb0F6/UjIQLTCgtJMSUW9XfTqra6llShEUdHH5pBN0eBQLUWELQX9BTU19AFBRC3lVotLi0QREdFSSYEtNTyde1I78HLec87z/t73OYzKGoQc6vYQNDYRWhIaWwh/9wLK73KwbQGoHRLquDj0nRJUdgmsrRsqiwC2pGHKsHpHN3TWADStPN1N3iiMngh0dhGsRSgB/dC6IjCHp2EPj4HlhqHsjBBggAJlHQXKSQs/CH5oEu7wKEzOHiha/dB5Yqh19FaAtDmZ2uDuQyM3hAbSVNch/juQgWWxNZiAEJ8h0Ck4xAQMXIxMMok6Vz+UslXiorqFRw1pZPQNwOQbhMEThZYAGTNXaUonVJCCo7NLvL69I397h/uHRzw9v6Dw8YngSJIWVDV3YX5lE7mbPPaOz7Gzf4LdgxNkr3M4PL2A3hmmrhi1DCRJ9ioHeRUK7/gqFvHz803PveOzYJq8VCNNpJBe38bc8gZSSxmkFjNYWN1CMr1G/rqHOvkFDEfeB1RtO+gAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-Product-Passwordless-Login-1024x310\"\n        title=\"DS-Product-Passwordless-Login-1024x310\"\n        src=\"/static/4a7ab097b9cc29def32540d76bfac344/e5715/DS-Product-Passwordless-Login-1024x310.png\"\n        srcset=\"/static/4a7ab097b9cc29def32540d76bfac344/a6d36/DS-Product-Passwordless-Login-1024x310.png 650w,\n/static/4a7ab097b9cc29def32540d76bfac344/e5715/DS-Product-Passwordless-Login-1024x310.png 768w,\n/static/4a7ab097b9cc29def32540d76bfac344/2bef9/DS-Product-Passwordless-Login-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"examples-of-when-magic-links-are-used\" style=\"position:relative;\"><a href=\"#examples-of-when-magic-links-are-used\" aria-label=\"examples of when magic links are used permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Examples of When Magic Links Are Used</h2>\n<ol>\n<li><strong>Mobile Applications</strong>: Productivity tools, social media, and banking apps offer magic link authentication for simplified login.</li>\n<li><strong>Email Services</strong>: Some email providers use magic links instead of passwords to enhance email account security.</li>\n<li><strong>Online Marketplaces</strong>: E-commerce platforms use magic links for user authentication during registration and login.</li>\n<li><strong>Enterprise Applications</strong>: Many organizations adopt magic links for internal systems to streamline access management and enhance security.</li>\n</ol>\n<h2 id=\"why-is-loginradius-passwordless-magic-link-is-preferred-over-others\" style=\"position:relative;\"><a href=\"#why-is-loginradius-passwordless-magic-link-is-preferred-over-others\" aria-label=\"why is loginradius passwordless magic link is preferred over others permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why is LoginRadius' Passwordless Magic Link is Preferred Over Others?</strong></h2>\n<p>LoginRadius's passwordless magic link enables the user a safe and secure transfer of information. It makes sure that the user's login credentials stay guarded against hacking, phishing, and other fraudulent practices. </p>\n<p>The intent behind the launch of the LoginRadius passwordless magic link is to reduce friction during the registration and login processes. Other business advantages include: </p>\n<ul>\n<li><strong>Consumer experience is streamlined</strong>: One-step registration and login reduce friction for consumers. Furthermore, consumers do not need to create or remember passwords to access their accounts.</li>\n<li><strong>Consumers are aware</strong>: This form of authentication is quickly becoming one of the most common trends among consumers. </li>\n<li><strong>Account security is increased</strong>: Since a magic link is created dynamically and sent to the recipient upon request, it removes the risk of password attacks.</li>\n<li><strong>Adaptive security is improved</strong>: As an adaptive protection measure for your consumers, you can pre-define the Magic Link expiry period and disable account access after the set period. </li>\n</ul>\n<p>Depending on your business requirements, LoginRadius also supports a variety of implementation and deployment methods.</p>\n<ul>\n<li>After completing all configurations, you can use the pre-designed Passwordless Login with Magic Link with LoginRadius' <strong>Identity Experience Framework</strong>.</li>\n<li>Using the LoginRadius <strong>JavaScript Libraries</strong>, you can create an embedded Passwordless Login with Magic Link.</li>\n<li>You can build on and change the code in the open-source <strong>web and mobile SDKs</strong> to meet your specific needs. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Magic links may not be one of the most reliable means of logging in, but it is undoubtedly a convenient means for <a href=\"https://www.loginradius.com/blog/identity/2021/04/maintaining-quality-data-security-practices/\">users to log in to their accounts</a>. In today’s fast-paced times, any sort of validation needs to be done with immense meticulousness, and to cater to this need; a passwordless magic link is the right solution. </p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1.  What is a magic link?</strong></p>\n<p>A magic link is a secure authentication method that allows users to log in by clicking on a unique link sent to their email, eliminating the need for passwords.</p>\n<p><strong>2. How does the magic link work?</strong></p>\n<p>Users enter their email, receive a link, and click to access their account, streamlining the login process and enhancing security.</p>\n<p><strong>3. Are magic links safe?</strong></p>\n<p>Yes, magic links enhance security by mitigating password-related risks like breaches and phishing, offering a secure authentication alternative.</p>\n<p><strong>4. How do you make a magic link?</strong></p>\n<p>Developers program the system to generate a one-time-use magic link upon user request, ensuring secure authentication without passwords.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 05, 2021","updated_date":null,"description":"By opting to add the magic link feature to your mobile apps or email accounts, you are likely trying to make your mobile app or site user-friendly, contributing to a strong security strategy. Here are some reasons for which you can opt passwordless magic links.","title":"The Future of Authentication is Passwordless With Magic links","tags":["passwordless login","authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/f0ccb193ae49ca1feb33a60d08d3810b/14b42/passwordless-magic-links-cover.jpg","srcSet":"/static/f0ccb193ae49ca1feb33a60d08d3810b/f836f/passwordless-magic-links-cover.jpg 200w,\n/static/f0ccb193ae49ca1feb33a60d08d3810b/2244e/passwordless-magic-links-cover.jpg 400w,\n/static/f0ccb193ae49ca1feb33a60d08d3810b/14b42/passwordless-magic-links-cover.jpg 800w,\n/static/f0ccb193ae49ca1feb33a60d08d3810b/16310/passwordless-magic-links-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"Recoil js is another state management library for React. Though we already have Redux. Mobx, Context, but here we got a new light entry in…","fields":{"slug":"/engineering/recoiling-the-react/"},"html":"<p><a href=\"https://recoiljs.org/\" title=\"Recoil js\">Recoil js</a> is another state management library for React.</p>\n<p>Though we already have Redux. Mobx, Context, but here we got a new light entry in the community.</p>\n<p>Why I am saying <code>light</code> you will figure it out at the end of this blog.</p>\n<h2 id=\"why-recoil\" style=\"position:relative;\"><a href=\"#why-recoil\" aria-label=\"why recoil permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Recoil</h2>\n<ul>\n<li>Firstly, it solves the global state management problems.</li>\n<li>Easy to learn; there are no new major principles n logic to learn.</li>\n<li>Quite Simple, it is similar like react.</li>\n<li>Though I like redux, but it will not take that much time to learn.</li>\n</ul>\n<h2 id=\"recoil--concepts\" style=\"position:relative;\"><a href=\"#recoil--concepts\" aria-label=\"recoil  concepts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Recoil  concepts</h2>\n<p>There are two major concepts:</p>\n<ol>\n<li><strong>Atoms</strong> </li>\n<li><strong>Selectors</strong></li>\n</ol>\n<p>Something new? Don't worry will understand this quickly.</p>\n<h3 id=\"atoms\" style=\"position:relative;\"><a href=\"#atoms\" aria-label=\"atoms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Atoms</h3>\n<p> This is similar to how we use the <code>useState</code> hook in react. If you are new to react hooks, checkout <a href=\"https://www.loginradius.com/blog/engineering/react-hooks-guide/\" title=\"react hooks guide\">react hooks guide</a>.</p>\n<p> e.g.:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"> const [age, setAge] = useState(0);</span></code></pre>\n<p><strong>age</strong> : this will be used for state variable declaration.\n<strong>setAge</strong> :this will be used for state variable updations.</p>\n<h4 id=\"1-lets-start-with-binding-root-app-with-recoil\" style=\"position:relative;\"><a href=\"#1-lets-start-with-binding-root-app-with-recoil\" aria-label=\"1 lets start with binding root app with recoil permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Let's start with binding root app with Recoil</h4>\n<p>Now you need to make a few alterations in your app's root level, like the below snippet.</p>\n<p><code>RecoilRoot</code> will behave like a global context provider that will share the global state to your app tree.</p>\n<p>Now update your older code snippet.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">ReactDOM.render( &lt;AppPage /&gt;, document.getElementById(&quot;root&quot;))</span></code></pre>\n<p>to </p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">import { RecoilRoot } from &quot;recoil&quot;;</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">ReactDOM.render( </span>\n<span class=\"grvsc-line\"> &lt;RecoilRoot&gt;</span>\n<span class=\"grvsc-line\">    &lt;AppPage /&gt;</span>\n<span class=\"grvsc-line\"> &lt;/RecoilRoot&gt;, document.getElementById(&quot;root&quot;))</span></code></pre>\n<h4 id=\"2-set-the-atom\" style=\"position:relative;\"><a href=\"#2-set-the-atom\" aria-label=\"2 set the atom permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Set the Atom</h4>\n<p>Recoil calls this part as <strong>atom</strong>, where we set the global key, value.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">import { atom } from &quot;recoil&quot;;</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">const age = atom({</span>\n<span class=\"grvsc-line\">  key: &quot;age&quot;, </span>\n<span class=\"grvsc-line\">  default: 0  // default global value for age key</span>\n<span class=\"grvsc-line\">});</span></code></pre>\n<p>Now this atom will be accessible throughout the app.</p>\n<h4 id=\"3-use-the-atom\" style=\"position:relative;\"><a href=\"#3-use-the-atom\" aria-label=\"3 use the atom permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. use the atom</h4>\n<p>Now update your older code snippet.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"> const [age, setAge] = useState(0);</span></code></pre>\n<p>to </p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">import { useRecoilState } from &#39;recoil&#39;</span>\n<span class=\"grvsc-line\">const [ageState, setAge] = useRecoilState(age);</span></code></pre>\n<p>For a Larger view, here is <strong>Full Code</strong></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">import { atom,useRecoilState } from &#39;recoil&#39;</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">const age = atom({</span>\n<span class=\"grvsc-line\">  key: &quot;age&quot;, </span>\n<span class=\"grvsc-line\">  default: 0  // default global value for age key</span>\n<span class=\"grvsc-line\">});</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">export const AgeCalculator = () =&gt; {</span>\n<span class=\"grvsc-line\">const [ageState, setAge] = useRecoilState(age);</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<p>Quite easy. Isn't it?\nNow let's move to another part <strong>selectors</strong>.</p>\n<h3 id=\"selectors\" style=\"position:relative;\"><a href=\"#selectors\" aria-label=\"selectors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Selectors</h3>\n<p>This is similar to how Redux manages states.</p>\n<p>if a value can be derived/computed from the state, then we can skip re initialize of an another separate state key, for that use selectors.</p>\n<h4 id=\"1-set-the-selectors\" style=\"position:relative;\"><a href=\"#1-set-the-selectors\" aria-label=\"1 set the selectors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. set the selectors</h4>\n<p>In the below example, we are getting <code>isChild</code> value from <code>age</code> key, then we can directly use <strong>selector</strong> instead of adding a new key or <strong>atom</strong>.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"7\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">import {selector} from &#39;recoil&#39;</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">const isChild = selector({</span>\n<span class=\"grvsc-line\">  key: &quot;childage&quot;,</span>\n<span class=\"grvsc-line\">  get: ({ get }) =&gt; {</span>\n<span class=\"grvsc-line\">    const state = get(age);</span>\n<span class=\"grvsc-line\">    return state &lt; 10 ;</span>\n<span class=\"grvsc-line\">  }</span>\n<span class=\"grvsc-line\">});</span></code></pre>\n<h4 id=\"2-use-the-selectors\" style=\"position:relative;\"><a href=\"#2-use-the-selectors\" aria-label=\"2 use the selectors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. use the selectors</h4>\n<p>Now will use the above-mentioned selector.</p>\n<p>below code snippet use <code>age</code> value to <code>isChild</code>.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"8\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  const [ageState, setAge] = useRecoilState(age);</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">  const value = useRecoilValue(isChild);</span></code></pre>\n<p>For a larger view, here is <strong>Full Code</strong></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"9\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">import {selector, useRecoilState} from &#39;recoil&#39; </span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">const isChild = selector({</span>\n<span class=\"grvsc-line\">  key: &quot;childage&quot;,</span>\n<span class=\"grvsc-line\">  get: ({ get }) =&gt; {</span>\n<span class=\"grvsc-line\">    const state = get(age);</span>\n<span class=\"grvsc-line\">    return state &lt; 10 ;</span>\n<span class=\"grvsc-line\">  }</span>\n<span class=\"grvsc-line\">});</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">export const AgeCalculator = () =&gt; {</span>\n<span class=\"grvsc-line\">    const [ageState, setAge] = useRecoilState(age);</span>\n<span class=\"grvsc-line\">   const value = useRecoilValue(isChild);</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<p>That's all, Milord.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>I hope you got why I am saying this as <strong><code>light</code></strong>.</p>\n<p>Recoil is looking relatively easy, promising, and early-stage, but again this is the next generation, and it will take time to get the own space in the <a href=\"https://community.loginradius.com/\">community</a>.  </p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"April 30, 2021","updated_date":null,"description":"Recoil is an experimental state management library and It provides several capabilities that are difficult to achieve with React alone.In this article we learn about the recoil.js, and how it is managing state in react.","title":"What is recoil.js and how it is managing in react?","tags":["JavaScript","React","Recoil"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f37a15f3f8cda8461c5455bdd2895e0c/ee604/react.png","srcSet":"/static/f37a15f3f8cda8461c5455bdd2895e0c/69585/react.png 200w,\n/static/f37a15f3f8cda8461c5455bdd2895e0c/497c6/react.png 400w,\n/static/f37a15f3f8cda8461c5455bdd2895e0c/ee604/react.png 800w,\n/static/f37a15f3f8cda8461c5455bdd2895e0c/f3583/react.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Abhimanyu Singh Rathore","github":"abhir9","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":492,"currentPage":83,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}