{"componentChunkName":"component---src-pages-author-author-yaml-id-js","path":"/author/kundan-singh/","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"id":"125d8f1d-c6bb-5aaa-a2e3-c16e2700b975","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>With mobile threats evolving rapidly, securing access to personal and business data isn’t just important—it’s critical. Cybercriminals are constantly finding new ways to exploit vulnerabilities in mobile applications, putting users and businesses at risk. That’s why adopting advanced mobile authentication methods is no longer optional.</p>\n<p>This blog explores the importance of authentication in mobile security. It discusses the biggest threats to mobile users. It also compares traditional authentication methods with new solutions that improve mobile identity security.</p>\n<p>Plus, we’ll explore the future of authentication and how emerging trends are set to transform mobile security. </p>\n<h2 id=\"what-is-authentication-in-mobile-security\" style=\"position:relative;\"><a href=\"#what-is-authentication-in-mobile-security\" aria-label=\"what is authentication in mobile security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authentication in Mobile Security?</h2>\n<p>Mobile authentication ensures that users are who they claim to be, while authorization grants permissions based on their identity. Without proper security authentication methods, users risk exposing sensitive information to cyber threats.</p>\n<p>For example, a banking app uses mobile phone authentication methods to verify a user's identity before allowing fund transfers. If authentication is weak, unauthorized individuals can access accounts, leading to financial losses and data breaches. LoginRadius specializes in implementing secure authentication methods that mitigate such risks and ensure robust mobile identity security.</p>\n<h2 id=\"authentication-vs-authorization--whats-the-difference\" style=\"position:relative;\"><a href=\"#authentication-vs-authorization--whats-the-difference\" aria-label=\"authentication vs authorization  whats the difference permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication vs. Authorization- What’s the Difference?</h2>\n<ul>\n<li><strong>Authentication</strong> verifies the identity of a user. For instance, when you enter a password or use biometric authentication for mobile devices, you prove who you are as a user.</li>\n<li><strong>Authorization</strong> determines what an authenticated user is allowed to do. For example, a company employee might have access to email but not to its financial records. Authorization grants you the right access. </li>\n</ul>\n<p>A real-life example is social media logins: <a href=\"https://www.loginradius.com/platforms/authentication-and-registration\">authentication grants access,</a> while authorization determines whether users can edit profile information or manage an organization's page. Organizations must deploy secure authentication methods to prevent unauthorized access and ensure a seamless authentication process.</p>\n<h2 id=\"what-are-the-biggest-security-risks-for-mobile-authentication\" style=\"position:relative;\"><a href=\"#what-are-the-biggest-security-risks-for-mobile-authentication\" aria-label=\"what are the biggest security risks for mobile authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Biggest Security Risks for Mobile Authentication?</h2>\n<p>As mobile usage skyrockets, so do the threats targeting mobile authentication. Cybercriminals are constantly finding new ways to exploit vulnerabilities, making strong authentication measures essential for protecting sensitive data. </p>\n<p>Mobile applications face many security challenges today. These include deceptive phishing attacks and unsecured networks, and more, which are listed below :</p>\n<h3 id=\"malicious-apps\" style=\"position:relative;\"><a href=\"#malicious-apps\" aria-label=\"malicious apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Malicious Apps</h3>\n<p>Cybercriminals often create fake apps that mimic legitimate applications. Once installed, these apps steal user credentials and authentication codes. For example, a fraudulent banking app may capture login details and redirect funds without the user’s knowledge.</p>\n<h3 id=\"phishing-and-smishing\" style=\"position:relative;\"><a href=\"#phishing-and-smishing\" aria-label=\"phishing and smishing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Phishing and Smishing</h3>\n<p>Phishing emails and smishing (SMS phishing) trick users into revealing authentication codes and credentials. Attackers impersonate trusted entities, urging users to enter login details on fake websites, which leads to compromised accounts.</p>\n<h3 id=\"unsecured-networks\" style=\"position:relative;\"><a href=\"#unsecured-networks\" aria-label=\"unsecured networks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Unsecured Networks</h3>\n<p>Public Wi-Fi networks pose security risks, as attackers can intercept authentication in mobile application data. Without advanced authentication methods, unauthorized users can hijack sessions and gain access to sensitive data.</p>\n<p>**Did you know? **Microsoft security trend report suggests that more than 1,000 password attacks are carried on every second, with <a href=\"https://www.microsoft.com/en-us/security/blog/2023/01/26/2023-identity-security-trends-and-solutions-from-microsoft/\">99.9%</a>{:target=\"_blank\"}succeeding when there is a missing MFA. Don't risk it—secure your apps now with LoginRadius’ MFA!</p>\n<p>Download this E-book to learn how LoginRadius’ Adaptive Authentication shields your digital assets even in the highest-risk situations! </p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/adaptive-authentication-digital-apocalypse/\"><img src=\"/32e243dec97ed60f27f344847350c9e9/adaptive-authentication-an-absolute-necessity.webp\" alt=\"(Image showing why is adaptive authentication an absolute necessity for business free resource download from loginradius.)\"></a></p>\n<h2 id=\"what-are-common-mobile-phone-authentication-methods\" style=\"position:relative;\"><a href=\"#what-are-common-mobile-phone-authentication-methods\" aria-label=\"what are common mobile phone authentication methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are Common Mobile Phone Authentication Methods?</h2>\n<ul>\n<li><strong>Passwords and PINs</strong>: The most common authentication process, but vulnerable to brute-force attacks.</li>\n<li><strong>Security Questions</strong>: Often used as a secondary authentication process, but weak if answers can be easily guessed.</li>\n<li><strong>One-Time Passwords (OTPs)</strong>: Sent via SMS or email but susceptible to interception.</li>\n</ul>\n<p>While these methods provide basic mobile verification, they are no longer sufficient against modern cyber threats until they’re combined with a more robust authentication method through multi-factor authentication.</p>\n<h2 id=\"what-are-the-most-secure-authentication-methods-for-mobile\" style=\"position:relative;\"><a href=\"#what-are-the-most-secure-authentication-methods-for-mobile\" aria-label=\"what are the most secure authentication methods for mobile permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Most Secure Authentication Methods for Mobile?</h2>\n<p>To enhance mobile identity security, businesses are adopting advanced authentication methods. These methods offer higher security levels while improving user experience.</p>\n<h3 id=\"multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#multi-factor-authentication-mfa\" aria-label=\"multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication (MFA)</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">Multi-factor authentication</a> combines multiple authentications in mobile factors, such as:</p>\n<ul>\n<li><strong>Something you know</strong> (password, PIN)</li>\n<li><strong>Something you have</strong> (authentication codes from an app or hardware token)</li>\n<li><strong>Something you are</strong> (biometric authentication for mobile devices)</li>\n</ul>\n<p>For example, banking apps require a password (first factor) and an authentication code from a mobile authenticator app (second factor). This layered approach strengthens security.</p>\n<h3 id=\"biometric-authentication\" style=\"position:relative;\"><a href=\"#biometric-authentication\" aria-label=\"biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Authentication</h3>\n<p>Biometric authentication for mobile devices includes fingerprint scanning, facial recognition, and iris scanning. Apple’s Face ID and Android’s fingerprint authentication are prime examples of how biometric authentication enhances security while ensuring a seamless authentication process.</p>\n<h3 id=\"passkeys\" style=\"position:relative;\"><a href=\"#passkeys\" aria-label=\"passkeys permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passkeys</h3>\n<p>Passkey authentication leverages biometrics or hardware security keys to provide secure, password-free authentication. Passkeys are suitable for high-security applications such as banking, healthcare, and enterprise access management.</p>\n<p><img src=\"/da5ec45e9333841487449e9e63003af7/passkeys-authentication.webp\" alt=\"Passkey authentication settings enabled, showing options for progressive and local enrollment, relying party details, and a Face ID sign-in prompt for passwordless access.\"></p>\n<p>Go passwordless in just 5 minutes! <a href=\"https://www.loginradius.com/docs/authentication/passwordless/passkey-authentication/?q=passkeys\">Add LoginRadius Passkey Authentication</a> for seamless, secure logins. </p>\n<h3 id=\"risk-based-authentication\" style=\"position:relative;\"><a href=\"#risk-based-authentication\" aria-label=\"risk based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risk-based Authentication</h3>\n<p>Risk-based authentication, also known as adaptive authentication, is a security mechanism that dynamically assesses the risk level of a user's login attempt or transaction based on their historical behavior and contextual factors. </p>\n<p>Unlike static authentication methods, RBA adapts real-time security measures by analyzing parameters such as location, IP address, device, browser, and user behavior.</p>\n<p><img src=\"/6c7a2bcd583af6577ac2a77c5ae9ca77/risk-based-authentication.webp\" alt=\"Risk-based Authentication settings in LoginRadius dashboard showing enabled and disabled authentication factors, including City, Country, IP, and Browser. \"></p>\n<p>Want to add adaptive authentication to your apps? Get started with our developer documentation to quickly <a href=\"https://www.loginradius.com/docs/security/customer-security/risk-based-auth/\">Configure Adaptive Authentication </a>on your apps.  </p>\n<h2 id=\"what-are-some-emerging-trends-in-mobile-authentication\" style=\"position:relative;\"><a href=\"#what-are-some-emerging-trends-in-mobile-authentication\" aria-label=\"what are some emerging trends in mobile authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are Some Emerging Trends in Mobile Authentication?</h2>\n<p>As cyber threats evolve, mobile authentication continues to advance. Future trends include:</p>\n<ul>\n<li><strong>AI-Powered Authentication</strong>: AI will enhance authentication process efficiency by identifying fraudulent login attempts in real-time.</li>\n<li><strong>Decentralized Identity Systems</strong>: Blockchain-based authentication eliminates reliance on centralized databases, improving mobile identity security.</li>\n<li><strong>Passwordless Authentication</strong>: Biometric authentication and authentication codes will replace traditional passwords entirely, offering a seamless yet secure authentication experience.</li>\n<li><strong>Continuous Authentication</strong>: Systems will continuously analyze user behavior to detect unauthorized access attempts dynamically.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Ensuring mobile security requires adopting advanced authentication methods that balance security and usability. Whether through biometric authentication for mobile devices, multi-factor authentication, or AI-driven security authentication methods, organizations must stay ahead of cyber threats.</p>\n<p>Protect your apps with cutting-edge security by LoginRadius! <a href=\"https://www.loginradius.com/book-a-demo/\">Schedule a demo</a> today and experience seamless mobile identity protection.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<h4 id=\"q1-what-is-the-authentication-method-of-android\" style=\"position:relative;\"><a href=\"#q1-what-is-the-authentication-method-of-android\" aria-label=\"q1 what is the authentication method of android permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Q1: What is the authentication method of Android?</strong></h4>\n<p>A: <a href=\"https://www.loginradius.com/docs/deployment/sdk/mobile-sdk-libraries/android-library/\">Android supports various authentication methods</a>, including passwords, PINs, biometric authentication (fingerprint, face, iris), MFA, and passkeys for secure access.</p>\n<h4 id=\"q2-what-is-sim-authentication\" style=\"position:relative;\"><a href=\"#q2-what-is-sim-authentication\" aria-label=\"q2 what is sim authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Q2: What is SIM authentication?</strong></h4>\n<p>A: SIM authentication checks users through their SIM card’s IMSI and cryptographic keys. However, it can be attacked by SIM swapping.</p>\n<h4 id=\"q3-our-users-dont-have-mobile-devices-can-we-still-use-mfa\" style=\"position:relative;\"><a href=\"#q3-our-users-dont-have-mobile-devices-can-we-still-use-mfa\" aria-label=\"q3 our users dont have mobile devices can we still use mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Q3: Our users don't have mobile devices. Can we still use MFA?</strong></h4>\n<p>A: Yes! You can use hardware security keys, desktop authenticator apps, <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/multi-factor-authentication/email-authenticator/send-mfa-email-otp-by-mfa-token/\">email-based MFA</a>, or biometric authentication on desktops.</p>\n<h4 id=\"q4-is-2fa-through-sms-not-safe-what-should-i-use-instead\" style=\"position:relative;\"><a href=\"#q4-is-2fa-through-sms-not-safe-what-should-i-use-instead\" aria-label=\"q4 is 2fa through sms not safe what should i use instead permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Q4: Is 2FA through SMS not safe? What should I use instead?</strong></h4>\n<p>A: SMS 2FA is vulnerable to SIM swaps and interception—use authenticator apps, <a href=\"https://www.loginradius.com/docs/authentication/passwordless/passkey-authentication/\">passkeys</a>, or hardware security keys instead.</p>\n<h4 id=\"q5-what-is-advanced-mobile-security\" style=\"position:relative;\"><a href=\"#q5-what-is-advanced-mobile-security\" aria-label=\"q5 what is advanced mobile security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Q5: What is advanced mobile security?</strong></h4>\n<p>A: It includes biometrics, adaptive authentication, AI-driven threat detection, and encryption to protect mobile data from cyber threats.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Mobile Authentication: Everything You Need to Know","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"March 07, 2025","updated_date":null,"tags":["”Identity Management”","”User Authentication”","“CIAM Security”","“Authentication”"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/3091093f002cbf1ebbbc5c1390e90f1a/58556/mobile-authentication.webp","srcSet":"/static/3091093f002cbf1ebbbc5c1390e90f1a/61e93/mobile-authentication.webp 200w,\n/static/3091093f002cbf1ebbbc5c1390e90f1a/1f5c5/mobile-authentication.webp 400w,\n/static/3091093f002cbf1ebbbc5c1390e90f1a/58556/mobile-authentication.webp 800w,\n/static/3091093f002cbf1ebbbc5c1390e90f1a/99238/mobile-authentication.webp 1200w,\n/static/3091093f002cbf1ebbbc5c1390e90f1a/7c22d/mobile-authentication.webp 1600w,\n/static/3091093f002cbf1ebbbc5c1390e90f1a/3041e/mobile-authentication.webp 6000w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/mobile-authentication/"}}},{"node":{"id":"2590bd70-e86a-528e-b82b-844f26959d20","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>With increasing cyber threats, traditional authentication methods like passwords and one-time passwords (OTPs) are no longer sufficient. Push notification authentication, aka push authentication, provides a more secure and seamless authentication experience by leveraging mobile devices to verify user identities. </p>\n<p>This method enhances security while offering a frictionless user experience. In this blog, we'll explore what push notification authentication is, how it works, its advantages, and how you can integrate it into your applications.</p>\n<h2 id=\"what-is-push-notification-authentication\" style=\"position:relative;\"><a href=\"#what-is-push-notification-authentication\" aria-label=\"what is push notification authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Push Notification Authentication?</h2>\n<p>Push notification authentication is a method of verifying a user’s identity by sending a push notification to their registered mobile device. Instead of entering passwords or OTPs, users can see the details about the login attempt and simply approve or deny authentication requests with a single tap. </p>\n<p>This method combines device possession (something the user has) with user interaction (something the user does) to significantly enhance security.</p>\n<p>Push authentication is widely used in multi-factor authentication (MFA) solutions, adding an extra layer of protection against unauthorized access. It is commonly implemented by banking services, corporate security systems, and cloud-based applications to prevent fraudulent logins. It is also implemented by other industries as part of their <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">adaptive MFA</a> strategy. </p>\n<h2 id=\"how-does-push-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-push-authentication-work\" aria-label=\"how does push authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Push Authentication Work?</h2>\n<p>Push authentication follows a straightforward and user-friendly process:</p>\n<ol>\n<li><strong>User Initiates Login:</strong> The user attempts to log into an application or access a protected resource.</li>\n<li><strong>Server Sends a Push Message:</strong> The authentication server generates a push request and sends notifications to the user’s registered device.</li>\n<li><strong>User Reviews the Request:</strong> The push alert notification contains details such as login location, device information, and time.</li>\n<li><strong>User Approves or Denies:</strong> The user can approve the authentication request if it is legitimate or deny it if it appears suspicious.</li>\n<li><strong>Access is Granted or Denied:</strong> If approved, access is granted; if denied, the login attempt is blocked.</li>\n</ol>\n<p><img src=\"/9c5b35f5147dc97bac2a67f17c4ec6f8/how-push-authentication-work.webp\" alt=\"An example push notification authentication sent by LoginRadius is shown in the image.\"></p>\n<h2 id=\"what-are-the-advantages-and-challenges-of-push-authentication\" style=\"position:relative;\"><a href=\"#what-are-the-advantages-and-challenges-of-push-authentication\" aria-label=\"what are the advantages and challenges of push authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Advantages and Challenges of Push Authentication?</h2>\n<h3 id=\"advantages-of-push-notification-authentication\" style=\"position:relative;\"><a href=\"#advantages-of-push-notification-authentication\" aria-label=\"advantages of push notification authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Push Notification Authentication</h3>\n<ul>\n<li><strong>Enhanced Security:</strong> Since push authentication requires both device possession and user approval, it is more secure than passwords or OTPs.</li>\n<li><strong>Seamless User Experience:</strong> Users do not need to memorize passwords or enter codes manually, reducing friction during authentication.</li>\n<li><strong>Real-Time Alerts:</strong> Users receive immediate notifications of any login attempts, enabling them to take quick action against unauthorized access.</li>\n<li><strong>Phishing Resistance:</strong> Unlike traditional authentication methods, push authentication minimizes the risk of phishing attacks by eliminating the need to enter credentials.</li>\n<li><strong>Cost-Effective:</strong> Reduces reliance on SMS-based OTPs, lowering operational costs and improving authentication efficiency.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/push-notification-mfa\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"(An image showing downloadable data sheet named push notification mfa with free download button)\"\n        title=\"(An image showing downloadable data sheet named push notification mfa with free download button)\"\n        src=\"/static/63ebeb9ce62bb2ad63260f52e34c51d6/e5715/push-notification-mfa-free-download.png\"\n        srcset=\"/static/63ebeb9ce62bb2ad63260f52e34c51d6/a6d36/push-notification-mfa-free-download.png 650w,\n/static/63ebeb9ce62bb2ad63260f52e34c51d6/e5715/push-notification-mfa-free-download.png 768w,\n/static/63ebeb9ce62bb2ad63260f52e34c51d6/81501/push-notification-mfa-free-download.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"challenges-of-push-notification-authentication\" style=\"position:relative;\"><a href=\"#challenges-of-push-notification-authentication\" aria-label=\"challenges of push notification authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenges of Push Notification Authentication</h3>\n<ul>\n<li><strong>Dependence on Mobile Devices:</strong> If the user does not have immediate access to their registered device, then this authentication method can become difficult.</li>\n<li><strong>Internet Connectivity:</strong> Push notifications require an active internet connection to function, which may not always be available.</li>\n<li><strong>Device Compatibility:</strong> The authentication system must support various mobile operating systems and devices.</li>\n</ul>\n<h2 id=\"where-is-push-authentication-used\" style=\"position:relative;\"><a href=\"#where-is-push-authentication-used\" aria-label=\"where is push authentication used permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Where Is Push Authentication Used?</h2>\n<p>Push authentication is widely used across various industries, including:</p>\n<ul>\n<li><strong>Financial Services:</strong> Banks and financial institutions use push authentication to verify transactions and secure customer accounts.</li>\n<li><strong>Enterprise Security:</strong> Companies implement push authentication to protect corporate resources, employee logins, and sensitive data.</li>\n<li><strong>E-commerce:</strong> Online shopping platforms use push authentication to verify user logins and high-value transactions.</li>\n<li><strong>Healthcare:</strong> Healthcare providers use push notifications to secure access to electronic medical records (EMRs) and patient data.</li>\n<li><strong>Government Services:</strong> Public sector organizations implement push authentication for secure access to citizen services and portals.</li>\n</ul>\n<h2 id=\"how-to-add-push-notification-authentication-to-your-apps-with-loginradius\" style=\"position:relative;\"><a href=\"#how-to-add-push-notification-authentication-to-your-apps-with-loginradius\" aria-label=\"how to add push notification authentication to your apps with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Add Push Notification Authentication to Your Apps with LoginRadius?</h2>\n<p>Integrating push message notification authentication into your applications is seamless with LoginRadius. Our platform provides a robust and scalable solution to implement push authentication efficiently.</p>\n<p><img src=\"/3dce17b27ee76877c9e67c5966949715/console-push-notification.webp\" alt=\"LoginRadius dashboard showing push notification authentication setup for Multi-Factor Authentication (MFA) with options for LoginRadius Authenticator or custom integration.\"></p>\n<h3 id=\"steps-to-enable-push-authentication-with-loginradius\" style=\"position:relative;\"><a href=\"#steps-to-enable-push-authentication-with-loginradius\" aria-label=\"steps to enable push authentication with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Steps to Enable Push Authentication with LoginRadius:</h3>\n<ol>\n<li><strong>Sign Up for LoginRadius:</strong> <a href=\"https://accounts.loginradius.com/auth.aspx?return_url=https://console.loginradius.com/login&#x26;action=register\">Create an account on the LoginRadius platform </a>and access the Admin Console.</li>\n<li><strong>Enable Multi-Factor Authentication (MFA):</strong> Navigate to **“Security” **settings and choose and enable multi-factor authentication. </li>\n<li><strong>Choose Push Notification as an MFA Factor:</strong> Select <strong>“Push Notifications”</strong> as an MFA factor to integrate push authentication into your application.</li>\n<li><strong>Test and Deploy:</strong> Verify the setup by testing push notifications and deploy them into your production environment.</li>\n</ol>\n<p>For a detailed implementation guide, refer to our <strong><a href=\"https://www.loginradius.com/docs/security/customer-security/multi-factor-authentication/overview/\">developer documentation</a></strong>. </p>\n<h2 id=\"push-notifications-vs-other-mfa-factors\" style=\"position:relative;\"><a href=\"#push-notifications-vs-other-mfa-factors\" aria-label=\"push notifications vs other mfa factors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Push Notifications vs. Other MFA Factors</h2>\n<table>\n  <tr>\n   <td><strong>MFA Factor</strong>\n   </td>\n   <td><strong>Security Level</strong>\n   </td>\n   <td><strong>User Experience</strong>\n   </td>\n   <td><strong>Dependency</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>Push Notifications\n   </td>\n   <td>High\n   </td>\n   <td>Seamless\n   </td>\n   <td>Requires Mobile Device & Internet\n   </td>\n  </tr>\n  <tr>\n   <td>OTP via SMS/Email\n   </td>\n   <td>Medium\n   </td>\n   <td>Moderate\n   </td>\n   <td>Relies on Network Operators\n   </td>\n  </tr>\n  <tr>\n   <td>Biometric Authentication\n   </td>\n   <td>Very High\n   </td>\n   <td>Seamless\n   </td>\n   <td>Requires Biometric Hardware\n   </td>\n  </tr>\n  <tr>\n   <td>Hardware Security Keys\n   </td>\n   <td>Very High\n   </td>\n   <td>Moderate\n   </td>\n   <td>Physical Key Dependency\n   </td>\n  </tr>\n</table>\n<p>Push notifications provide a balance between security and user convenience, making them a preferred choice for modern authentication.</p>\n<h2 id=\"the-growing-need-for-push-authentication-in-cybersecurity\" style=\"position:relative;\"><a href=\"#the-growing-need-for-push-authentication-in-cybersecurity\" aria-label=\"the growing need for push authentication in cybersecurity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Growing Need For Push Authentication in Cybersecurity</h2>\n<p>With the rise in credential-based attacks and data breaches, organizations are increasingly adopting push authentication as a key security measure. Since push notifications require an active user response, they offer a higher level of assurance compared to traditional authentication methods. </p>\n<p>Additionally, organizations can integrate adaptive authentication mechanisms, such as analyzing device fingerprinting and login patterns, to further enhance security while keeping the user experience seamless.</p>\n<h2 id=\"future-trends-in-push-notification-authentication\" style=\"position:relative;\"><a href=\"#future-trends-in-push-notification-authentication\" aria-label=\"future trends in push notification authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Future Trends in Push Notification Authentication</h2>\n<p>As technology evolves, push notification authentication is expected to become even more sophisticated. Artificial Intelligence (AI) and machine learning (ML) will play a crucial role in detecting anomalies and preventing fraud. </p>\n<p>Future advancements may also integrate biometrics with push authentication, creating a multi-layered security approach that is nearly impossible to bypass. Furthermore, enterprises are looking to implement decentralized identity solutions, ensuring greater user privacy and security across digital ecosystems.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Push notification authentication is a powerful and secure method of user verification. It enhances security while providing a frictionless user experience. By integrating push authentication with LoginRadius, businesses can efficiently safeguard their applications against unauthorized access.</p>\n<p>Ready to implement push authentication? <a href=\"https://accounts.loginradius.com/auth.aspx?return_url=https://console.loginradius.com/login&#x26;action=register\">Book a free trial</a> today!</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<ol>\n<li><strong>What is an example of a push notification?</strong></li>\n</ol>\n<p>A push notification is an alert sent to a mobile device to approve authentication, such as \"Login attempt detected from New York. Approve or Deny?\"</p>\n<ol start=\"2\">\n<li><strong>Are push notifications encrypted?</strong></li>\n</ol>\n<p>Yes, push notifications are encrypted during transmission to ensure security and prevent unauthorized access.</p>\n<ol start=\"3\">\n<li><strong>Is push notification better than an OTP?</strong></li>\n</ol>\n<p>Yes, push notifications are more secure and user-friendly than OTPs, as they eliminate the risk of phishing and SIM-swapping attacks.</p>\n<ol start=\"4\">\n<li><strong>How do I enable push notifications?</strong></li>\n</ol>\n<p>To enable push notifications, Navigate to <a href=\"https://accounts.loginradius.com/auth.aspx?return_url=https://console.loginradius.com/login&#x26;action=register\">“Security” settings</a> in your LoginRadius console and choose and enable multi-factor authentication. Choose Push Notification as an MFA Factor: Select “Push Notifications” as an MFA factor to integrate push authentication into your application.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"What is Push Notification Authentication and How It Works?","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"March 05, 2025","updated_date":null,"tags":["Identity Management","User Authentication","CIAM Security","Authentication"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3605442176870748,"src":"/static/0f20e4acb3f64c738245f57e3bf7bcc3/58556/push-authentication.webp","srcSet":"/static/0f20e4acb3f64c738245f57e3bf7bcc3/61e93/push-authentication.webp 200w,\n/static/0f20e4acb3f64c738245f57e3bf7bcc3/1f5c5/push-authentication.webp 400w,\n/static/0f20e4acb3f64c738245f57e3bf7bcc3/58556/push-authentication.webp 800w,\n/static/0f20e4acb3f64c738245f57e3bf7bcc3/99238/push-authentication.webp 1200w,\n/static/0f20e4acb3f64c738245f57e3bf7bcc3/7c22d/push-authentication.webp 1600w,\n/static/0f20e4acb3f64c738245f57e3bf7bcc3/9fb1e/push-authentication.webp 4900w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/push-notification-authentication/"}}},{"node":{"id":"27ae7e37-6a03-5f64-b316-bdfeb7450c39","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Cybersecurity threats are evolving, making it crucial for businesses and individuals to strengthen authentication security. One of the most effective ways is through Multi-Factor Authentication (MFA). This security mechanism requires users to verify their identity using multiple authentication methods before accessing your app, an account, or a system.</p>\n<p>Let’s explore the types of Multi Factor Authentication and how MFA works with some examples and how to choose the right combination of authentication methods for your needs.</p>\n<h2 id=\"what-is-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-multi-factor-authentication\" aria-label=\"what is multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is Multi Factor Authentication?</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">Multi Factor Authentication (MFA)</a> is a security process that requires users to provide two or more authentication factor types to verify their identity. Unlike passwords alone, MFA adds extra security layers, making it much harder for hackers to gain unauthorized access.</p>\n<p>Common authentication factor types used in MFA include:</p>\n<ul>\n<li>Something you know (passwords, PINs, or security questions)</li>\n<li>Something you have (smartphones, security keys, or smart cards)</li>\n<li>Something you are (biometrics like fingerprints, facial recognition, or retina scans)</li>\n</ul>\n<p>By combining these factors, MFA strengthens authentication security and reduces the risks of credential theft and unauthorized access. Businesses rely on MFA to ensure compliance, mitigate risks, and enhance user trust.</p>\n<p>Today, multi factor auth options are widely implemented across industries to secure user accounts and sensitive data.</p>\n<h2 id=\"how-multi-factor-authentication-works\" style=\"position:relative;\"><a href=\"#how-multi-factor-authentication-works\" aria-label=\"how multi factor authentication works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Multi Factor Authentication Works</h2>\n<p>MFA works by requiring users to verify their identity through multiple steps. Here’s a typical authentication flow:</p>\n<ul>\n<li>The user enters their credentials (username and password) on a login page.</li>\n<li>MFA prompts an additional authentication step (e.g., a code sent to a mobile device, a biometric scan, or a security question).</li>\n<li>The user verifies their identity using the second factor.</li>\n<li>Access is granted only if all authentication factors are successfully validated.</li>\n</ul>\n<p>This layered approach makes it significantly harder for attackers to compromise accounts, even if they have stolen passwords.</p>\n<p>Businesses that use different types of Multi-Factor Authentication gain extra security and flexibility. This lets users log in in ways that work best for them.</p>\n<h2 id=\"types-of-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#types-of-multi-factor-authentication\" aria-label=\"types of multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Multi Factor Authentication</h2>\n<p>There are several MFA types that organizations and individuals can implement based on their security requirements. Below are the most common types of MFA used today:</p>\n<h3 id=\"1-email-codes\" style=\"position:relative;\"><a href=\"#1-email-codes\" aria-label=\"1 email codes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Email Codes</h3>\n<p>Users receive a one-time passcode (OTP) via email, which they must enter to complete authentication. While widely used, it can be vulnerable to phishing attacks if not combined with additional security measures.</p>\n<h3 id=\"2-text-and-call-one-time-passwords-otps\" style=\"position:relative;\"><a href=\"#2-text-and-call-one-time-passwords-otps\" aria-label=\"2 text and call one time passwords otps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Text and Call One-Time Passwords (OTPs)</h3>\n<p>A temporary password is sent via SMS or voice call, which expires after use. Although convenient, SIM swap attacks can compromise this method. OTP authentication works best when combined with another authentication method. Here’s how you can quickly configure OTP authentication.</p>\n<p><img src=\"/22fb1a980254e5b91eda6a2e8b6b2e38/sms-otp.webp\" alt=\"OTP verification screen displaying a secure login process via SMS. User enters a one-time password (OTP) sent to a masked phone number. A &#x27;Verification Successful&#x27; message confirms authentication.\"></p>\n<h3 id=\"3-biometric-verification\" style=\"position:relative;\"><a href=\"#3-biometric-verification\" aria-label=\"3 biometric verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Biometric Verification</h3>\n<p>This includes fingerprint scanning, facial recognition, retina scans, or voice authentication. Biometric authentication is highly secure and convenient but requires devices with biometric sensors.</p>\n<h3 id=\"4-authenticator-apps\" style=\"position:relative;\"><a href=\"#4-authenticator-apps\" aria-label=\"4 authenticator apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Authenticator Apps</h3>\n<p>Authenticator apps like LoginRadius Authenticator, Google Authenticator, etc. provide higher security than SMS-based OTPs since they are not vulnerable to SIM swap attacks.</p>\n<h3 id=\"5-passkeys\" style=\"position:relative;\"><a href=\"#5-passkeys\" aria-label=\"5 passkeys permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Passkeys</h3>\n<p>Passkeys replace passwords by using cryptographic keys for enhanced security. It offers enhanced security by using a device that signs a challenge using a stored private key and verifies the user’s identity. This makes logins seamless, phishing-resistant, and highly secure.</p>\n<p><a href=\"https://www.loginradius.com/products/passkeys\">Learn more about passkeys</a> and how to integrate them into your apps.</p>\n<h3 id=\"5-magic-links\" style=\"position:relative;\"><a href=\"#5-magic-links\" aria-label=\"5 magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Magic Links</h3>\n<p>Instead of entering a password, users receive a one-time login link via email. Clicking the link verifies their identity and grants access. This is often used for frictionless authentication but requires secure email access.</p>\n<h3 id=\"6-social-login\" style=\"position:relative;\"><a href=\"#6-social-login\" aria-label=\"6 social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Social Login</h3>\n<p>Users authenticate using third-party providers like Google, Facebook, Apple, or LinkedIn instead of creating a separate account. <a href=\"https://www.loginradius.com/products/social-login\">Social login</a> simplifies authentication but may raise privacy concerns depending on data-sharing policies.</p>\n<h3 id=\"7-soft-token-software-development-kits-sdks\" style=\"position:relative;\"><a href=\"#7-soft-token-software-development-kits-sdks\" aria-label=\"7 soft token software development kits sdks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Soft Token Software Development Kits (SDKs)</h3>\n<p>SDKs enable applications to integrate software-based authentication tokens within their apps, enhancing security for mobile and web applications.</p>\n<h3 id=\"8-smartcards-and-cryptographic-hardware-tokens\" style=\"position:relative;\"><a href=\"#8-smartcards-and-cryptographic-hardware-tokens\" aria-label=\"8 smartcards and cryptographic hardware tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Smartcards and Cryptographic Hardware Tokens</h3>\n<p>These are physical authentication devices that store cryptographic keys, such as YubiKeys or CAC cards. They provide robust security but require users to carry a physical token.</p>\n<h3 id=\"9-security-questions\" style=\"position:relative;\"><a href=\"#9-security-questions\" aria-label=\"9 security questions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>9. Security Questions</h3>\n<p>Users answer pre-set security questions to verify their identity. While easy to implement, this method is less secure as attackers can often guess or find answers through social engineering.</p>\n<h3 id=\"10-adaptive-authentication\" style=\"position:relative;\"><a href=\"#10-adaptive-authentication\" aria-label=\"10 adaptive authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>10. Adaptive Authentication</h3>\n<p>Adaptive authentication is a security method that adjusts authentication requirements based on risk factors like location, device, and user behavior. It enhances security by applying stricter verification only when needed, ensuring both protection and convenience. Read the documentation on <a href=\"https://www.loginradius.com/docs/security/customer-security/risk-based-auth/\">implementing adaptive MFA</a> for your apps.</p>\n<h2 id=\"real-life-mfa-authentication-examples\" style=\"position:relative;\"><a href=\"#real-life-mfa-authentication-examples\" aria-label=\"real life mfa authentication examples permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Real-life MFA Authentication Examples</h2>\n<p>Here are some real-world multi factor authentication examples used across industries:</p>\n<ul>\n<li>\n<h3 id=\"banking--finance\" style=\"position:relative;\"><a href=\"#banking--finance\" aria-label=\"banking  finance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Banking &#x26; Finance</h3>\n</li>\n</ul>\n<p>Customers log in using passwords and confirm transactions via OTP or biometric authentication on their smartphones.</p>\n<ul>\n<li>\n<h3 id=\"enterprise-security\" style=\"position:relative;\"><a href=\"#enterprise-security\" aria-label=\"enterprise security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enterprise Security</h3>\n</li>\n</ul>\n<p>Employees use smartcards or authenticator apps to access internal systems securely.</p>\n<ul>\n<li>\n<h3 id=\"e-commerce-platforms\" style=\"position:relative;\"><a href=\"#e-commerce-platforms\" aria-label=\"e commerce platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>E-Commerce Platforms</h3>\n</li>\n</ul>\n<p>Online stores offer passwordless login via magic links or enforce adaptive authentication when detecting unusual purchases.</p>\n<ul>\n<li>\n<h3 id=\"cloud-services\" style=\"position:relative;\"><a href=\"#cloud-services\" aria-label=\"cloud services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cloud Services</h3>\n</li>\n</ul>\n<p>Platforms like AWS and Google Cloud require hardware security keys (FIDO2) for admin access.</p>\n<ul>\n<li>\n<h3 id=\"social-media-accounts\" style=\"position:relative;\"><a href=\"#social-media-accounts\" aria-label=\"social media accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social Media Accounts</h3>\n</li>\n</ul>\n<p>Users enable two-factor authentication (2FA) with SMS or authenticator apps to protect their accounts from unauthorized access.</p>\n<ul>\n<li>\n<h3 id=\"healthcare-portals\" style=\"position:relative;\"><a href=\"#healthcare-portals\" aria-label=\"healthcare portals permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Healthcare Portals</h3>\n</li>\n</ul>\n<p>Patients verify their identity using biometrics or security questions to access medical records securely.</p>\n<ul>\n<li>\n<h3 id=\"online-gaming-platforms\" style=\"position:relative;\"><a href=\"#online-gaming-platforms\" aria-label=\"online gaming platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Online Gaming Platforms</h3>\n</li>\n</ul>\n<p>Gamers secure their accounts using authenticator apps or SMS-based MFA to prevent hacking.</p>\n<ul>\n<li>\n<h3 id=\"e-learning-platforms\" style=\"position:relative;\"><a href=\"#e-learning-platforms\" aria-label=\"e learning platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>E-learning Platforms</h3>\n</li>\n</ul>\n<p>E-learning platforms need to authenticate students and staff members securely. Students and staff members can authenticate themselves securely through MFA to view and update their profiles.</p>\n<p>See how one of <a href=\"https://www.loginradius.com/resource/case-study-page-safebridge/\">our clients- SafeBridge, leveled up security</a> with LoginRadius MFA.</p>\n<h2 id=\"how-to-choose-the-best-mfa-methods\" style=\"position:relative;\"><a href=\"#how-to-choose-the-best-mfa-methods\" aria-label=\"how to choose the best mfa methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Choose the Best MFA Methods</h2>\n<p>Selecting the appropriate MFA authentication method for your business needs depends on various factors:</p>\n<ul>\n<li><strong>Security Level Needed</strong> – High-risk industries (banking, healthcare) may require biometric authentication or hardware tokens.</li>\n<li><strong>User Convenience</strong> – Organizations should balance security with ease of use (e.g., authenticator apps are more user-friendly than smartcards).</li>\n<li><strong>Compliance Requirements</strong> – Regulations like GDPR, HIPAA, and SOC 2 may mandate certain MFA implementations.</li>\n<li><strong>Integration Capabilities</strong> – Businesses should opt for multi factor authentication options that integrate seamlessly with existing IT infrastructure.</li>\n<li><strong>Scalability</strong> – Companies with a large workforce should implement adaptive authentication to streamline security without adding friction.</li>\n</ul>\n<p>If you want a detailed guide on MFA best practices, download this insightful guide:</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"OTP verification screen displaying a secure login process via SMS. User enters a one-time password (OTP) sent to a masked phone number. A &#39;Verification Successful&#39; message confirms authentication.\"\n        title=\"OTP verification screen displaying a secure login process via SMS. User enters a one-time password (OTP) sent to a masked phone number. A &#39;Verification Successful&#39; message confirms authentication.\"\n        src=\"/static/4fbaf6ac6b8caeef5c4b7d988a5994d5/e5715/authenticateyour-customers-digital-assets-with-mfa.png\"\n        srcset=\"/static/4fbaf6ac6b8caeef5c4b7d988a5994d5/a6d36/authenticateyour-customers-digital-assets-with-mfa.png 650w,\n/static/4fbaf6ac6b8caeef5c4b7d988a5994d5/e5715/authenticateyour-customers-digital-assets-with-mfa.png 768w,\n/static/4fbaf6ac6b8caeef5c4b7d988a5994d5/29007/authenticateyour-customers-digital-assets-with-mfa.png 1600w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Choosing the right MFA type depends on security needs, compliance requirements, and user convenience. By implementing strong MFA methods, organizations can significantly reduce the risk of cyberattacks while ensuring seamless user authentication.</p>\n<p>The different types of Multi Factor Authentication available today offer businesses and individuals a range of security options to protect digital assets.</p>\n<p>Looking to enhance security with the best MFA options? Start by choosing the right authentication methods today! To book a demo and learn more about LoginRadius MFA, <a href=\"https://www.loginradius.com/book-a-demo/\">contact us</a>.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1.  How to turn on Multi Factor Authentication?</strong></p>\n<p>Go to Security or Account Settings in your <a href=\"https://www.loginradius.com/docs/security/customer-security/multi-factor-authentication/overview/\">LoginRadius dashboard</a>, choose an MFA method (SMS OTP, authenticator app, or biometrics), and follow the setup instructions.</p>\n<p><strong>2.  What are the factors of Multi Factor Authentication?</strong></p>\n<p>MFA uses three factors: Something you know (passwords), something you have (security key), and something you are (biometrics).</p>\n<p><strong>3.  What are the benefits of MFA?</strong></p>\n<p>MFA enhances security, prevents unauthorized access, reduces phishing risks, and ensures compliance with security standards like GDPR and SOC 2.</p>\n<p><strong>4.  What is Adaptive Multi Factor Authentication?</strong></p>\n<p>Adaptive MFA analyzes risk factors like location and device type to apply extra security only when needed, balancing security and user experience.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Types of Multi Factor Authentication & How to Pick the Best","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"February 28, 2025","updated_date":null,"tags":["Identity Management","User Authentication","CIAM Security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/98ba3401e6c0f115a27d37441bed4ad0/14b42/types-of-mfa.jpg","srcSet":"/static/98ba3401e6c0f115a27d37441bed4ad0/f836f/types-of-mfa.jpg 200w,\n/static/98ba3401e6c0f115a27d37441bed4ad0/2244e/types-of-mfa.jpg 400w,\n/static/98ba3401e6c0f115a27d37441bed4ad0/14b42/types-of-mfa.jpg 800w,\n/static/98ba3401e6c0f115a27d37441bed4ad0/47498/types-of-mfa.jpg 1200w,\n/static/98ba3401e6c0f115a27d37441bed4ad0/37d86/types-of-mfa.jpg 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/types-of-mfa/"}}},{"node":{"id":"b74bd001-9820-592d-bf45-fe17f9fb1e55","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>With rising cyber threats, organizations need strong authentication to safeguard sensitive data and user accounts. Multi-Factor Authentication (MFA) adds extra verification layers, while Risk-Based Authentication (RBA) adapts security based on user behavior.</p>\n<p>Both play a crucial role in preventing unauthorized access and reducing security risks. In this blog, we’ll explore what they are, how they work, and why they matter for your security.</p>\n<h2 id=\"what-is-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-multi-factor-authentication\" aria-label=\"what is multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Multi-Factor Authentication?</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">Multi-factor authentication (MFA)</a> is a security measure that requires users to provide multiple forms of verification before gaining access to a system. Instead of relying solely on passwords, MFA security uses a combination of authentication factors to strengthen security and prevent unauthorized access.</p>\n<h2 id=\"types-of-authentication-factors\" style=\"position:relative;\"><a href=\"#types-of-authentication-factors\" aria-label=\"types of authentication factors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Authentication Factors</h2>\n<p>MFA typically involves three categories of authentication factors:</p>\n<ol>\n<li><strong>Something You Know</strong> – Passwords, PINs, or security questions.    </li>\n<li><strong>Something You Have</strong> – Smart cards, authentication tokens, or mobile authentication apps.    </li>\n<li><strong>Something You Are</strong> – Biometric verification like fingerprints, facial recognition, or iris scans.</li>\n</ol>\n<p>By combining these factors, multi-layer authentication ensures that even if one factor is compromised, the account remains secure.</p>\n<h2 id=\"benefits-of-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-multi-factor-authentication\" aria-label=\"benefits of multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Multi-Factor Authentication</h2>\n<h3 id=\"1-enhanced-security\" style=\"position:relative;\"><a href=\"#1-enhanced-security\" aria-label=\"1 enhanced security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Enhanced Security</h3>\n<p>Multi-factor authentication in cyber security significantly reduces the risk of account breaches by adding multiple layers of protection beyond just passwords.</p>\n<h3 id=\"2-protection-against-credential-theft\" style=\"position:relative;\"><a href=\"#2-protection-against-credential-theft\" aria-label=\"2 protection against credential theft permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Protection Against Credential Theft</h3>\n<p>Since MFA security requires more than one authentication factor, stolen passwords alone cannot grant attackers access to accounts.</p>\n<h3 id=\"3-regulatory-compliance\" style=\"position:relative;\"><a href=\"#3-regulatory-compliance\" aria-label=\"3 regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Regulatory Compliance</h3>\n<p>Many industries require MFA for compliance with security regulations such as GDPR, HIPAA, and PCI-DSS, ensuring adherence to data protection standards.</p>\n<h3 id=\"4-reduced-risk-of-phishing-attacks\" style=\"position:relative;\"><a href=\"#4-reduced-risk-of-phishing-attacks\" aria-label=\"4 reduced risk of phishing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Reduced Risk of Phishing Attacks</h3>\n<p>Phishing attacks often rely on stealing login credentials, but with MFA security in place, attackers would need access to an additional factor, making unauthorized access significantly more difficult.</p>\n<p>Protect every login! Uncover <a href=\"https://www.loginradius.com/blog/identity/benefits-of-mfa/\">the benefits of MFA</a>.</p>\n<h3 id=\"5-improved-user-trust-and-confidence\" style=\"position:relative;\"><a href=\"#5-improved-user-trust-and-confidence\" aria-label=\"5 improved user trust and confidence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Improved User Trust and Confidence</h3>\n<p>When organizations implement strong authentication mechanisms, users feel more secure knowing their data is well-protected. This fosters trust in digital services and platforms.</p>\n<p>By requiring multiple authentication factors, MFA enhances identity risk management, reducing vulnerabilities related to credential-based attacks.</p>\n<h2 id=\"what-is-risk-based-authentication\" style=\"position:relative;\"><a href=\"#what-is-risk-based-authentication\" aria-label=\"what is risk based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Risk-Based Authentication?</h2>\n<p>Risk-based authentication (RBA), also known as <a href=\"https://www.loginradius.com/products/adaptive-mfa\">adaptive authentication</a>, is a dynamic security approach that evaluates user behavior and contextual factors before granting access. Instead of applying uniform authentication policies, risk-based security adjusts authentication requirements based on perceived risk levels.</p>\n<h2 id=\"how-risk-based-authentication-works\" style=\"position:relative;\"><a href=\"#how-risk-based-authentication-works\" aria-label=\"how risk based authentication works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Risk-Based Authentication Works?</h2>\n<ol>\n<li><strong>Behavioral Analysis</strong> – Identifies normal user behavior patterns to detect anomalies.    </li>\n<li><strong>Device Recognition</strong> – Ensures access only from known and trusted devices.    </li>\n<li><strong>IP Address &#x26; Geolocation Monitoring</strong> – Flags login attempts from unusual locations.    </li>\n<li><strong>Time-Based Access Control</strong> – Monitors login times to detect suspicious activities.    </li>\n<li><strong>Real-Time Risk Evaluation</strong> – Uses AI-driven analytics to assess risk dynamically.</li>\n</ol>\n<p><img src=\"/5081309ed356e5e32a6454cd316bc45d/adaptive-mfa.webp\" alt=\"Risk-based Authentication\"></p>\n<h2 id=\"benefits-of-risk-based-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-risk-based-multi-factor-authentication\" aria-label=\"benefits of risk based multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Risk-Based Multi-Factor Authentication</h2>\n<h3 id=\"better-user-experience-with-heightened-security\" style=\"position:relative;\"><a href=\"#better-user-experience-with-heightened-security\" aria-label=\"better user experience with heightened security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Better User Experience with Heightened Security</h3>\n<p>Risk-based MFA makes it easier for users. Low-risk users can log in smoothly. High-risk access attempts need extra authentication steps. This balance between security and convenience enhances overall efficiency.</p>\n<h3 id=\"more-robust-defense-against-fraud\" style=\"position:relative;\"><a href=\"#more-robust-defense-against-fraud\" aria-label=\"more robust defense against fraud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>More Robust Defense Against Fraud</h3>\n<p>By analyzing login behaviors, device information, and geographical location, risk authentication detects suspicious activities and prevents fraudulent access attempts. It effectively minimizes risks related to identity theft and account takeovers.</p>\n<h3 id=\"regulatory-compliance\" style=\"position:relative;\"><a href=\"#regulatory-compliance\" aria-label=\"regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Regulatory Compliance</h3>\n<p>Organizations leveraging risk-based authentication ensure compliance with stringent security regulations like the GDPR and CCPA by implementing advanced identity risk management. This helps in meeting legal and industry-specific security requirements.</p>\n<p>Failing to comply with GDPR can lead to security breaches, damage your brand's reputation, and result in hefty fines! <a href=\"https://www.loginradius.com/resource/ebook/loginradius-gdpr-compliance/\">Learn more.</a></p>\n<h3 id=\"cost-effective-security-implementation\" style=\"position:relative;\"><a href=\"#cost-effective-security-implementation\" aria-label=\"cost effective security implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cost-Effective Security Implementation</h3>\n<p>Unlike static security measures, risk-based authentication optimizes authentication requirements based on risk assessment, reducing unnecessary authentication steps and streamlining security processes without increasing operational costs.</p>\n<h3 id=\"increased-adaptability-to-emerging-threats\" style=\"position:relative;\"><a href=\"#increased-adaptability-to-emerging-threats\" aria-label=\"increased adaptability to emerging threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Increased Adaptability to Emerging Threats</h3>\n<p>With cyber threats constantly evolving, risk-based MFA ensures security policies remain dynamic. Organizations can adjust authentication requirements based on new threat patterns and user behaviors.</p>\n<p>Want a detailed guide on risk-based authentication? Download this insightful guide:</p>\n<p><a href=\"https://www.loginradius.com/resource/guide/enterprise-risk-based-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"an enterprises guide to risk based authentication\"\n        title=\"an enterprises guide to risk based authentication\"\n        src=\"/static/f4bc8724f4b653ed5a67bbd41122f31c/e5715/an-enterprises-guide-to-risk-based-authentication.png\"\n        srcset=\"/static/f4bc8724f4b653ed5a67bbd41122f31c/a6d36/an-enterprises-guide-to-risk-based-authentication.png 650w,\n/static/f4bc8724f4b653ed5a67bbd41122f31c/e5715/an-enterprises-guide-to-risk-based-authentication.png 768w,\n/static/f4bc8724f4b653ed5a67bbd41122f31c/29007/an-enterprises-guide-to-risk-based-authentication.png 1600w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"risk-based-vs-traditional-mfa\" style=\"position:relative;\"><a href=\"#risk-based-vs-traditional-mfa\" aria-label=\"risk based vs traditional mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risk-based vs Traditional MFA</h2>\n<table>\n<thead>\n<tr>\n<th><strong>Factor</strong></th>\n<th><strong>Risk-Based Authentication (RBA)</strong></th>\n<th><strong>Traditional Multi-Factor Authentication (MFA)</strong></th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td><strong>Authentication Approach</strong></td>\n<td>Adapts security measures based on user behavior and risk levels</td>\n<td>Requires a fixed set of authentication steps for every login</td>\n</tr>\n<tr>\n<td><strong>User Experience</strong></td>\n<td>Seamless, prompts MFA only when risk is detected</td>\n<td>Requires MFA for every login, which can be cumbersome</td>\n</tr>\n<tr>\n<td><strong>Security Level</strong></td>\n<td>Dynamic security based on real-time risk analysis</td>\n<td>Static security, same for all users regardless of risk</td>\n</tr>\n<tr>\n<td><strong>Risk Assessment</strong></td>\n<td>Considers factors like location, device, IP, and login patterns</td>\n<td>No contextual awareness, applies the same process to all users</td>\n</tr>\n<tr>\n<td><strong>Efficiency</strong></td>\n<td>Reduces friction for low-risk users while securing high-risk attempts</td>\n<td>Increases login friction for all users equally</td>\n</tr>\n<tr>\n<td><strong>Best Use Cases</strong></td>\n<td>Enterprises needing adaptive security with minimal disruption</td>\n<td>Organizations requiring uniform authentication enforcement</td>\n</tr>\n<tr>\n<td><strong>Implementation Complexity</strong></td>\n<td>Requires AI/ML-driven risk assessment and continuous monitoring</td>\n<td>Easier to implement with standard authentication methods</td>\n</tr>\n<tr>\n<td><strong>Compliance &#x26; Security</strong></td>\n<td>Helps meet compliance with intelligent access controls</td>\n<td>Meets compliance but can add unnecessary friction</td>\n</tr>\n</tbody>\n</table>\n<h2 id=\"risk-based-mfa-examples\" style=\"position:relative;\"><a href=\"#risk-based-mfa-examples\" aria-label=\"risk based mfa examples permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risk-Based MFA Examples</h2>\n<p>Risk-based MFA is widely used across various industries to enhance security while maintaining user convenience. For example, banking institutions employ risk-based authentication by analyzing user behavior, transaction location and history.</p>\n<p>E-commerce platforms use risk-based MFA to keep customer accounts safe. They watch buying patterns to identify fraudulent purchases.</p>\n<p>Similarly, corporate IT systems also leverage risk-based security to enforce strict authentication policies for high-risk access requests while allowing seamless logins for trusted employees.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Implementing advanced security measures like multi-factor authentication and risk-based authentication is crucial in today’s modern digital landscape.</p>\n<p>Multi-factor authentication enhances security by requiring multiple verification methods, while risk-based MFA dynamically assesses risk to provide a seamless yet secure user experience. Organizations that leverage these technologies benefit from stronger identity protection, compliance adherence, and improved cybersecurity resilience.</p>\n<p>If you wish to reinforce your security by leveraging cutting edge MFA and risk-based auth, <a href=\"https://www.loginradius.com/book-a-demo/\">reach us for a quick demo.</a></p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>How Does One Implement Risk-Based Authentication?</strong></p>\n<p>Organizations implement RBA by using AI-driven tools like <a href=\"https://www.loginradius.com/products/adaptive-mfa\">LoginRadius</a> that analyze user behavior, device, and location data to assess risk and enforce adaptive authentication.</p>\n<p><strong>How to Enable Multi-Factor Authentication?</strong></p>\n<p>MFA can be enabled by integrating it into an organization's security framework through an identity provider, requiring users to verify identity through multiple authentication factors.</p>\n<p><strong>What is Adaptive Multi-Factor Authentication?</strong></p>\n<p>Adaptive MFA/ risk-based MFA dynamically adjusts authentication requirements based on real-time risk assessment, ensuring a secure yet seamless user experience.</p>\n<p><strong>How Does Multi-Factor Authentication Make a System More Secure?</strong></p>\n<p>MFA enhances security by requiring multiple authentication factors, making it harder for attackers to gain unauthorized access even if one factor is compromised.</p>\n<p><strong>How Does Risk-Based MFA Differ from Traditional MFA?</strong></p>\n<p>Traditional MFA uses set authentication steps. Risk-based MFA changes how we authenticate users. It does this by looking at user behavior and risk. Multi-factor authentication (MFA) is a way to improve security. It requires users to give more than one form of verification to access a system.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Risk-Based Authentication vs. MFA: Key Differences Explained","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"February 27, 2025","updated_date":null,"tags":["API","Identity Management","User Authentication","CIAM Security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/edcd19470ad543ebda9bf1653aa68f74/58556/banner.webp","srcSet":"/static/edcd19470ad543ebda9bf1653aa68f74/61e93/banner.webp 200w,\n/static/edcd19470ad543ebda9bf1653aa68f74/1f5c5/banner.webp 400w,\n/static/edcd19470ad543ebda9bf1653aa68f74/58556/banner.webp 800w,\n/static/edcd19470ad543ebda9bf1653aa68f74/99238/banner.webp 1200w,\n/static/edcd19470ad543ebda9bf1653aa68f74/7c22d/banner.webp 1600w,\n/static/edcd19470ad543ebda9bf1653aa68f74/04b61/banner.webp 6251w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/mfa-vs-rba/"}}},{"node":{"id":"386db202-a85b-5ce3-bbe4-4b4aac98969e","html":"<p>In today’s interconnected world, managing user identities efficiently across various systems is a crucial challenge. System for Cross-domain Identity Management (SCIM) has emerged as the go-to standard for simplifying this process.</p>\n<p>Designed to enable developers to streamline identity management, SCIM reduces the complexity of provisioning and de-provisioning user accounts across multiple applications. This article will explain what is SCIM, how it works, and why it matters to developers.</p>\n<h2 id=\"what-is-scim\" style=\"position:relative;\"><a href=\"#what-is-scim\" aria-label=\"what is scim permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is SCIM?</h2>\n<p>SCIM, short for System for Cross-Domain Identity Management, is an open standard protocol used for automating the exchange of user identity information between identity providers and service providers. By offering a unified way to handle user provisioning, SCIM ensures consistency and reduces the manual effort required to manage users across multiple domains and applications.</p>\n<p>At its core, SCIM simplifies the tedious process of creating, updating, and deleting user accounts in external systems. For example, when a new employee joins a company, SCIM automates account provisioning in applications like email, collaboration tools, and SaaS platforms—eliminating the need for manual intervention.</p>\n<p>The protocol’s efficiency and scalability make it a favorite among developers working on <a href=\"https://www.loginradius.com/\">identity management systems.</a></p>\n<p>SCIM is part of a broader system for cross-domain identity management, which provides standardization and interoperability across diverse applications and platforms.</p>\n<h2 id=\"how-does-scim-work\" style=\"position:relative;\"><a href=\"#how-does-scim-work\" aria-label=\"how does scim work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does SCIM Work?</h2>\n<p>SCIM works by standardizing how identity information is communicated between systems, using a RESTful architecture that simplifies integration and ensures compatibility across various platforms. Here is a detailed look at the components and workflow:</p>\n<ol>\n<li>SCIM Service Provider: The application or system that receives and processes identity data, such as a SaaS platform, acts as the SCIM service provider. It is responsible for hosting SCIM endpoints and managing operations like creating or updating user accounts.    </li>\n<li>SCIM Client: The identity provider (IdP) or central system that manages and sends identity data is the SCIM client. It triggers requests to create, update, or delete user accounts on the service provider’s platform.    </li>\n<li>RESTful Endpoints: SCIM uses <a href=\"https://www.loginradius.com/docs/authentication/quick-start/standard-login/\">RESTful APIs</a> to enable communication between the SCIM client and service provider. These APIs are designed for performing CRUD (Create, Read, Update, Delete) operations on user and group resources.    </li>\n<li>Data Exchange Format: SCIM exchanges data using JSON, ensuring lightweight and human-readable payloads that are easy to debug and extend.    </li>\n<li>SCIM Authentication: Secure communication is ensured through protocols like OAuth 2.0. This safeguards sensitive identity data during transmission and prevents unauthorized access.</li>\n<li>Provisioning Workflow: When a provisioning event (e.g., adding a new user) occurs:</li>\n<li>The SCIM client sends an HTTP POST request with user details to the SCIM service provider.</li>\n<li>The service provider processes the request and creates the user in its system.</li>\n<li>Similar workflows handle updates (PUT), deletions (DELETE), and data retrieval (GET).</li>\n<li>Real-time Synchronization: SCIM ensures that identity changes are synchronized in real time. For instance, if a user’s role changes, the SCIM client sends an update to the service provider, ensuring consistent access permissions across all connected systems.</li>\n</ol>\n<p>With LoginRadius, SCIM can be seamlessly integrated with identity management solutions to enable automated user provisioning for SaaS applications, streamlining operations and reducing administrative overhead.</p>\n<h2 id=\"scim-integration-simplifying-identity-management\" style=\"position:relative;\"><a href=\"#scim-integration-simplifying-identity-management\" aria-label=\"scim integration simplifying identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SCIM Integration: Simplifying Identity Management</h2>\n<p>Integrating SCIM into your application enables seamless identity management and significantly reduces the burden of manual provisioning. If you're wondering what is SCIM, it stands for System for Cross-domain Identity Management, a standardized protocol designed to streamline identity data exchange between applications and identity providers.</p>\n<p>Whether you’re building a SaaS platform or developing an internal tool, SCIM integration provides a standardized framework to connect your system with identity providers.</p>\n<p>Here are the steps to integrate SCIM into your application:</p>\n<ol>\n<li>Implement the SCIM API: Develop RESTful endpoints in your application to handle user and group CRUD operations. The endpoints must adhere to the SCIM protocol specifications to ensure  compatibility with identity providers.    </li>\n<li>Authentication Setup: Configure secure authentication mechanisms, such as OAuth 2.0, for communication between your system and the SCIM client.    </li>\n<li>Test for Compatibility: Verify your implementation with various identity providers to ensure seamless integration and functionality.    </li>\n<li>Enable User Synchronization: Allow the identity provider to synchronize user data with your application by mapping attributes like name, email, and roles.    </li>\n<li>Monitor and Debug: Continuously monitor API requests and responses for errors, and debug issues promptly to maintain a reliable integration.</li>\n</ol>\n<p>By understanding what is SCIM and leveraging it effectively, developers can focus on enhancing application functionality while relying on the protocol to handle complex identity management workflows.</p>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/identity-orchestration-workflow/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"identity orchestration workflow\"\n        title=\"identity orchestration workflow\"\n        src=\"/static/e2034cc6673be8dfb021efe2e347d0a0/e5715/cta.png\"\n        srcset=\"/static/e2034cc6673be8dfb021efe2e347d0a0/a6d36/cta.png 650w,\n/static/e2034cc6673be8dfb021efe2e347d0a0/e5715/cta.png 768w,\n/static/e2034cc6673be8dfb021efe2e347d0a0/29007/cta.png 1600w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>By leveraging the system for cross-domain identity management, organizations can ensure a more consistent and streamlined approach to handling identity data across multiple platforms.</p>\n<h2 id=\"scim-security-protecting-identity-data\" style=\"position:relative;\"><a href=\"#scim-security-protecting-identity-data\" aria-label=\"scim security protecting identity data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SCIM Security: Protecting Identity Data</h2>\n<p>When working with SCIM, ensuring the security of identity data is paramount. Since SCIM involves exchanging sensitive information such as user details and group memberships, implementing robust security measures is essential.</p>\n<ol>\n<li>Secure Authentication: <a href=\"https://www.loginradius.com/blog/engineering/oauth2/\">Use OAuth 2.0</a> or similar authentication protocols to authorize requests between the SCIM client and service  provider.</li>\n<li>Data Encryption: Encrypt data in transit using HTTPS to prevent unauthorized access.  </li>\n<li>Access Control: <a href=\"https://www.loginradius.com/blog/identity/securing-gen-ai-rbac-implementation/\">Implement role-based access control (RBAC)</a> to limit which users or systems can perform  specific SCIM operations.    </li>\n<li>Audit Logging: Maintain logs of all SCIM operations to monitor activity and detect any unauthorized changes.</li>\n</ol>\n<p>By prioritizing SCIM security, developers can build trust and ensure compliance with industry standards.</p>\n<h2 id=\"scim-user-provisioning-automating-account-management\" style=\"position:relative;\"><a href=\"#scim-user-provisioning-automating-account-management\" aria-label=\"scim user provisioning automating account management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SCIM User Provisioning: Automating Account Management</h2>\n<p>One of the standout features of SCIM is its ability to automate <a href=\"https://www.loginradius.com/provisioning/\">user provisioning</a>. Manual account management is not only time-consuming but also prone to errors. SCIM user provisioning eliminates these challenges by automating key processes, including:</p>\n<ul>\n<li>Onboarding: Automatically create user accounts in connected applications when a new employee joins the organization.</li>\n<li>Updates: Synchronize changes to user attributes, such as roles or departments, across all systems.</li>\n<li>Offboarding: Deactivate or delete accounts when a user leaves, ensuring access is revoked promptly.</li>\n</ul>\n<p>This level of automation saves time, reduces administrative overhead, and enhances security by ensuring accurate and up-to-date user data.</p>\n<h2 id=\"why-you-should-embrace-scim\" style=\"position:relative;\"><a href=\"#why-you-should-embrace-scim\" aria-label=\"why you should embrace scim permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why You Should Embrace SCIM</h2>\n<p>SCIM is more than just a protocol; it’s a developer’s ally in building scalable, secure, and efficient identity management systems. Here’s why SCIM is worth your attention:</p>\n<ul>\n<li>Ease of Integration: With its RESTful design and JSON format, SCIM is easy to implement and integrate into existing applications.</li>\n<li>Standardization: SCIM offers a consistent approach to identity management, eliminating the need to create custom provisioning solutions.</li>\n<li>Efficiency: Automating provisioning and de-provisioning reduces manual effort, allowing developers to focus on core application development.</li>\n<li>Interoperability: SCIM’s compatibility with major identity providers ensures seamless platform communication.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>SCIM is revolutionizing the way we manage identities across systems. By automating user provisioning, enhancing security, and simplifying integration, SCIM empowers developers to build robust identity management solutions.</p>\n<p>Whether you’re working on a SaaS platform, enterprise software, or internal tools, implementing SCIM ensures scalability, efficiency, and compliance.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"What is SCIM? A Developer's Guide to Understanding and Using SCIM","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"January 17, 2025","updated_date":null,"tags":["SCIM"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.272727272727273,"src":"/static/29856b779fd9730b694a902324af184c/bc59e/scim.png","srcSet":"/static/29856b779fd9730b694a902324af184c/69585/scim.png 200w,\n/static/29856b779fd9730b694a902324af184c/497c6/scim.png 400w,\n/static/29856b779fd9730b694a902324af184c/bc59e/scim.png 512w","sizes":"(max-width: 512px) 100vw, 512px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/what-is-scim/"}}},{"node":{"id":"f7f0f624-b946-5f18-871c-59a6827355bf","html":"<p>Determining who gets access to what, when, and how is a critical challenge for organizations. Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) are two of the most popular access control methodologies​ used to address this challenge. Each approach offers distinct advantages and trade-offs, making the choice between them dependent on the specific needs of your application, organization, or development project.</p>\n<p>Understanding both the types of access control—RBAC vs ABAC is essential to designing a scalable and secure IAM solution. Whether you’re implementing access control for a consumer-facing app or managing internal permissions within a complex enterprise system, choosing the right model can significantly impact the flexibility, security, and maintainability of your system.</p>\n<p>In this blog, we’ll break down the fundamentals of RBAC vs ABAC, compare their strengths and weaknesses, and provide actionable insights to help you make an informed decision. By the end, you’ll have a clear understanding of which user based access control​ aligns best with your technical and business objectives.</p>\n<h2 id=\"what-is-rbac-role-based-access-control\" style=\"position:relative;\"><a href=\"#what-is-rbac-role-based-access-control\" aria-label=\"what is rbac role based access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is RBAC (Role-Based Access Control)?</h2>\n<p>Role-Based Access Control (RBAC) is an <a href=\"https://www.loginradius.com/docs/authentication/concepts/roles-and-membership/\">access control methodology</a> where permissions are assigned based on predefined roles within an organization. Each role defines specific access rights, and users are assigned roles according to their job responsibilities. This approach simplifies permission management by focusing on roles rather than individuals.</p>\n<p>For example, in a typical application:</p>\n<ul>\n<li>Admin Role: Full access to all resources.    </li>\n<li>Editor Role: Limited access to modify certain content.    </li>\n<li>Viewer Role: Read-only access to data.</li>\n</ul>\n<p>RBAC is particularly useful for structured environments with clearly defined roles and responsibilities. It is a cornerstone of <a href=\"https://www.loginradius.com/role-management/\">RBAC authentication systems</a> and a popular model for developers looking for straightforward implementations.</p>\n<p>Additionally, compared to the access control list vs role based access control debate, RBAC offers a more scalable and manageable approach.</p>\n<h3 id=\"advantages-of-rbac\" style=\"position:relative;\"><a href=\"#advantages-of-rbac\" aria-label=\"advantages of rbac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of RBAC</h3>\n<ul>\n<li>Simplicity: Roles streamline access control and are intuitive to implement.</li>\n<li>Efficiency: Assigning roles instead of individual permissions reduces administrative overhead.</li>\n<li>Consistency: Ensures uniform permissions for users with the same role.    </li>\n<li>Scalability: Works well as organizations grow, especially with predefined role-based access control models.</li>\n<li>Integration: Often easier to integrate than user-based access control, which requires direct user-to-permission mapping.</li>\n</ul>\n<h3 id=\"limitations-of-rbac\" style=\"position:relative;\"><a href=\"#limitations-of-rbac\" aria-label=\"limitations of rbac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Limitations of RBAC</h3>\n<ul>\n<li>Rigidity: Difficult to adapt to dynamic or context-specific access requirements.</li>\n<li>Role Explosion: Managing too many roles can become complex in large systems.    </li>\n<li>Lack of Contextual Awareness: Unlike ABAC, RBAC does not consider environmental or resource-specific factors.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/roles-management/overview/\">Read our Docs</a></p>\n<h2 id=\"what-is-abac-attribute-based-access-control\" style=\"position:relative;\"><a href=\"#what-is-abac-attribute-based-access-control\" aria-label=\"what is abac attribute based access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is ABAC (Attribute-Based Access Control)?</h2>\n<p>Attribute-Based Access Control (ABAC) is an advanced access control methodology that grants or denies permissions based on attributes. These attributes can be related to the user (e.g., job title), the resource (e.g., sensitivity level), or the environment (e.g., location or time).</p>\n<p>For example, in an ABAC-based system, a financial analyst (user attribute) can access quarterly reports (resource attribute) only during work hours (environmental attribute).</p>\n<p>ABAC’s flexibility and granularity make it ideal for dynamic systems requiring fine-tuned permissions. ABAC security leverages these attributes to create sophisticated policies that enhance security. Developers often favor ABAC when building applications in highly regulated industries due to its adaptability and context-aware capabilities.</p>\n<h3 id=\"advantages-of-abac\" style=\"position:relative;\"><a href=\"#advantages-of-abac\" aria-label=\"advantages of abac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of ABAC</h3>\n<ul>\n<li>Flexibility: Adapts to dynamic environments and evolving access requirements.</li>\n<li>Granularity: Enables precise control over who can access what and under what conditions.</li>\n<li>Context-Aware: Considers multiple attributes, improving security by factoring in real-time conditions.</li>\n<li>ABAC Security Standards: Aligns with <a href=\"https://www.loginradius.com/security/\">modern security practices</a> for handling sensitive data, enhancing compliance in regulated industries.</li>\n</ul>\n<h3 id=\"limitations-of-abac\" style=\"position:relative;\"><a href=\"#limitations-of-abac\" aria-label=\"limitations of abac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Limitations of ABAC</h3>\n<ul>\n<li>Complexity: Requires detailed policy creation and management.</li>\n<li>Performance Overhead: Evaluating multiple attributes for every access request can impact performance.</li>\n<li>Implementation Effort: Developers need to invest significant time in designing and implementing attribute-based policies.</li>\n</ul>\n<h2 id=\"rbac-vs-abac-which-one-is-the-right-fit\" style=\"position:relative;\"><a href=\"#rbac-vs-abac-which-one-is-the-right-fit\" aria-label=\"rbac vs abac which one is the right fit permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>RBAC vs ABAC: Which One is the Right Fit?</h2>\n<p>When evaluating RBAC vs ABAC, the choice depends on your application’s specific requirements. Below is a comparison based on key factors:</p>\n<table>\n        <tbody>\n            <tr>\n                <th>\n                    Aspect\n                </td>\n                <th>\n                    Role-Based Access Control (RBAC)\n                </td>\n                <th>\n                    Attribute-Based Access Control (ABAC)\n                </td>\n            </tr>\n            <tr>\n                <td>\n                    Approach\n                </td>\n                <td>\n                    Assigns permissions based on predefined roles.\n                </td>\n                <td>\n                    Evaluates attributes such as user roles, resource types, and environmental conditions.\n                </td>\n            </tr>\n            <tr>\n                <td>\n                    Ideal Use Case\n                </td>\n                <td>\n                    Structured environments with static roles and responsibilities.\n                </td>\n                <td>\n                    Complex environments requiring context-aware access decisions (e.g., time, location, device).\n                </td>\n            </tr>\n            <tr>\n                <td>\n                    Simplicity\n                </td>\n                <td>\n                    Simple to implement and manage, especially in straightforward setups.\n                </td>\n                <td>\n                    Requires more effort to define and manage policies but offers greater flexibility.\n                </td>\n            </tr>\n            <tr>\n                <td>\n                    Scalability\n                </td>\n                <td>\n                    Scales well with organizational growth by assigning permissions to roles rather than individuals.\n                </td>\n                <td>\n                    Supports granular, dynamic policies, making it adaptable to increasing complexity.\n                </td>\n            </tr>\n            <tr>\n                <td>\n                    Flexibility\n                </td>\n                <td>\n                    Limited to predefined roles; less adaptable to changing contexts.\n                </td>\n                <td>\n                    Highly flexible, accommodating complex policies for diverse scenarios.\n                </td>\n            </tr>\n            <tr>\n                <td>\n                    Best Fit\n                </td>\n                <td>\n                    Applications with straightforward access needs.\n                </td>\n                <td>\n                    Industries with stringent security requirements, like healthcare or finance.\n                </td>\n            </tr>\n            <tr>\n                <td>\n                    Hybrid Approach\n                </td>\n                <td>\n                    Core permissions managed via roles (RBAC).\n                </td>\n                <td>\n                    Contextual refinements handled using attributes (ABAC).\n                </td>\n            </tr>\n        </tbody>\n    </table>\n<p>Both models have their strengths. RBAC authentication excels in simplicity and scalability, while ABAC provides the flexibility needed for evolving access control demands. In many cases, a hybrid approach combining RBAC's ease with ABAC's granularity offers an optimal solution.</p>\n<p>Developers must consider factors such as simplicity, scalability, and security when choosing between these models to build secure and adaptable access systems.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Choosing between RBAC vs ABAC ultimately depends on your project’s complexity and security needs. While role based access control models​ provide simplicity and scalability, ABAC offers flexibility and granularity. As a developer, understanding these access control methodologies will help you design systems that are both secure and efficient.</p>\n<p>For developers seeking robust RBAC authentication solutions, LoginRadius provides a comprehensive platform to simplify access management. Our tools support role based access control vs attribute based access control scenarios, ensuring that you have the flexibility to build scalable and secure applications.</p>\n<p>By addressing the nuances of RBAC and ABAC cyber security, we help developers navigate complex access challenges effectively.</p>\n<p>Explore LoginRadius Access Management Solutions and enhance your application’s security today.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"RBAC vs ABAC: A Developer’s Guide to Choosing the Right Fit","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"January 13, 2025","updated_date":null,"tags":["RBAC","ABAC"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/8309172dc05fabf45694927116cfabd5/14b42/lock-business-background-security-concept-3d-rendering.jpg","srcSet":"/static/8309172dc05fabf45694927116cfabd5/f836f/lock-business-background-security-concept-3d-rendering.jpg 200w,\n/static/8309172dc05fabf45694927116cfabd5/2244e/lock-business-background-security-concept-3d-rendering.jpg 400w,\n/static/8309172dc05fabf45694927116cfabd5/14b42/lock-business-background-security-concept-3d-rendering.jpg 800w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/rbac-vs-abac/"}}},{"node":{"id":"445b58e8-309f-580f-914c-485b97cade07","html":"<p>In September 2024, Scattered Spider made headlines after it <a href=\"https://www.reuters.com/technology/moodys-says-breach-mgm-is-credit-negative-disruption-lingers-2023-09-13/\">breached MGM Resorts International</a>, leading to system outages across their global network. This incident wasn’t just a wake-up call for the hospitality industry—it underscored how persistent social engineering and sophisticated ransomware attacks are becoming more strategic. Now, as we look ahead to 2025, threats like these are evolving at breakneck speed.</p>\n<p>From deepfake-powered scams to advanced supply chain attacks, today’s CISOs are dealing with a rapidly shifting threat landscape. This year, the stakes are higher than ever, making it crucial to stay ahead of the top cybersecurity threats.</p>\n<h2 id=\"2025-top-cybersecurity-threats-to-watch-out-for\" style=\"position:relative;\"><a href=\"#2025-top-cybersecurity-threats-to-watch-out-for\" aria-label=\"2025 top cybersecurity threats to watch out for permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2025 Top Cybersecurity Threats to Watch Out For</h2>\n<p>In this article, we’ll break down the risks that should be on every security leader’s radar—and how to prepare for them.</p>\n<h3 id=\"1-scattered-spider-a-looming-threat\" style=\"position:relative;\"><a href=\"#1-scattered-spider-a-looming-threat\" aria-label=\"1 scattered spider a looming threat permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Scattered Spider: A Looming Threat</h3>\n<p>Scattered Spider, a highly organized threat group, has become a primary concern for CISOs. Known for targeting telecommunications, technology, and financial sectors, this group leverages sophisticated social engineering techniques to infiltrate organizations.</p>\n<p>The CISA Scattered Spider report highlights the group’s growing capabilities, including its use of Scattered Spider ransomware to disrupt operations and demand exorbitant ransoms.</p>\n<p>To mitigate this threat, organizations should invest in employee training to recognize phishing and social engineering attempts, adopt a <a href=\"https://www.loginradius.com/resource/whitepaper/zero-trust-security-modern-business/\">Zero Trust Architecture</a> to limit access to critical systems, and stay updated with the latest cybersecurity statistics to identify emerging patterns.</p>\n<h3 id=\"2-the-increasing-threat-of-deepfake-identities\" style=\"position:relative;\"><a href=\"#2-the-increasing-threat-of-deepfake-identities\" aria-label=\"2 the increasing threat of deepfake identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. The Increasing Threat of Deepfake Identities</h3>\n<p>The deepfake threat has escalated in recent years, with attackers using AI-generated content to deceive individuals and systems. From impersonating executives to falsifying identity verification, deepfake technology poses a serious challenge to CISO information security efforts.</p>\n<p>To counter the increasing threat of deepfake identities, organizations can deploy advanced AI detection tools to identify manipulated content, enhance security with <a href=\"https://www.loginradius.com/platforms/multi-factor-authentication\">multi-factor authentication (MFA),</a> and employ behavioral analytics to flag suspicious activity.</p>\n<h3 id=\"3-advanced-ransomware-attacks\" style=\"position:relative;\"><a href=\"#3-advanced-ransomware-attacks\" aria-label=\"3 advanced ransomware attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Advanced Ransomware Attacks</h3>\n<p>Ransomware threats continue to evolve, with attackers adopting more targeted and sophisticated strategies among the top cybersecurity threats of 2025. Beyond traditional encryption attacks, ransomware operators are leveraging double extortion tactics, where data is not only encrypted but also stolen and threatened to be published. The Scattered Spider ransomware group exemplifies this dual-pronged attack strategy.</p>\n<p>CISOs must implement robust data backup and recovery plans, network segmentation, and continuous monitoring to mitigate the impact of ransomware attacks.</p>\n<h3 id=\"4-ai-powered-cyberattacks\" style=\"position:relative;\"><a href=\"#4-ai-powered-cyberattacks\" aria-label=\"4 ai powered cyberattacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. AI-Powered Cyberattacks</h3>\n<p>While AI serves as a tool for defenders, attackers are also exploiting it to launch sophisticated cyberattacks. AI-powered malware can adapt and evolve to bypass traditional security measures, making them harder to detect. Automated phishing campaigns, backed by AI, create highly personalized attacks that are more convincing than ever.</p>\n<p>Organizations must adopt advanced AI-driven defense mechanisms to counter these attacks effectively and continuously update their systems to stay ahead of evolving threats.</p>\n<h3 id=\"5-supply-chain-attacks\" style=\"position:relative;\"><a href=\"#5-supply-chain-attacks\" aria-label=\"5 supply chain attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Supply Chain Attacks</h3>\n<p>Attackers are increasingly targeting third-party vendors and suppliers as a means to infiltrate larger organizations, making supply chain attacks one of the top cybersecurity threats of 2025.</p>\n<p>A breach in one link of the supply chain can compromise the entire ecosystem, as evidenced by the growing number of high-profile supply chain breaches. Regular audits, robust vendor management programs, and implementation of Zero Trust principles are critical in mitigating supply chain vulnerabilities.</p>\n<h3 id=\"6-iot-vulnerabilities\" style=\"position:relative;\"><a href=\"#6-iot-vulnerabilities\" aria-label=\"6 iot vulnerabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. IoT Vulnerabilities</h3>\n<p>The proliferation of Internet of Things (IoT) devices introduces new security challenges. Many IoT devices lack robust security protocols, making them easy targets for attackers. Compromised devices can serve as entry points for larger attacks or be exploited for botnet activities.</p>\n<p>Securing IoT ecosystems requires strong device authentication, regular firmware updates, and network segmentation to isolate IoT devices from critical systems.</p>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/smart-iot-authentication-experience/\">Smart and IoT Authentication</a></p>\n<h2 id=\"why-loginradius-is-your-security-partner\" style=\"position:relative;\"><a href=\"#why-loginradius-is-your-security-partner\" aria-label=\"why loginradius is your security partner permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why LoginRadius is Your Security Partner?</h2>\n<p>LoginRadius understands the critical role of identity and access management in strengthening your organization’s security posture. The platform is designed with <a href=\"https://www.loginradius.com/platforms/security-and-compilance\">security-first principles</a>, offering:</p>\n<ul>\n<li>Multi-Factor Authentication (MFA): Safeguard against phishing and deepfake threats with robust, user-friendly MFA options, ensuring only verified users gain access to sensitive systems.</li>\n<li>Comprehensive User Verification: Strengthen defenses against fake identities and fraud with tools that validate user authenticity across the entire lifecycle.</li>\n<li>Support for Zero Trust Architecture: Mitigate risks from sophisticated actors like Scattered Spider by adopting a “never trust, always verify” approach to secure every access point.</li>\n</ul>\n<p>Beyond just tools, our solutions help you build a resilient cybersecurity strategy tailored to your unique needs. Whether you’re protecting customer data, securing internal systems, or mitigating risks from evolving threats, we’ve got you covered.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\">Schedule a demo</a> to explore how our solutions can empower your CISO security strategy.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>As we navigate 2025, the top cybersecurity threats—from sophisticated actors like Scattered Spider to the expanding capabilities of deepfake technology—pose significant challenges to organizations worldwide. These threats are not static; they evolve rapidly, exploiting the smallest gaps in traditional security frameworks. For CISOs, staying ahead requires a focus on proactive measures such as Zero Trust Architecture, advanced identity management solutions, and real-time threat intelligence. These approaches not only mitigate risks but also help build a more resilient security posture capable of adapting to emerging attack vectors.</p>\n<p>The stakes have never been higher, but with the right strategies and technologies, organizations can rise to the occasion. By adopting a forward-looking mindset and investing in cutting-edge security solutions, businesses can turn these threats into opportunities to innovate and strengthen their defenses. Ultimately, resilience against the top cybersecurity threats of 2025 will define the security leaders of tomorrow.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"CISOs’ Top Cybersecurity Threats 2025: Scattered Spider, Deepfakes, and More","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"January 06, 2025","updated_date":null,"tags":["Cybersecurity"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/b84c051ac77e7f856d845a19ed3803eb/14b42/lock-business-background-security-concept-3d-rendering.jpg","srcSet":"/static/b84c051ac77e7f856d845a19ed3803eb/f836f/lock-business-background-security-concept-3d-rendering.jpg 200w,\n/static/b84c051ac77e7f856d845a19ed3803eb/2244e/lock-business-background-security-concept-3d-rendering.jpg 400w,\n/static/b84c051ac77e7f856d845a19ed3803eb/14b42/lock-business-background-security-concept-3d-rendering.jpg 800w,\n/static/b84c051ac77e7f856d845a19ed3803eb/47498/lock-business-background-security-concept-3d-rendering.jpg 1200w,\n/static/b84c051ac77e7f856d845a19ed3803eb/0e329/lock-business-background-security-concept-3d-rendering.jpg 1600w,\n/static/b84c051ac77e7f856d845a19ed3803eb/6f5d2/lock-business-background-security-concept-3d-rendering.jpg 5962w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/cisos-top-cybersecurity-threats-from-scattered-spider-to-deepfakes/"}}},{"node":{"id":"1796344c-53fc-595b-b458-a106653743be","html":"<h2 id=\"what-is-passkey\" style=\"position:relative;\"><a href=\"#what-is-passkey\" aria-label=\"what is passkey permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Passkey?</h2>\n<p>Passkey authentication provides a highly secure, passwordless login experience tailored for modern authentication needs. Built on FIDO2 and WebAuthn standards, it addresses key vulnerabilities like data breaches and phishing attacks by leveraging cryptographic key pairs.</p>\n<p>Unlike traditional passwords, which are often reused and stored on vulnerable servers, passkeys store private keys securely on user devices. This ensures that even in case of a server breach, user credentials remain safe.</p>\n<p>For developers, <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/passkey/overview/\">passkeys simplify integration</a>, reduce the need for password management, and comply with cutting-edge authentication protocols, paving the way for a passwordless future.</p>\n<h2 id=\"how-do-passkeys-work\" style=\"position:relative;\"><a href=\"#how-do-passkeys-work\" aria-label=\"how do passkeys work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do Passkeys Work?</h2>\n<p>Passkeys operate on a private-public key mechanism. To understand, we need to look at their registration and authentication processes.</p>\n<ol>\n<li>Registration: A user’s device generates a cryptographic key pair via WebAuthn APIs during registration.</li>\n<li>The private key is securely stored on the user’s device and never shared.</li>\n<li>The public key is sent to the server to validate authentication requests.</li>\n<li>Authentication:</li>\n<li>The server issues a cryptographic challenge to the user’s device.</li>\n<li>The device uses the private key to sign the challenge.</li>\n<li>The server verifies the signed challenge using the public key, granting access if the verification is successful.\n</li>\n</ol>\n<p>This process ensures that sensitive data never leaves the user’s device, making passkeys significantly more secure than passwords. Developers can streamline implementation using tools like WebAuthn.js, ensuring compliance with <a href=\"https://www.loginradius.com/platforms/authentication-and-registration\">modern authentication</a> protocols and providing a seamless user experience.</p>\n<h2 id=\"how-are-passkeys-used-on-multiple-devices-with-different-users\" style=\"position:relative;\"><a href=\"#how-are-passkeys-used-on-multiple-devices-with-different-users\" aria-label=\"how are passkeys used on multiple devices with different users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Are Passkeys Used on Multiple Devices with Different Users?</h2>\n<p>Passkeys are designed to function seamlessly across devices through cloud services like Apple’s iCloud Keychain and Google’s Password Manager. These services securely synchronize passkeys, enabling users to authenticate without manually transferring credentials.</p>\n<p>For shared devices, passkeys protect each user’s private keys using biometrics or PINs. By adhering to FIDO2 and WebAuthn standards, passkeys ensure cross-platform compatibility, making them a versatile choice for diverse ecosystems. Developers can effortlessly implement these features to cater to multi-user and multi-device scenarios.</p>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/passkeys-passwordless-authentication\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABn0lEQVQY01XOzWoTURjG8amT+WobJ5lkmpnJdJImmYyZNpqYD1uL7aLqWimldKNIEdooQhFX4u3oSl1YwYIgXYhegCDUTxBcWCKhvYC/J8nKA8/ivLzvj0cyqssY4WX08iWMUpfJcgdjri3Swig00IILqLN1VH8exY3QxCxVX8Es1lHEXHZCEtkCiUyAbPlIQ2wYy484a86gTabRDZMpM0cqVyIZLKD4C6j5GMURYLGJ171OtLiGVruCHJwfYf+BemWJbL6CM+NhZz1UNUWitIZSW8cImgIU7bwY3Y9x4i65qEU2bOJWG7jRRaZFmTNpfwzqlcVxQ7eMmbTI5AqYfpPMcg9rZY9ktCra1QRYw5idx446uAL14g7OuRZ22GA6Xx1hcjo/bLhEotjm2cvX9I+POfrylW/ff/Lj12/+/D1h9eYtJDtEMgN2Hz3h0+cjnu8f8PTFK3Gzz+H7j7x5+44pryx2nDEoBy0ODj8wfP1+n8FgwOnpyeh/beMOklViwq7QvnqDnYeP2br7gM3t+yL3uN3bY2u7h2YXmEi5/AObCM5rWlEs6wAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CTA\"\n        title=\"CTA\"\n        src=\"/static/5333b92e3e9f12f1f05e1a63df46799f/e5715/cta.png\"\n        srcset=\"/static/5333b92e3e9f12f1f05e1a63df46799f/a6d36/cta.png 650w,\n/static/5333b92e3e9f12f1f05e1a63df46799f/e5715/cta.png 768w,\n/static/5333b92e3e9f12f1f05e1a63df46799f/81501/cta.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"passkey-vs-password-why-are-passkeys-a-better-choice\" style=\"position:relative;\"><a href=\"#passkey-vs-password-why-are-passkeys-a-better-choice\" aria-label=\"passkey vs password why are passkeys a better choice permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passkey vs Password: Why are Passkeys a Better Choice?</h2>\n<p>The comparison between passkey vs password underscores why passkeys are revolutionizing authentication:</p>\n<ul>\n<li><strong>Enhanced Security</strong>: Passkeys are inherently resistant to threats like phishing, brute force attacks, and credential reuse. In contrast, passwords often fall victim to these vulnerabilities due to weak user practices or targeted attacks.</li>\n<li><strong>Improved Usability</strong>: Users no longer need to manage or memorize complex password strings, significantly reducing frustration and the likelihood of human error. With passkeys, authentication is both seamless and secure.</li>\n<li><strong>Simplified Developer Workflows</strong>: For developers, passkeys eliminate the burden of managing sensitive password data, streamlining the implementation of secure authentication systems. This reduces the overhead associated with password storage, encryption, and recovery mechanisms.</li>\n</ul>\n<p>Moreover, passkeys mitigate the risks associated with server-side breaches by ensuring that sensitive user credentials are never stored centrally, setting a new standard for modern authentication.</p>\n<h2 id=\"are-passkeys-safer-than-passwords\" style=\"position:relative;\"><a href=\"#are-passkeys-safer-than-passwords\" aria-label=\"are passkeys safer than passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Are Passkeys Safer than Passwords?</h2>\n<p>When asking are passkey logins safe, the answer is unequivocally yes. Passkeys are designed with robust security features to protect users and organizations.</p>\n<p>They provide phishing resistance by eliminating the need to input sensitive credentials manually. Private keys never leave the user’s device, ensuring that even in the event of a server breach, user credentials remain uncompromised.</p>\n<p>Most passkeys are further protected by biometrics such as fingerprints or facial recognition, adding an additional layer of security.</p>\n<p>Moreover, passkeys can complement existing <a href=\"https://www.loginradius.com/platforms/multi-factor-authentication\">multi-factor authentication</a> (MFA) systems, creating a comprehensive and secure framework without increasing user complexity. Passkeys offer developers a scalable and safe authentication alternative that is easier to manage than traditional methods.</p>\n<h2 id=\"why-choose-loginradius-for-passkey-authentication\" style=\"position:relative;\"><a href=\"#why-choose-loginradius-for-passkey-authentication\" aria-label=\"why choose loginradius for passkey authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Choose LoginRadius for Passkey Authentication?</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.92307692307691%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"passkey\"\n        title=\"passkey\"\n        src=\"/static/bf289254152d60f3224403f907600aa4/e5715/passkey.png\"\n        srcset=\"/static/bf289254152d60f3224403f907600aa4/a6d36/passkey.png 650w,\n/static/bf289254152d60f3224403f907600aa4/e5715/passkey.png 768w,\n/static/bf289254152d60f3224403f907600aa4/29007/passkey.png 1600w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Image: A screenshot of LoginRadius Passkeys</p>\n<p>LoginRadius simplifies the <a href=\"https://www.loginradius.com/products/passkeys\">adoption of passkey</a> authentication for developers and businesses. The platform offers developer-friendly tools like SDKs and APIs that make integration faster, supporting compliance with FIDO2 and WebAuthn standards.</p>\n<h3 id=\"key-benefits\" style=\"position:relative;\"><a href=\"#key-benefits\" aria-label=\"key benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Benefits</h3>\n<ul>\n<li>Scalability: Built to handle millions of users, ensuring performance at scale.    </li>\n<li>Security Compliance: Adheres to global standards such as GDPR and CCPA.    </li>\n<li>Developer-Friendly: Comprehensive documentation and tools for seamless integration.</li>\n</ul>\n<p>Learn more: <a href=\"https://www.loginradius.com/docs/authentication/tutorial/passkey-authentication/\">How to implement passkey authentication with LoginRadius</a></p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>As we move into 2025, passkeys will become an integral part of secure authentication systems, widely implemented across industries.</p>\n<p>For developers, they simplify integration by eliminating the need to store and manage sensitive credentials, reducing both risks and operational overhead. For users, passkeys provide consistent and secure access across devices without relying on passwords, enhancing both security and usability.</p>\n<p>This evolution signifies the shift toward a more streamlined and robust passwordless future.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is passkey authentication?</strong>\nA. Passkey authentication replaces passwords with cryptographic key pairs for secure and seamless login.</p>\n<p><strong>2. How do passkeys work?</strong>\nA. Passkeys use private-public key pairs to authenticate users without transmitting sensitive data.</p>\n<p><strong>3. Are passkey logins safe?</strong>\nA. Yes, passkeys are resistant to phishing, brute force attacks, and server breaches.</p>\n<p><strong>4. How are passkeys used on multiple devices?</strong>\nA. Passkeys synchronize across devices via cloud services, ensuring seamless access.</p>\n<p><strong>5. Passkey vs password: Which is better?</strong>\nA. Passkeys offer better security and usability compared to traditional passwords, eliminating many common vulnerabilities.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"What is Passkey Authentication - A Complete Guide","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"December 30, 2024","updated_date":null,"tags":["Engineering"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.0309278350515463,"src":"/static/9449d4d89f5abbe660ee2295432fd3af/32d53/hacker.png","srcSet":"/static/9449d4d89f5abbe660ee2295432fd3af/69585/hacker.png 200w,\n/static/9449d4d89f5abbe660ee2295432fd3af/497c6/hacker.png 400w,\n/static/9449d4d89f5abbe660ee2295432fd3af/32d53/hacker.png 614w","sizes":"(max-width: 614px) 100vw, 614px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/what-is-passkey-authentication/"}}},{"node":{"id":"e90afc2c-f8f0-573f-9588-fca054528213","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Generative AI (GenAI) is transforming the enterprise landscape, offering unparalleled capabilities in automation, creativity, and decision-making in today’s modern digital landscape. However, with great power comes great responsibility, especially in terms of security. </p>\n<p>Yes, security is often an overlooked aspect when it comes to leveraging the true potential of GenAI, and here’s where enterprises need to put their best foot forward in reassuring security. </p>\n<p>One effective method to secure GenAI is by implementing <a href=\"https://www.loginradius.com/role-management/\">Role-Based Access Control (RBAC)</a>. This article explores how enterprises can leverage RBAC to safeguard their GenAI systems, ensuring that only authorized personnel have access to critical functions and data.</p>\n<h2 id=\"understanding-genai-and-its-security-challenges\" style=\"position:relative;\"><a href=\"#understanding-genai-and-its-security-challenges\" aria-label=\"understanding genai and its security challenges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding GenAI and Its Security Challenges</h2>\n<p>Generative AI refers to AI systems capable of creating content, such as text, images, and even software code. While these systems can boost productivity and innovation, they also introduce new security challenges:</p>\n<ul>\n<li><strong>Data Privacy:</strong> GenAI systems often require access to large datasets, which may contain sensitive information.</li>\n<li><strong>Access Control:</strong> Without proper access controls, unauthorized users may exploit GenAI systems, leading to data breaches or misuse.</li>\n<li><strong>Auditability:</strong> Ensuring transparency and traceability in GenAI operations is crucial for compliance and <a href=\"https://www.loginradius.com/data-governance/\">data governance</a>.</li>\n</ul>\n<h2 id=\"what-is-role-based-access-control-rbac\" style=\"position:relative;\"><a href=\"#what-is-role-based-access-control-rbac\" aria-label=\"what is role based access control rbac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Role-Based Access Control (RBAC)?</h2>\n<p>RBAC is a security paradigm that restricts system access based on the roles of individual users within an organization. In RBAC, permissions to perform certain operations are assigned to specific roles rather than to individual users. </p>\n<p>This approach simplifies user permissions management and enhances security by ensuring that users only have access to the resources necessary for their roles.</p>\n<h2 id=\"implementing-rbac-to-secure-genai\" style=\"position:relative;\"><a href=\"#implementing-rbac-to-secure-genai\" aria-label=\"implementing rbac to secure genai permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing RBAC to Secure GenAI</h2>\n<p>Implementing RBAC in the context of GenAI involves several key steps:</p>\n<h3 id=\"1-define-roles-and-responsibilities\" style=\"position:relative;\"><a href=\"#1-define-roles-and-responsibilities\" aria-label=\"1 define roles and responsibilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Define Roles and Responsibilities</h3>\n<p>Begin by identifying all the roles within your organization that will interact with the GenAI system. Common roles might include:</p>\n<ul>\n<li><strong>Data Scientists:</strong> Responsible for training and fine-tuning GenAI models.</li>\n<li><strong>Developers:</strong> Implement GenAI models into applications.</li>\n<li><strong>Administrators:</strong> Oversee system configuration and maintenance.</li>\n<li><strong>Business Analysts:</strong> Use GenAI outputs for decision-making.</li>\n</ul>\n<p>Each role should have a clear set of responsibilities and required permissions.</p>\n<h3 id=\"2-map-permissions-to-roles\" style=\"position:relative;\"><a href=\"#2-map-permissions-to-roles\" aria-label=\"2 map permissions to roles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Map Permissions to Roles</h3>\n<p>Next, map specific permissions to each role. For example:</p>\n<ul>\n<li><strong>Data Scientists:</strong> Access to raw data, model training environments, and performance metrics.</li>\n<li><strong>Developers:</strong> Access to model APIs, integration tools, and deployment scripts.</li>\n<li><strong>Administrators:</strong> Full access to system configuration, user management, and security settings.</li>\n<li><strong>Business Analysts:</strong> Read-only access to GenAI outputs and analytics dashboards.</li>\n</ul>\n<p>This mapping ensures that users only have access to the functions and data necessary for their roles.</p>\n<h3 id=\"3-implement-access-controls\" style=\"position:relative;\"><a href=\"#3-implement-access-controls\" aria-label=\"3 implement access controls permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Implement Access Controls</h3>\n<p>With roles and permissions defined, the next step is to implement access controls within your GenAI system. This can be achieved through:</p>\n<ul>\n<li><strong>Authentication:</strong> Ensure all users are authenticated before accessing the system. Use multi-factor authentication (MFA) for added security.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/whitepaper/mfa-digital-identity-security/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-dig-id\"\n        title=\"WP-dig-id\"\n        src=\"/static/45fb3ea2b6ecb545326a6cc8f6033d1e/e5715/WP-dig-id.png\"\n        srcset=\"/static/45fb3ea2b6ecb545326a6cc8f6033d1e/a6d36/WP-dig-id.png 650w,\n/static/45fb3ea2b6ecb545326a6cc8f6033d1e/e5715/WP-dig-id.png 768w,\n/static/45fb3ea2b6ecb545326a6cc8f6033d1e/81501/WP-dig-id.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>Authorization:</strong> Implement authorization mechanisms to enforce RBAC policies. Use customer identity and access management (CIAM) tools to manage user roles and permissions.</li>\n<li><strong>Audit Logging:</strong> Enable audit logging to track user activities and detect unauthorized access or anomalies.</li>\n</ul>\n<h3 id=\"4-regularly-review-and-update-rbac-policies\" style=\"position:relative;\"><a href=\"#4-regularly-review-and-update-rbac-policies\" aria-label=\"4 regularly review and update rbac policies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Regularly Review and Update RBAC Policies</h3>\n<p>RBAC is not a set-it-and-forget-it solution. Regularly review and update your RBAC policies to reflect changes in your organization, such as new roles, changing responsibilities, or evolving security threats. Conduct periodic audits to ensure compliance and identify potential security gaps.</p>\n<h2 id=\"benefits-of-rbac-for-securing-genai\" style=\"position:relative;\"><a href=\"#benefits-of-rbac-for-securing-genai\" aria-label=\"benefits of rbac for securing genai permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of RBAC for Securing GenAI</h2>\n<p>Implementing RBAC offers several benefits for securing GenAI systems:</p>\n<ul>\n<li><strong>Enhanced Security:</strong> By restricting access based on roles, RBAC minimizes the risk of unauthorized access and data breaches.</li>\n<li><strong>Simplified Management:</strong> RBAC simplifies the management of user permissions, reducing administrative overhead.</li>\n<li><strong>Improved Compliance:</strong> RBAC helps ensure compliance with regulatory requirements by providing a clear audit trail of user activities.</li>\n<li><strong>Scalability:</strong> As your organization grows, RBAC can easily <a href=\"https://www.loginradius.com/scalability/\">scale to accommodate new users </a>and roles.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Securing GenAI in the enterprise is paramount to harnessing its full potential while mitigating risks. Implementing RBAC provides a robust framework for controlling access to GenAI systems, ensuring that only authorized users can interact with sensitive data and functionalities. </p>\n<p>By defining roles and responsibilities, mapping permissions, implementing access controls, and regularly reviewing policies, enterprises can create a secure environment for their GenAI initiatives. </p>\n<p>By embracing RBAC, organizations not only protect their valuable data but also build a foundation of trust and accountability, paving the way for innovative and secure AI-driven solutions.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"How To Secure GenAI by Implementing RBAC In The Enterprise","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"August 12, 2024","updated_date":null,"tags":["ai","data privacy","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4388489208633093,"src":"/static/6bc6dee130d2a097d22362728c301640/33aa5/gen-ai-rbac.jpg","srcSet":"/static/6bc6dee130d2a097d22362728c301640/f836f/gen-ai-rbac.jpg 200w,\n/static/6bc6dee130d2a097d22362728c301640/2244e/gen-ai-rbac.jpg 400w,\n/static/6bc6dee130d2a097d22362728c301640/33aa5/gen-ai-rbac.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/securing-gen-ai-rbac-implementation/"}}},{"node":{"id":"1a5c6cda-0dec-552b-8012-b58f36cc73bd","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>User experience is paramount in today’s modern digital business landscape. A seamless, <a href=\"https://www.loginradius.com/authentication/\">hassle-free authentication</a> process can significantly enhance user satisfaction and retention. However, many businesses struggle with outdated, cumbersome login systems that frustrate users and create security vulnerabilities. </p>\n<p>Enter LoginRadius, a powerful SaaS tool designed to streamline user identity management. This article explains the benefits of migrating to LoginRadius and outlines a step-by-step guide for a smooth transition.</p>\n<h2 id=\"the-critical-role-of-login-systems-in-user-experience\" style=\"position:relative;\"><a href=\"#the-critical-role-of-login-systems-in-user-experience\" aria-label=\"the critical role of login systems in user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Critical Role of Login Systems in User Experience</h2>\n<p>A seamless login experience is essential in today's competitive digital landscape. Here's why:</p>\n<ol>\n<li><strong>User Satisfaction</strong>: A cumbersome login process can lead to user frustration and abandonment. An intuitive, fast login system ensures users have a positive experience every time they access your platform.</li>\n<li><strong>First Impressions Matter</strong>: The login process is often the first interaction a user has with your service. A smooth, hassle-free experience can set the tone for their entire journey with your brand.</li>\n<li><strong>Retention and Engagement</strong>: Simplified login procedures encourage users to return frequently, boosting engagement and long-term retention.</li>\n</ol>\n<h2 id=\"why-loginradius-is-the-optimal-choice\" style=\"position:relative;\"><a href=\"#why-loginradius-is-the-optimal-choice\" aria-label=\"why loginradius is the optimal choice permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why LoginRadius is the Optimal Choice</h2>\n<p>LoginRadius stands out for several reasons:</p>\n<ol>\n<li><strong>Advanced Security Measures</strong>: LoginRadius offers multi-factor authentication (MFA), single sign-on (SSO), passkeys, and state-of-the-art encryption to safeguard user data.</li>\n<li><strong>Customizable User Experience</strong>: With <a href=\"https://www.loginradius.com/social-login/\">social login options</a> and customizable interfaces, LoginRadius makes the login process as user-friendly as possible.</li>\n<li><strong>Scalability and Flexibility</strong>: From small startups to large enterprises, LoginRadius scales seamlessly to accommodate your user base.</li>\n<li><strong>Regulatory Compliance</strong>: With LoginRadius's <a href=\"https://www.loginradius.com/compliances/\">built-in compliance</a> features, ensure your operations comply with global data protection regulations like GDPR and CCPA.</li>\n<li><strong>Identity Orchestration</strong>: LoginRadius provides granular flexibility in designing and deploying identity flows without the need for coding, enabling anyone with identity expertise to build production-ready identity workflows within minutes.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/identity-orchestration-workflow/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-id-orchestration\"\n        title=\"DS-id-orchestration\"\n        src=\"/static/684e33528c22fabe4e035d1e4cc17b39/e5715/DS-id-orchestration.png\"\n        srcset=\"/static/684e33528c22fabe4e035d1e4cc17b39/a6d36/DS-id-orchestration.png 650w,\n/static/684e33528c22fabe4e035d1e4cc17b39/e5715/DS-id-orchestration.png 768w,\n/static/684e33528c22fabe4e035d1e4cc17b39/81501/DS-id-orchestration.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a> </p>\n<h2 id=\"planning-your-migration\" style=\"position:relative;\"><a href=\"#planning-your-migration\" aria-label=\"planning your migration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Planning Your Migration</h2>\n<p>Preparation is key to a successful migration. Here’s how to get started:</p>\n<ol>\n<li><strong>Audit Your Current System</strong>: Evaluate your existing login system to identify weaknesses and areas for improvement.</li>\n<li><strong>Set Clear Goals</strong>: Define what you hope to achieve with the migration, such as improved security, better user experience, or enhanced compliance.</li>\n<li><strong>Involve Key Stakeholders</strong>: Ensure all relevant departments, including IT, security, and user experience teams, are involved in the planning process.</li>\n</ol>\n<p>If you are still unable to understand how to plan your migration, <a href=\"https://www.loginradius.com/contact-sales/\">contact us</a>, and we’ll ensure a smooth migration planning process and provide you with a product demo. </p>\n<h2 id=\"detailed-migration-steps\" style=\"position:relative;\"><a href=\"#detailed-migration-steps\" aria-label=\"detailed migration steps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Detailed Migration Steps</h2>\n<ol>\n<li><strong>Develop a Comprehensive Plan</strong>: Outline your migration strategy, including timelines, resource allocation, and risk management.</li>\n<li><strong>Secure Data Transfer</strong>: Move user data to LoginRadius securely, maintaining data integrity and confidentiality.</li>\n<li><strong>Test Thoroughly</strong>: Conduct extensive testing to ensure the new system integrates seamlessly with your existing infrastructure.</li>\n<li><strong>Training and Onboarding</strong>: Provide thorough training for your staff and users to ensure a smooth transition.</li>\n<li><strong>Launch and Monitor</strong>: Go live with the new system, monitoring closely for any issues and being ready to make necessary adjustments.</li>\n</ol>\n<h2 id=\"enhancing-user-security\" style=\"position:relative;\"><a href=\"#enhancing-user-security\" aria-label=\"enhancing user security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhancing User Security</h2>\n<p>Security is a paramount concern for any business managing user identities. LoginRadius excels in this area with:</p>\n<ol>\n<li><strong>Multi-Factor Authentication (MFA)</strong>: Adding an extra layer of security, MFA requires users to provide multiple forms of verification. Moreover, with LoginRadius’ <a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">Risk-Based Authentication</a>, you can reinforce security in high-risk situations. </li>\n<li><strong>Single Sign-On (SSO)</strong>: SSO simplifies the login process by allowing users to access multiple applications with a single set of credentials.</li>\n<li><strong>Data Encryption</strong>: Advanced encryption methods protect sensitive user information from potential breaches.</li>\n</ol>\n<h2 id=\"improving-operational-efficiency\" style=\"position:relative;\"><a href=\"#improving-operational-efficiency\" aria-label=\"improving operational efficiency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improving Operational Efficiency</h2>\n<p>Migrating to LoginRadius can streamline your operations significantly:</p>\n<ol>\n<li><strong>Reduced Administrative Burden</strong>: Automated login processes mean less manual intervention, freeing up your IT team to focus on more critical tasks.</li>\n<li><strong>Enhanced System Performance</strong>: LoginRadius’s efficient design ensures fast, reliable login experiences, even during peak usage times.</li>\n<li><strong>Centralized Management</strong>: Manage all user identities and access controls from a single, centralized platform.</li>\n</ol>\n<h2 id=\"post-migration-benefits\" style=\"position:relative;\"><a href=\"#post-migration-benefits\" aria-label=\"post migration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Post-Migration Benefits</h2>\n<p>Once the migration to LoginRadius is complete, your business will enjoy numerous advantages:</p>\n<ol>\n<li><strong>Superior User Experience</strong>: A smooth, quick, and secure login process keeps users happy and engaged.</li>\n<li><strong>Stronger Security Posture</strong>: Advanced security features protect against data breaches and unauthorized access.</li>\n<li><strong>Regulatory Peace of Mind</strong>: Built-in compliance with global regulations ensures your operations are always in line with legal requirements.</li>\n</ol>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Migrating to LoginRadius is an investment in your business's future. By eliminating login hassles, you enhance user satisfaction, bolster security, and streamline operations. </p>\n<p>With a strategic approach and thorough preparation, the transition to LoginRadius can be effortless and highly rewarding. Don't let outdated login systems hold you back—embrace the future of user identity management with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"No More Login Hassles: Effortless Migration to LoginRadius Awaits","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"August 01, 2024","updated_date":null,"tags":["ciam authentication","passwordless login","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/60db021706c50aa6395e9b0b3c4253a7/33aa5/effortless-migration.jpg","srcSet":"/static/60db021706c50aa6395e9b0b3c4253a7/f836f/effortless-migration.jpg 200w,\n/static/60db021706c50aa6395e9b0b3c4253a7/2244e/effortless-migration.jpg 400w,\n/static/60db021706c50aa6395e9b0b3c4253a7/33aa5/effortless-migration.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/effortless-migration-login-hassles/"}}},{"node":{"id":"9a9c2a10-78ec-5ac5-a71a-038b5c832a3c","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In today's digital landscape, customer onboarding has increasingly moved online, driven by the need for convenience, efficiency, and scalability. However, with the rise of deepfake technology, the digital onboarding process faces significant threats.</p>\n<p>Deepfakes, which use artificial intelligence to create hyper-realistic but fake audio, video, or images, pose a serious risk to the integrity of identity verification processes. As a business owner, it's crucial to understand these risks and implement strategies to combat them effectively.</p>\n<p>Let’s understand the aspects associated with deepfakes and how to reinforce your overall platform security, especially the user onboarding process.</p>\n<h2 id=\"understanding-the-deepfake-threat\" style=\"position:relative;\"><a href=\"#understanding-the-deepfake-threat\" aria-label=\"understanding the deepfake threat permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding the Deepfake Threat</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/how-to-identity-mitigate-deepfake-attacks/\">Deepfakes</a> leverage sophisticated machine learning algorithms to manipulate or generate content that can deceive the human eye and, alarmingly, some automated verification systems.</p>\n<p>In digital onboarding, deepfakes can be used to impersonate individuals, potentially leading to fraudulent account creation and unauthorized access to sensitive information. The implications are vast, ranging from financial loss to reputational damage.</p>\n<h2 id=\"key-strategies-to-strengthen-digital-onboarding\" style=\"position:relative;\"><a href=\"#key-strategies-to-strengthen-digital-onboarding\" aria-label=\"key strategies to strengthen digital onboarding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Strategies to Strengthen Digital Onboarding</h2>\n<h3 id=\"advanced-identity-verification-solutions\" style=\"position:relative;\"><a href=\"#advanced-identity-verification-solutions\" aria-label=\"advanced identity verification solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advanced Identity Verification Solutions</h3>\n<ul>\n<li>Biometric Authentication: Utilize <a href=\"https://www.loginradius.com/blog/identity/biometric-authentication-mobile-apps/\">multi-factor biometric authentication</a> methods such as facial recognition, voice recognition, and fingerprint scanning. Ensure these systems are equipped with liveness detection to differentiate between a live person and a deepfake.</li>\n<li>Behavioral Biometrics: Implement behavioral biometric analysis, which monitors unique user behaviors like typing patterns, mouse movements, and touchscreen interactions. These subtle yet distinctive traits are difficult for deepfakes to replicate accurately.</li>\n</ul>\n<h3 id=\"ai-and-machine-learning-enhancements\" style=\"position:relative;\"><a href=\"#ai-and-machine-learning-enhancements\" aria-label=\"ai and machine learning enhancements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>AI and Machine Learning Enhancements</h3>\n<ul>\n<li>Deepfake Detection Algorithms: Invest in AI-driven detection systems specifically designed to identify deepfake content. These algorithms analyze inconsistencies in audio and video data that are often imperceptible to humans.</li>\n<li>Continuous Learning: Ensure your detection systems are continuously learning and adapting to new deepfake techniques. Regularly update your algorithms to keep pace with the evolving landscape of deepfake technology.</li>\n</ul>\n<h3 id=\"human-oversight-and-training\" style=\"position:relative;\"><a href=\"#human-oversight-and-training\" aria-label=\"human oversight and training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Human Oversight and Training</h3>\n<ul>\n<li>Expert Review: Incorporate a layer of human oversight for critical verification steps. Train your staff to recognize the signs of deepfakes and encourage a vigilant approach to reviewing suspicious cases.</li>\n<li>Employee Training: Conduct regular training sessions to keep your team informed about the latest deepfake threats and detection techniques. An informed and alert team is a critical line of defense.</li>\n</ul>\n<h3 id=\"collaboration-and-information-sharing\" style=\"position:relative;\"><a href=\"#collaboration-and-information-sharing\" aria-label=\"collaboration and information sharing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Collaboration and Information Sharing</h3>\n<ul>\n<li>Industry Partnerships: Collaborate with other companies and industry bodies to share insights and develop best practices for combating deepfakes. Collective efforts can lead to stronger, more resilient defense mechanisms.</li>\n<li>Government and Regulatory Compliance: Stay abreast of <a href=\"https://www.loginradius.com/compliances/\">regulations and guidelines</a> related to digital security and deepfake technology. Compliance not only ensures legal protection but also enhances the credibility of your security measures.</li>\n</ul>\n<h3 id=\"customer-education-and-communication\" style=\"position:relative;\"><a href=\"#customer-education-and-communication\" aria-label=\"customer education and communication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customer Education and Communication</h3>\n<ul>\n<li>Awareness Campaigns: Educate your customers about the risks of deepfakes and the steps they can take to protect their personal information. Awareness campaigns can help build trust and encourage proactive security measures from users.</li>\n<li>Transparent Communication: Maintain open lines of communication with your customers. Inform them about the measures you are taking to protect their data and the importance of their role in maintaining security.</li>\n</ul>\n<h2 id=\"actionable-steps-for-implementation\" style=\"position:relative;\"><a href=\"#actionable-steps-for-implementation\" aria-label=\"actionable steps for implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Actionable Steps for Implementation</h2>\n<h3 id=\"conduct-a-risk-assessment\" style=\"position:relative;\"><a href=\"#conduct-a-risk-assessment\" aria-label=\"conduct a risk assessment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conduct a Risk Assessment</h3>\n<ul>\n<li>Evaluate your current digital onboarding processes to identify potential vulnerabilities to deepfake threats.</li>\n<li>Develop a risk management plan that includes both preventive measures and response strategies.</li>\n</ul>\n<h3 id=\"invest-in-technology\" style=\"position:relative;\"><a href=\"#invest-in-technology\" aria-label=\"invest in technology permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Invest in Technology</h3>\n<ul>\n<li>Allocate resources to acquire and integrate advanced identity verification and deepfake detection technologies.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/whitepaper/identity-management-data-governance/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"The Critical Role of Identity Management in Data Governance\"\n        title=\"The Critical Role of Identity Management in Data Governance\"\n        src=\"/static/3b5c367fc2bd21a58862d556b17a765e/e5715/cta.png\"\n        srcset=\"/static/3b5c367fc2bd21a58862d556b17a765e/a6d36/cta.png 650w,\n/static/3b5c367fc2bd21a58862d556b17a765e/e5715/cta.png 768w,\n/static/3b5c367fc2bd21a58862d556b17a765e/81501/cta.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li>Prioritize systems that offer scalability and adaptability to future advancements in deepfake techniques.</li>\n</ul>\n<h3 id=\"establish-protocols-and-policies\" style=\"position:relative;\"><a href=\"#establish-protocols-and-policies\" aria-label=\"establish protocols and policies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Establish Protocols and Policies</h3>\n<ul>\n<li>Develop clear protocols for handling suspected deepfake cases, including escalation procedures and incident response plans.</li>\n<li>Implement strict policies on data security and privacy to safeguard customer information.</li>\n</ul>\n<h3 id=\"monitor-and-review\" style=\"position:relative;\"><a href=\"#monitor-and-review\" aria-label=\"monitor and review permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Monitor and Review</h3>\n<ul>\n<li>Continuously monitor the effectiveness of your security measures and make adjustments as needed.</li>\n<li>Conduct regular audits and reviews to ensure compliance with industry standards and regulatory requirements.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Fortifying your digital customer onboarding process against deepfakes is an ongoing endeavor that requires a combination of advanced technology, human expertise, and proactive strategies.</p>\n<p>By understanding the deepfake threat and implementing these measures, you can create a secure onboarding environment that protects your business and builds trust with your customers.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Strengthening Digital Customer Onboarding to Combat Deep Fakes","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"July 15, 2024","updated_date":null,"tags":["customer onboarding","cx","deepfake","authentication"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/eca9d8fea305b9141a7a252773ccd7d3/49b36/deepfake.jpg","srcSet":"/static/eca9d8fea305b9141a7a252773ccd7d3/f836f/deepfake.jpg 200w,\n/static/eca9d8fea305b9141a7a252773ccd7d3/2244e/deepfake.jpg 400w,\n/static/eca9d8fea305b9141a7a252773ccd7d3/49b36/deepfake.jpg 512w","sizes":"(max-width: 512px) 100vw, 512px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/growth/protect-digital-customer-onboarding-deepfakes/"}}},{"node":{"id":"06fd35c6-8b3c-5648-b17a-8a792e7bb705","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In an era when cyber threats are becoming more frequent and sophisticated, traditional cybersecurity measures are proving insufficient both in the private and government sectors. </p>\n<p>Undoubtedly, organizations must immediately work on reinforcing cybersecurity for their users since neglecting modern threat vectors could lead to severe financial and reputational losses. </p>\n<p>Things aren't different in the government sector. Most citizens who use online services may be at risk when they share their personal information on various interconnected government platforms. </p>\n<p>The rise of <a href=\"https://www.loginradius.com/blog/identity/beginners-guide-zero-trust-security/\">Zero-Trust</a> adoption across government sectors marks a significant shift in how sensitive information and critical infrastructure are protected. </p>\n<p>This blog explores the principles of Zero-Trust architecture, its benefits, and how it is transforming government cybersecurity.</p>\n<h2 id=\"understanding-zero-trust-architecture\" style=\"position:relative;\"><a href=\"#understanding-zero-trust-architecture\" aria-label=\"understanding zero trust architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding Zero-Trust Architecture</h2>\n<p>Zero-Trust is a cybersecurity paradigm that operates on the principle of \"never trust, always verify.\" </p>\n<p>Unlike traditional security models that rely on perimeter defenses, Zero-Trust assumes that threats can originate from both outside and inside the network. Therefore, every user, device, and application attempting to access resources must undergo continuous verification.</p>\n<p>Key principles of Zero-Trust include:</p>\n<ul>\n<li><strong>Micro-Segmentation</strong>: Dividing networks into smaller, isolated segments to contain breaches and limit the lateral movement of attackers.</li>\n<li><strong>Least Privilege Access</strong>: Granting users and devices the minimal access necessary to perform their functions.</li>\n<li><strong>Continuous Monitoring and Validation</strong>: Implementing real-time monitoring and continuous authentication to promptly detect and respond to suspicious activities.</li>\n</ul>\n<h2 id=\"the-need-for-zero-trust-in-government-sector\" style=\"position:relative;\"><a href=\"#the-need-for-zero-trust-in-government-sector\" aria-label=\"the need for zero trust in government sector permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Need for Zero-Trust in Government Sector</h2>\n<p>Government agencies manage a vast amount of sensitive data, from personal citizen information to national security details.</p>\n<p>The consequences of a cyber breach can be catastrophic, impacting public trust, national security, and the economy. Traditional security measures, such as firewalls and VPNs, have proven inadequate in the face of advanced persistent threats (APTs) and insider threats.</p>\n<p>Adopting a Zero-Trust approach addresses several critical challenges:</p>\n<ul>\n<li><strong>Evolving Threat Landscape</strong>: Cyber adversaries are constantly developing new tactics to bypass conventional defenses. Zero-Trust ensures a more resilient security posture.</li>\n<li><strong>Remote Work and BYOD</strong>: The rise of remote work and the use of personal devices in government operations necessitate a <a href=\"https://www.loginradius.com/security/\">security model </a>that can handle diverse and dispersed environments.</li>\n<li><strong>Compliance and Regulations</strong>: Governments must comply with stringent data protection regulations. Zero-Trust helps ensure adherence to these standards by providing robust security controls and detailed audit trails.</li>\n</ul>\n<h2 id=\"benefits-of-zero-trust-adoption\" style=\"position:relative;\"><a href=\"#benefits-of-zero-trust-adoption\" aria-label=\"benefits of zero trust adoption permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Zero-Trust Adoption</h2>\n<p>Implementing Zero-Trust architecture in government sectors offers numerous benefits:</p>\n<ul>\n<li><strong>Enhanced Security Posture</strong>: Zero-Trust minimizes the risk of unauthorized access and data breaches by continuously verifying all access requests.</li>\n<li><strong>Improved Visibility</strong>: Zero-Trust provides comprehensive visibility into network traffic, user activity, and device behavior, enabling faster detection and response to threats.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/whitepaper/zero-trust-security-business-2/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-zero-trust-security-2\"\n        title=\"WP-zero-trust-security-2\"\n        src=\"/static/b85b0186563c870fbad8cc1339dc99ce/e5715/WP-zero-trust-security-2.png\"\n        srcset=\"/static/b85b0186563c870fbad8cc1339dc99ce/a6d36/WP-zero-trust-security-2.png 650w,\n/static/b85b0186563c870fbad8cc1339dc99ce/e5715/WP-zero-trust-security-2.png 768w,\n/static/b85b0186563c870fbad8cc1339dc99ce/81501/WP-zero-trust-security-2.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>Reduced Attack Surface</strong>: Micro-segmentation and least privilege access reduce the potential impact of a breach by limiting the reach of attackers within the network.</li>\n<li><strong>Scalability and Flexibility</strong>: Zero-Trust architecture can be adapted to various environments, including on-premises, <a href=\"https://www.loginradius.com/blog/identity/what-is-cloud-computing/\">cloud, and hybrid infrastructures</a>, making it a versatile solution for modern government IT landscapes.</li>\n</ul>\n<h2 id=\"challenges-and-considerations\" style=\"position:relative;\"><a href=\"#challenges-and-considerations\" aria-label=\"challenges and considerations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenges and Considerations</h2>\n<p>While the benefits are clear, adopting Zero-Trust is not without challenges:</p>\n<ul>\n<li><strong>Cultural Shift</strong>: Transitioning to a Zero-Trust model requires a cultural shift within government agencies, emphasizing the importance of continuous security over traditional perimeter-based defenses.</li>\n<li><strong>Resource Intensive</strong>: Implementing Zero-Trust involves significant investments in technology, training, and ongoing management.</li>\n<li><strong>Integration with Legacy Systems</strong>: Governments often rely on legacy systems that may not be compatible with modern Zero-Trust solutions. Ensuring seamless integration can be complex and time-consuming.</li>\n</ul>\n<h2 id=\"how-loginradius-zero-trust-architecture-reinforces-cybersecurity\" style=\"position:relative;\"><a href=\"#how-loginradius-zero-trust-architecture-reinforces-cybersecurity\" aria-label=\"how loginradius zero trust architecture reinforces cybersecurity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius' Zero Trust Architecture Reinforces Cybersecurity</h2>\n<p><a href=\"loginradius.com\">LoginRadius</a>, a leader in cloud-based customer identity and access management, provides a robust Zero-Trust architecture that significantly enhances cybersecurity for government agencies. </p>\n<p>By leveraging advanced authentication mechanisms, such as multi-factor authentication (MFA) and <a href=\"https://www.loginradius.com/resource/guide/enterprise-risk-based-authentication/\">risk-based adaptive authentication</a>, LoginRadius ensures that only verified users can access sensitive resources. </p>\n<p>The platform also includes comprehensive user behavior analytics, which continuously monitors and evaluates user activities to detect anomalies and potential threats in real time. Additionally, LoginRadius supports seamless integration with existing government IT infrastructures, including legacy systems, ensuring a smooth transition to a Zero-Trust model. </p>\n<p>This approach strengthens security and ensures compliance with stringent regulatory requirements, ultimately reinforcing the government's overall cybersecurity posture.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Zero-Trust architecture is revolutionizing cybersecurity in government sectors, providing a robust framework to counteract the evolving threat landscape. As cyber adversaries become more sophisticated, the need for a comprehensive, resilient, and adaptive security model has never been more critical. </p>\n<p>By embracing Zero-Trust, government agencies can better protect sensitive data, ensure compliance with regulations, and maintain the public's trust they serve.</p>\n<p>Zero trust is not just a trend but a necessary evolution in the ongoing battle against cyber threats. The journey towards full Zero-Trust implementation may be challenging, but the benefits far outweigh the obstacles, paving the way for a more secure and resilient government infrastructure.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Decoding the Rise of Zero-Trust Adoption in Government Sector","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"June 24, 2024","updated_date":null,"tags":["zero-trust security","cybersecurity","data security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.694915254237288,"src":"/static/f71db73cb95d2b1b89e7b5f546ee192c/33aa5/govt-sector.jpg","srcSet":"/static/f71db73cb95d2b1b89e7b5f546ee192c/f836f/govt-sector.jpg 200w,\n/static/f71db73cb95d2b1b89e7b5f546ee192c/2244e/govt-sector.jpg 400w,\n/static/f71db73cb95d2b1b89e7b5f546ee192c/33aa5/govt-sector.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/zero-trust-cybersecurity-government-sector/"}}},{"node":{"id":"a0ba0a75-9473-5c9e-aa00-653ad98f7883","html":"<h2 id=\"why-passkeys\" style=\"position:relative;\"><a href=\"#why-passkeys\" aria-label=\"why passkeys permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Passkeys?</h2>\n<p>Passkeys are transforming the way we approach authentication by providing a future-proof alternative to traditional password systems. Why passkeys? They offer significant passkey benefits, such as reducing the risk of phishing, eliminating password reuse, and utilizing cryptographic keys that can't be easily stolen or hacked. Unlike passwords, passkeys use a public-private key pair, with the private key securely stored on the user’s device and never exposed to external threats.</p>\n<p>For developers, implementing passkey login across your applications not only simplifies the user experience but also enhances security. The shift towards Google passkey login and Microsoft passkey login showcases how maj=or tech platforms are leading the way in adopting passwordless authentication. Developers can leverage these systems to integrate passkeys seamlessly into their existing infrastructure, offering a consistent and secure authentication method across different ecosystems.</p>\n<p>Passkeys also align with modern privacy standards and regulations, making it easier for developers to build apps that meet compliance requirements such as GDPR and CCPA. The reduced friction in how to sign in with a passkey can result in better user retention, as users no longer need to worry about managing complex passwords or resetting credentials frequently.</p>\n<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In the ever-evolving cybersecurity landscape, traditional passwords are rapidly becoming a tradition of the past. As we step into a new era of digital security, passkeys are emerging as a revolutionary solution. </p>\n<p>Imagine a world where you no longer need to remember countless complex passwords, where the frustration of password resets is a distant memory, and where your online accounts are protected by an impenetrable shield of advanced cryptographic technology. This is not a far-off dream but a reality made possible by passkeys. </p>\n<p>Passkeys promise a future where our digital lives are secured with the highest level of protection, ensuring that only you have access to your personal information. </p>\n<p>Let’s explore passkeys' transformative power and how they <a href=\"https://www.loginradius.com/blog/identity/login-security/\">redefine online security</a>. From understanding what passkeys are and how they reinforce authentication security to discussing their critical importance in today's threat landscape, and finally, examining how they lay the foundation for a robust security infrastructure through Multi-Factor Authentication (MFA), this blog will explain why passkeys are the key to unlocking the future of digital security.</p>\n<h2 id=\"passkey-authentication-vs-passwords\" style=\"position:relative;\"><a href=\"#passkey-authentication-vs-passwords\" aria-label=\"passkey authentication vs passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passkey Authentication vs. Passwords</h2>\n<p>The contrast between passkeys vs passwords highlights the limitations of traditional authentication methods. Passwords are often reused across multiple services, making them vulnerable to breaches and cyberattacks. Moreover, password management tools, while helpful, introduce additional layers of complexity for users and potential security risks if compromised. Passkeys, on the other hand, provide a cryptographically secure solution where users no longer need to remember or manage multiple passwords.</p>\n<p>For developers, the shift from passwords to passkeys means rethinking how authentication is handled. Passkeys introduce an entirely new way of securing user identities by using public and private key pairs. When a user signs in with a passkey, the service requests the public key, and only the private key stored securely on the device can respond to the challenge. This makes passkey login resistant to phishing and man-in-the-middle attacks, which are common with passwords.</p>\n<p>Passkeys also enhance the user experience across different platforms. With passkeys Apple and passkeys Android, users can authenticate using biometrics like Face ID or fingerprint recognition, adding a second layer of security. For developers, this means integrating passkey benefits directly into their apps and services, ensuring stronger protection without sacrificing convenience. The reduction in password-related support issues, such as password resets or account recovery, is another significant advantage for development teams.</p>\n<h2 id=\"is-passkey-authentication-the-same-as-passwordless-authentication\" style=\"position:relative;\"><a href=\"#is-passkey-authentication-the-same-as-passwordless-authentication\" aria-label=\"is passkey authentication the same as passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Is Passkey Authentication the Same as Passwordless Authentication?</h2>\n<p>While passkey authentication and passwordless authentication share similarities, it's essential to understand the distinction. Passwordless authentication simply means the user is not required to enter a traditional password; however, it can still involve less secure methods like magic links or one-time codes. Passkey login, by contrast, utilizes cryptographic methods, ensuring that authentication is not just passwordless but also far more secure.</p>\n<p>For example, in a Google passkey login scenario, when a user tries to sign in, they don’t enter a password. Instead, the service sends a challenge to the user's device, which is signed using the private key stored on the device. This signed response is sent back, verifying the user's identity. The same process happens with Microsoft Passkey login.</p>\n<p>Developers implementing passkeys in their applications should note the ease of adoption. How to sign in with a passkey is simplified, especially when coupled with biometrics or hardware security keys. Users on passkeys Apple or passkeys Android devices can authenticate through familiar and secure means, such as facial recognition or fingerprint scanning. For developers, integrating this technology means building more secure apps that protect users' identities without requiring passwords, reducing the attack surface for potential breaches.</p>\n<p>Adopting passkeys also strengthens Multi-Factor Authentication (MFA) strategies. Passkeys serve as one of the strongest factors in MFA, reducing the need for additional steps like SMS or email codes, which can be vulnerable to interception. By combining passkeys with biometrics or device-based authentication, developers can create robust, future-proof authentication systems that are both highly secure and user-friendly.</p>\n<h2 id=\"what-are-passkeys\" style=\"position:relative;\"><a href=\"#what-are-passkeys\" aria-label=\"what are passkeys permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are Passkeys?</h2>\n<p>Passkeys, also known as cryptographic keys or security keys, are a modern alternative to traditional passwords. Unlike passwords, which are often reused, weak, or easily compromised, passkeys provide higher security through advanced cryptographic techniques.</p>\n<h3 id=\"how-passkeys-work\" style=\"position:relative;\"><a href=\"#how-passkeys-work\" aria-label=\"how passkeys work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Passkeys Work</h3>\n<p>Passkeys function by using public and private key pairs. When you register a device or an account with a service, a unique pair of keys is generated:</p>\n<ul>\n<li><strong>Public Key:</strong> Stored on the server and used to verify your identity.</li>\n<li><strong>Private Key:</strong> Stored securely on your device and never shared.</li>\n</ul>\n<p>When you attempt to log in, the service sends a challenge that can only be answered correctly with your private key. This ensures that only you can authenticate, as the private key never leaves your device and is <a href=\"https://www.loginradius.com/blog/identity/phishing-resistant-mfa-login-mobile-apps/\">protected from phishing </a>and other attacks.</p>\n<h3 id=\"reinforcing-authentication-security\" style=\"position:relative;\"><a href=\"#reinforcing-authentication-security\" aria-label=\"reinforcing authentication security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reinforcing Authentication Security</h3>\n<p>Passkeys eliminate many vulnerabilities associated with passwords:</p>\n<ul>\n<li><strong>No Password Reuse:</strong> Since there are no passwords, the risk of reusing weak or compromised passwords across multiple sites is eradicated.</li>\n<li><strong>Resistant to Phishing:</strong> Phishing attacks are ineffective because there is no password to steal.</li>\n<li><strong>Strong Cryptography:</strong> Passkeys use robust cryptographic algorithms, making them difficult to crack.</li>\n</ul>\n<h2 id=\"why-passkeys-are-now-crucial-more-than-ever-before\" style=\"position:relative;\"><a href=\"#why-passkeys-are-now-crucial-more-than-ever-before\" aria-label=\"why passkeys are now crucial more than ever before permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Passkeys Are Now Crucial More Than Ever Before</h2>\n<p>The need for passkeys has never been more urgent. The digital world is expanding rapidly, and with it, the threats to online security are becoming more sophisticated.</p>\n<h3 id=\"increasing-cyber-threats\" style=\"position:relative;\"><a href=\"#increasing-cyber-threats\" aria-label=\"increasing cyber threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Increasing Cyber Threats</h3>\n<p>Cybercriminals are continuously developing new methods to breach security systems. Traditional passwords, even with complexity requirements, are often not enough to protect against these evolving threats. Data breaches, phishing attacks, and credential stuffing are becoming more common, highlighting the need for a more secure authentication method.</p>\n<h3 id=\"regulatory-compliance\" style=\"position:relative;\"><a href=\"#regulatory-compliance\" aria-label=\"regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Regulatory Compliance</h3>\n<p>Regulatory bodies worldwide are enforcing stricter data protection laws. Compliance with regulations like <a href=\"https://www.loginradius.com/customer-privacy/\">GDPR and CCPA</a> often requires implementing stronger security measures, including advanced authentication methods. Passkeys align well with these requirements, providing a robust solution that helps organizations meet compliance standards.</p>\n<h3 id=\"user-convenience\" style=\"position:relative;\"><a href=\"#user-convenience\" aria-label=\"user convenience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Convenience</h3>\n<p>In addition to enhanced security, passkeys offer greater convenience for users. The need to remember and manage multiple passwords is eliminated, leading to a smoother and more user-friendly authentication experience. This ease of use encourages adoption and helps maintain high-security standards without compromising user experience.</p>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/passwordless-login-magic-link-otp/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABvElEQVQY00WQz0uTcRzHH3u2Z1tNnc/ceMYen63tebalc4oun2zVoUSCDh5EaqeiiBj2i6BT0CEo6NAhyH4e6hDmwXSVGUpO02DUpVtB9BdEyHKU0sFXXx+CPvA6vC8v3u+P5LMK+Mx+/OkCTZl9NKb6abT2CGz85m68sS4UvVPQgVtLo4gcyB6gOd6Juy2LrFnIwRiuoIGs6kjbUwWURB/nr4/xeGaFB1MLPCovOozPLtMzOIIUsvDoWZRIBl+ih2jfIGn7EJ5d+3EZOdytxn+hz9qLJ2lz4cZ9xiYXuD0xx73pJSbefqD66TP2kSJS0ESJtuOP5win87Sa3ajJLrRUNyEzRyDejkttQ26JInnFXI9oOHrtDreeznLzyQvuTlZ4+LJCeblK/vAxp6FXTHZpKeSwhSqEeoeNlsnjDu9kW4vutHOEW/+TY72U55bY3ITvP1ZZra3xc+0Xvzf+cHD4hCOUmgxKl6/y5es3pl7PM/78Fc+mZ1ipfmS+8o4dkSRSs/ZPaPTyZvE9W1er1ajX62ysrzt5YEQI1QQNIZP8wBBnLl2hePocR0+dFYxyvHSR4skSSihGQyDCX1CA7hWsLTQZAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-pswrdless-login-magic-link\"\n        title=\"DS-pswrdless-login-magic-link\"\n        src=\"/static/080d729534ed7c510139db40ae1aefa4/e5715/DS-pswrdless-login-magic-link.png\"\n        srcset=\"/static/080d729534ed7c510139db40ae1aefa4/a6d36/DS-pswrdless-login-magic-link.png 650w,\n/static/080d729534ed7c510139db40ae1aefa4/e5715/DS-pswrdless-login-magic-link.png 768w,\n/static/080d729534ed7c510139db40ae1aefa4/81501/DS-pswrdless-login-magic-link.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-mfa-with-passkeys-helps-lay-the-foundation-of-a-robust-security-infrastructure\" style=\"position:relative;\"><a href=\"#how-mfa-with-passkeys-helps-lay-the-foundation-of-a-robust-security-infrastructure\" aria-label=\"how mfa with passkeys helps lay the foundation of a robust security infrastructure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How MFA with Passkeys Helps Lay the Foundation of a Robust Security Infrastructure</h2>\n<p>Multi-factor authentication (MFA) has long been a cornerstone of strong security practices. <a href=\"https://www.loginradius.com/multi-factor-authentication/\">Integrating passkeys into MFA</a> frameworks further enhances their effectiveness.</p>\n<h3 id=\"strengthening-mfa\" style=\"position:relative;\"><a href=\"#strengthening-mfa\" aria-label=\"strengthening mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Strengthening MFA</h3>\n<p>Passkeys add an extra layer of security to MFA by providing a secure and seamless authentication factor. When combined with other factors such as biometrics (fingerprint or facial recognition) or a secondary device, passkeys significantly reduce the risk of unauthorized access.</p>\n<h3 id=\"example-of-passkey-enabled-mfa\" style=\"position:relative;\"><a href=\"#example-of-passkey-enabled-mfa\" aria-label=\"example of passkey enabled mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Example of Passkey-Enabled MFA</h3>\n<p>Consider a scenario where you are logging into a sensitive application:</p>\n<ol>\n<li><strong>First Factor:</strong> Enter your username.</li>\n<li><strong>Second Factor:</strong> Use a <a href=\"https://www.loginradius.com/blog/identity/biometric-multi-factor-authentication/\">biometric scan</a> (fingerprint or facial recognition) on your device.</li>\n<li><strong>Third Factor:</strong> The application sends a challenge to your device, which is signed using your private key (passkey).</li>\n</ol>\n<p>This multi-layered approach ensures that only you can access your account, even if one factor is compromised.</p>\n<h3 id=\"future-proof-security\" style=\"position:relative;\"><a href=\"#future-proof-security\" aria-label=\"future proof security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Future-Proof Security</h3>\n<p>Adopting passkeys as part of your MFA strategy ensures your security infrastructure is prepared for future threats. </p>\n<p>As cyber-attacks become more sophisticated, having a <a href=\"loginradius.com\">robust and adaptable authentication system</a> in place is critical. Passkeys provide the flexibility and strength needed to withstand these challenges, making them a key component of any forward-looking security strategy.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Passkeys are paving the way for a more secure and user-friendly digital world as we move away from traditional passwords. </p>\n<p>Organizations and individuals alike can embrace this revolutionary technology by understanding passkeys, why they are crucial, and how they can be integrated into a robust security infrastructure. Say goodbye to passwords and hello to a safer, more secure online experience.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is a passkey?</strong></p>\n<p>A passkey is a cryptographic key pair used for secure authentication, replacing traditional passwords. It ensures only the device with the private key can verify a user's identity.</p>\n<p><strong>2. What are the use cases for passkeys?</strong></p>\n<p>Passkeys are ideal for securing online accounts, enhancing app authentication, and improving the login process for web services across platforms like Google, Apple, and Microsoft.</p>\n<p><strong>3. How does a user experience passkeys?</strong></p>\n<p>Users experience passkeys by signing in without passwords, typically using biometrics (fingerprint or facial recognition) on devices like smartphones or laptops for seamless authentication.</p>\n<p><strong>4. Why are passkeys better than passwords?</strong></p>\n<p>Passkeys eliminate common password vulnerabilities, such as reuse and phishing, by using cryptographic keys that never leave the user’s device, making them far more secure.</p>\n<p><strong>5. Are passkeys considered MFA?</strong></p>\n<p>Yes, passkeys can be part of Multi-Factor Authentication (MFA) when combined with another factor, such as biometrics or a security token, for added security.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Say Goodbye to Passwords: How Passkeys Are Reinventing Online Security","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"June 20, 2024","updated_date":null,"tags":["online security","passwordless login","compliance"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/a348165602ba419acb5957b3e69ff8fc/33aa5/passkey.jpg","srcSet":"/static/a348165602ba419acb5957b3e69ff8fc/f836f/passkey.jpg 200w,\n/static/a348165602ba419acb5957b3e69ff8fc/2244e/passkey.jpg 400w,\n/static/a348165602ba419acb5957b3e69ff8fc/33aa5/passkey.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/online-security-passkeys/"}}},{"node":{"id":"49f4c623-bc2e-5064-9535-e23a1f07d5e6","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In today's digital landscape, security threats are ever-evolving, posing significant risks to businesses and their customers. </p>\n<p>At LoginRadius, we recognize the critical importance of staying ahead of these threats. Our proactive stance is not just about reacting to incidents but anticipating potential vulnerabilities and addressing them before they can be exploited. </p>\n<p>We understand that the trust our clients place in us is paramount, and this trust hinges on our ability to provide a secure and resilient <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">identity management</a> solution.</p>\n<p>Our commitment to proactive security measures and responsible disclosure is a testament to our dedication to safeguarding our clients' data and enhancing their overall security posture.</p>\n<h2 id=\"understanding-proactive-security-measures\" style=\"position:relative;\"><a href=\"#understanding-proactive-security-measures\" aria-label=\"understanding proactive security measures permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding Proactive Security Measures</h2>\n<p>Proactive security measures involve anticipating potential threats and addressing vulnerabilities before they can be exploited. </p>\n<p>This approach is fundamental in<a href=\"https://www.loginradius.com/customer-security/\"> creating a robust security framework</a> that defends against known threats and mitigates risks associated with emerging vulnerabilities. </p>\n<p>At LoginRadius, we integrate proactive security measures into every aspect of our operations, ensuring that our clients can trust the integrity and safety of our services.</p>\n<h2 id=\"the-role-of-responsible-disclosure\" style=\"position:relative;\"><a href=\"#the-role-of-responsible-disclosure\" aria-label=\"the role of responsible disclosure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Responsible Disclosure</h2>\n<p>Responsible disclosure is a critical component of our security strategy. It involves the timely identification, reporting, and remediation of security vulnerabilities by collaborating with the cybersecurity community, including ethical hackers, researchers, and other stakeholders. </p>\n<p>This collaborative effort helps us maintain high security and transparency, reinforcing our commitment to protecting our clients' sensitive information. </p>\n<h2 id=\"how-loginradius-implements-proactive-security-and-responsible-disclosure\" style=\"position:relative;\"><a href=\"#how-loginradius-implements-proactive-security-and-responsible-disclosure\" aria-label=\"how loginradius implements proactive security and responsible disclosure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Implements Proactive Security and Responsible Disclosure</h2>\n<h3 id=\"1-regular-security-audits-and-penetration-testing\" style=\"position:relative;\"><a href=\"#1-regular-security-audits-and-penetration-testing\" aria-label=\"1 regular security audits and penetration testing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Regular Security Audits and Penetration Testing</h3>\n<p>At LoginRadius, we conduct regular security audits and penetration tests to identify and address system vulnerabilities. </p>\n<p>These assessments are carried out by both internal security teams and external experts, ensuring a comprehensive evaluation of our security posture. By continuously testing our defenses before they are exploited, we can proactively address potential weaknesses.</p>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/consumer-audit-trail-information/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-LR-consumer-audit-trail\"\n        title=\"DS-LR-consumer-audit-trail\"\n        src=\"/static/cb62a00a6d3359f1f12117d11756ddf3/e5715/DS-LR-consumer-audit-trail.png\"\n        srcset=\"/static/cb62a00a6d3359f1f12117d11756ddf3/a6d36/DS-LR-consumer-audit-trail.png 650w,\n/static/cb62a00a6d3359f1f12117d11756ddf3/e5715/DS-LR-consumer-audit-trail.png 768w,\n/static/cb62a00a6d3359f1f12117d11756ddf3/81501/DS-LR-consumer-audit-trail.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"2-timely-security-updates-and-patches\" style=\"position:relative;\"><a href=\"#2-timely-security-updates-and-patches\" aria-label=\"2 timely security updates and patches permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Timely Security Updates and Patches</h3>\n<p>When vulnerabilities are identified, our team acts swiftly to develop and deploy security updates and patches. By addressing these issues promptly, we minimize the window of opportunity for malicious actors to exploit them. </p>\n<p>Our clients are kept informed about critical updates and are provided with clear instructions on how to implement them, ensuring their systems remain secure.</p>\n<h3 id=\"3-comprehensive-employee-training\" style=\"position:relative;\"><a href=\"#3-comprehensive-employee-training\" aria-label=\"3 comprehensive employee training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Comprehensive Employee Training</h3>\n<p>Security is a collective responsibility that extends beyond our IT department. We provide comprehensive security training to all our employees, ensuring they understand the importance of proactive security measures and responsible disclosure. </p>\n<p>This training includes best practices for identifying and reporting potential security issues fostering a security-conscious culture throughout our organization.</p>\n<h3 id=\"4-bug-bounty-programs\" style=\"position:relative;\"><a href=\"#4-bug-bounty-programs\" aria-label=\"4 bug bounty programs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Bug Bounty Programs</h3>\n<p>We have established a <a href=\"https://www.loginradius.com/bug-bounty/\">bug bounty program</a> that incentivizes ethical hackers to identify and report security flaws in our platform. </p>\n<p>This program not only helps us uncover vulnerabilities that might have been overlooked but also fosters a culture of transparency and collaboration within the cybersecurity community. Participants in our bug bounty program are rewarded for their efforts, which encourage ongoing engagement and contribution to our security initiatives.</p>\n<h3 id=\"5-transparent-communication-with-clients\" style=\"position:relative;\"><a href=\"#5-transparent-communication-with-clients\" aria-label=\"5 transparent communication with clients permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Transparent Communication with Clients</h3>\n<p>Transparency is key to building trust with our clients. We maintain open lines of communication, providing regular updates on our security initiatives and any identified vulnerabilities. </p>\n<p>Our clients are informed about the steps we are taking to address security issues, ensuring they are aware of our commitment to protecting their data.</p>\n<h2 id=\"the-impact-of-proactive-security-and-responsible-disclosure\" style=\"position:relative;\"><a href=\"#the-impact-of-proactive-security-and-responsible-disclosure\" aria-label=\"the impact of proactive security and responsible disclosure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Impact of Proactive Security and Responsible Disclosure</h2>\n<p>Our proactive approach to security and commitment to responsible disclosure has yielded significant benefits for our clients and our organization. </p>\n<p>These measures have helped us maintain a strong security posture, reducing the <a href=\"https://www.loginradius.com/blog/identity/how-to-handle-data-breaches/\">risk of data breaches</a> and other security incidents. Moreover, our collaborative efforts with the cybersecurity community have enhanced our ability to quickly identify and address emerging threats, ensuring that our clients' data remains protected.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>At LoginRadius, we understand that security is an ongoing journey, not a destination. Our proactive security measures and commitment to responsible disclosure reflect our dedication to providing a <a href=\"https://www.loginradius.com/\">secure and reliable CIAM solution</a> for our clients. </p>\n<p>By staying ahead of potential threats and fostering a culture of transparency and collaboration, we are able to deliver the highest level of security for our customers, ensuring their trust and confidence in our services.</p>\n<p>In a world where digital threats are constantly evolving, LoginRadius stands as a beacon of proactive security, demonstrating that a vigilant and responsible approach is essential for safeguarding the digital identities of businesses and their customers.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"LoginRadius' Commitment to Responsible Disclosure For Customer Security","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"June 13, 2024","updated_date":null,"tags":["data security","digital identity management","ciam solution"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/3ba6b716163c52922cfae08651b0ecc5/33aa5/customer-security.jpg","srcSet":"/static/3ba6b716163c52922cfae08651b0ecc5/f836f/customer-security.jpg 200w,\n/static/3ba6b716163c52922cfae08651b0ecc5/2244e/customer-security.jpg 400w,\n/static/3ba6b716163c52922cfae08651b0ecc5/33aa5/customer-security.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/growth/lr-commitment-customer-security/"}}},{"node":{"id":"2b99763e-40d7-5a3c-9935-89623df60f29","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Despite the rapid advancements in technology and organizations' efforts to deliver seamless user experiences, the gap between these advancements and the security measures to counter sophisticated attacks is widening, often leading to inadequate security. </p>\n<p>And increasingly sophisticated identity-based attacks that impact customers’ privacy and eventually compromise sensitive business details are becoming increasingly common. </p>\n<p>However, what’s even worse is that cybercriminals are now planning targeted attacks and are always on the lookout for customer identities that can be exploited for personal gains. </p>\n<p>Identity-based attacks have emerged as one of the most formidable threats to individuals, businesses, and governments. </p>\n<p>These attacks exploit vulnerabilities in how identities are managed and authenticated, posing significant risks to personal data, corporate secrets, and national security. To combat these threats effectively, there is an urgent need for an <a href=\"https://www.loginradius.com/security/\">advanced\nidentity security approach</a> that goes beyond traditional methods.</p>\n<h2 id=\"the-rise-of-identity-based-attacks\" style=\"position:relative;\"><a href=\"#the-rise-of-identity-based-attacks\" aria-label=\"the rise of identity based attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Rise of Identity-Based Attacks</h2>\n<p>Identity-based attacks include a broad spectrum of malicious activities such as phishing, credential stuffing, identity theft, and social engineering. The sophistication and frequency of these attacks have been on the rise, driven by several factors:</p>\n<ol>\n<li><strong>Digital Transformation</strong>: As organizations embrace digital transformation, they increasingly rely on cloud services, mobile applications, and remote work environments. This expanded digital footprint creates more entry points for attackers.</li>\n<li><strong>Data Breaches</strong>: Massive data breaches have resulted in the widespread availability of stolen credentials on the dark web. Cybercriminals use these credentials to launch attacks against various targets.</li>\n<li><strong>Sophisticated Attack Techniques</strong>: Attackers employ advanced techniques such as AI-driven phishing campaigns, <a href=\"https://www.loginradius.com/blog/identity/how-to-identity-mitigate-deepfake-attacks/\">deepfake technology</a>, and multi-stage attacks that combine various methods to compromise identities.</li>\n</ol>\n<h3 id=\"the-impact-of-identity-based-attacks\" style=\"position:relative;\"><a href=\"#the-impact-of-identity-based-attacks\" aria-label=\"the impact of identity based attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>The Impact of Identity-Based Attacks</strong></h3>\n<p>The consequences of identity-based attacks are profound and far-reaching:</p>\n<ul>\n<li><strong>Financial Loss</strong>: Organizations face significant financial losses due to fraud, regulatory fines, and the costs associated with breach recovery and identity theft mitigation.</li>\n<li><strong>Reputational Damage</strong>: Companies suffer reputational harm, losing customer trust and market value after a breach.</li>\n<li><strong>Operational Disruption</strong>: Identity-based attacks can disrupt business operations, leading to downtime and reduced productivity.</li>\n<li><strong>National Security Risks</strong>: For governments, identity-based attacks can compromise sensitive information, threaten critical infrastructure, and undermine national security.</li>\n</ul>\n<h2 id=\"traditional-security-measures-fall-short\" style=\"position:relative;\"><a href=\"#traditional-security-measures-fall-short\" aria-label=\"traditional security measures fall short permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Traditional Security Measures Fall Short</h2>\n<p>Traditional security measures, such as passwords and two-factor authentication (2FA), are increasingly inadequate in the face of sophisticated identity-based attacks. </p>\n<p>Passwords are often weak, reused, and easily compromised. While 2FA adds a layer of security, it can still be vulnerable to phishing and social engineering tactics.</p>\n<h2 id=\"the-need-for-an-advanced-identity-security-approach\" style=\"position:relative;\"><a href=\"#the-need-for-an-advanced-identity-security-approach\" aria-label=\"the need for an advanced identity security approach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Need for an Advanced Identity Security Approach</h2>\n<p>To address the growing threat of identity-based attacks, organizations must adopt an advanced identity security approach that incorporates the following elements:</p>\n<ol>\n<li><strong>Zero Trust Architecture</strong>: Zero Trust assumes that no entity, whether inside or outside the network, should be trusted by default. It requires continuous verification of identities and strict access controls based on the principle of least privilege.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/whitepaper/zero-trust-security-modern-business/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-zero-trust-security\"\n        title=\"WP-zero-trust-security\"\n        src=\"/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-security.png\"\n        srcset=\"/static/1899738346b212558cc624397cb31d32/a6d36/WP-zero-trust-security.png 650w,\n/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-security.png 768w,\n/static/1899738346b212558cc624397cb31d32/81501/WP-zero-trust-security.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ol start=\"2\">\n<li><strong>Multi-Factor Authentication (MFA)</strong>: MFA should be implemented with robust factors beyond SMS-based verification, such as biometrics, hardware tokens, and adaptive authentication that assesses risk based on user behavior and context.</li>\n<li><strong>Identity and Access Management (IAM)</strong>: <a href=\"https://www.loginradius.com/\">Modern CIAM solutions</a> provide centralized control over user identities and access permissions, ensuring that only authorized users can access critical resources.</li>\n<li><strong>Behavioral Analytics</strong>: Leveraging machine learning and AI, behavioral analytics can detect anomalies in user behavior that may indicate compromised identities, allowing for real-time threat detection and response.</li>\n<li><strong>Continuous Monitoring and Threat Intelligence</strong>: Continuous monitoring of identity-related activities and integrating threat intelligence can help organizations avoid emerging threats and quickly respond to suspicious activities.</li>\n<li><strong>User Education and Awareness</strong>: Regular training and awareness programs can equip users with the knowledge to recognize and respond to <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing attempts</a> and other identity-based threats.</li>\n</ol>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>The growing threat of identity-based attacks necessitates a paradigm shift in approaching identity security. </p>\n<p>By adopting an advanced identity security approach that emphasizes Zero Trust, robust MFA, CIAM, behavioral analytics, continuous monitoring, and user education, organizations can significantly enhance their defenses against these pervasive threats. </p>\n<p>As cybercriminals continue to evolve their tactics, staying ahead requires a proactive and comprehensive strategy that prioritizes identity security at every level.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"The Growing Threat of Identity-Based Attacks and the Need for an Advanced Identity Security Approach","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"June 05, 2024","updated_date":null,"tags":["identity security","zero trust security","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/50fa65f4ddf24a673d0fa054a36cf937/33aa5/identity-attacks.jpg","srcSet":"/static/50fa65f4ddf24a673d0fa054a36cf937/f836f/identity-attacks.jpg 200w,\n/static/50fa65f4ddf24a673d0fa054a36cf937/2244e/identity-attacks.jpg 400w,\n/static/50fa65f4ddf24a673d0fa054a36cf937/33aa5/identity-attacks.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/advanced-identity-security-based-attacks/"}}},{"node":{"id":"65f45091-c0d4-50b1-bce9-257f1ff3862b","html":"<p>LoginRadius is one of the leading and technologically advanced Customer Identity and Access Management (CIAM) solutions. Enterprise customers rely on our CIAM to manage end-user authentication and authorization. They typically serve hundreds of thousands to millions of end-users, making our CIAM a critical part of their IT infrastructure and value delivery.</p>\n<p>Our backend consists of multiple microservices handling various identity and access management functions and workflows through APIs. And we use MongoDB as persistent storage for configuration data. For faster access and availability of this data, we deployed Redis in-memory cache through Redis Enterprise Cloud.</p>\n<h2 id=\"challenges-with-cache-updates\" style=\"position:relative;\"><a href=\"#challenges-with-cache-updates\" aria-label=\"challenges with cache updates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenges with Cache Updates</h2>\n<p>We had our configuration cache set up in Redis Cloud. And to reduce the Redis Cloud latency, we kept the configuration cache at the application level in memory — but we ran into problems.</p>\n<p>Generally, customers don’t update their configurations so frequently. But when a customer updates their configuration, it doesn’t propagate in the backend until the server memory cache is purged — sometimes even taking several hours.</p>\n<p><em>This is bad for business:</em> A customer updates configurations in response to a new requirement or rapidly changing business environment. If these changes take so much time for a digital identity process, it can affect end-users and, in turn, business outcomes. Simply imagine that a customer updated app configuration to accommodate a one-time flash sale, and end-users can’t place orders properly due to configuration update issues!</p>\n<p>So, we started evaluating various options to address these issues. We considered running multiple instances in the Redis Cloud and synchronizing them to minimize latency for all regions while ensuring customer configuration updates go live immediately. But this proved to be technically cumbersome and costly.</p>\n<p>We continued our research with various solutions and concluded that AWS ElastiCache for Redis best serves our needs.</p>\n<h2 id=\"migrating-to-aws-elasticache-for-redis\" style=\"position:relative;\"><a href=\"#migrating-to-aws-elasticache-for-redis\" aria-label=\"migrating to aws elasticache for redis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Migrating to AWS ElastiCache for Redis</h2>\n<p>AWS provides ElastiCache for Redis as a Redis Cloud alternative with all necessary capabilities. Also, we were already using AWS Cloud for some of our IT infrastructure needs.\nSo, we can deploy ElastiCache alongside the same infrastructure to solve the latency issues.</p>\n<p>Accordingly, we have created ElastiCache instances in multiple AWS regions and set up the primary ElastiCache DB to quickly sync configuration updates in the secondary ElastiCache instances. Also, we deployed ElastiCache instances in multiple locations as needed.</p>\n<p>For migration, we updated the old Redis and ElastiCache primary instances simultaneously. Once we reached a sufficient confidence level with the new setup, we completely switched over to ElastiCache.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Our applications and cache are deployed in AWS, so our API response latency is no longer problematic. Ultimately, we can reduce application in memory cache updates to a few minutes or seconds as required.</p>\n<p>Now customers get updated configurations deployed rapidly, solving our primary challenge!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Breaking Down the Decision: Why We Chose AWS ElastiCache Over Redis Cloud","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"August 09, 2023","updated_date":null,"tags":["Cache","AWS","Redis","LoginRadius"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f73d944745cd7f94227e1f20e4214968/14b42/migrating-to-aws-elasticache-for-redis.jpg","srcSet":"/static/f73d944745cd7f94227e1f20e4214968/f836f/migrating-to-aws-elasticache-for-redis.jpg 200w,\n/static/f73d944745cd7f94227e1f20e4214968/2244e/migrating-to-aws-elasticache-for-redis.jpg 400w,\n/static/f73d944745cd7f94227e1f20e4214968/14b42/migrating-to-aws-elasticache-for-redis.jpg 800w,\n/static/f73d944745cd7f94227e1f20e4214968/47498/migrating-to-aws-elasticache-for-redis.jpg 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/smart-cache-redis-cloud-aws-elasticache-for-redis/"}}},{"node":{"id":"8420cb9b-649e-597f-aa9d-884ddd1963e6","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>As a developer, I like to work on the terminal. Many developers are the same way. Instead of scrolling, clicking the mouse, they prefer working with only keywords (through commands or shortcuts). The command-line interface (CLI) is a great tool for them.</p>\n<p>So, LoginRadius has launched a CLI for its enterprise dashboard. The CLI makes it easier by using some commands to perform different operations and manage the flow of the LoginRadius Enterprise dashboard.</p>\n<h2 id=\"the-idea-behind-loginradius-cli\" style=\"position:relative;\"><a href=\"#the-idea-behind-loginradius-cli\" aria-label=\"the idea behind loginradius cli permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Idea Behind LoginRadius CLI</h2>\n<p>We always look for ways to eliminate resistance from the process of working with LoginRadius. Therefore, we have taken this step to introduce LoginRadius CLI for a better developer experience.</p>\n<p>In the 1970s and 1980s, most users preferred to use command-line interfaces. As time passed, we shifted to graphical user interfaces. GUIs are user-friendly; however, CLIs are faster than GUIs. Here is an example of adding domain via Admin Console v/s CLI :</p>\n<p>To add a domain through LoginRadius Admin Console, you need to:  \\</p>\n<ol>\n<li>Navigate it to Web Apps in LoginRadius Admin Console</li>\n<li>Click on Add </li>\n<li>Enter the domain </li>\n<li>Click on Save</li>\n</ol>\n<p>On the flip side, you can do this by running a single command:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 489px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 37.01431492842536%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cl-1\"\n        title=\"cl-1\"\n        src=\"/static/7f11c250ddbc8de781684571ea14f348/03e1f/cl-1.png\"\n        srcset=\"/static/7f11c250ddbc8de781684571ea14f348/03e1f/cl-1.png 489w\"\n        sizes=\"(max-width: 489px) 100vw, 489px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Here are some more of LoginRadius CLI Enterprise's commands:</strong></p>\n<p><strong>1. Login/Logout to your LoginRadius Dashboard</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 729px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 36.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAHCAYAAAAIy204AAAACXBIWXMAABJ0AAASdAHeZh94AAABKUlEQVQoz5WRTW7CMBBGc4AKCokJAYoJJCQxSew4f4SqUqUueoGKRdtblJ7/69gr2kUlFk/jkT1vRmOn38V47TmWHQebB5j5xPw2/GCB8WSK7vQERzxwNGIJlgZwZz4Y4d2IkY7vJ6jaI5wF3yBYb3HICqzWHFOP/XrsspnlOv8rZP7cCmXdwcnEAXXToB8GyEojyQQKqVDpGiIvoLRGqSrESWqjJEzNge72aYailDa6jKHULZxtFJNAou16KBIqEpVKIdoneP/4xNflQnzj7XxGTsWmsRHqukHbH62woVozuRXu4hglTWSkpmtC3USe4zickAqBYLmyC3dpFWYdE9ej6NmzhXIjuxuNkEsNJ04F+DayrMOdjRsipMmvc/4PYbTHiv7i8fkFPxRExSJAJiIiAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cl-2\"\n        title=\"cl-2\"\n        src=\"/static/ffdfc7286c5e6e8f036abc5b8b24014d/b2982/cl-2.png\"\n        srcset=\"/static/ffdfc7286c5e6e8f036abc5b8b24014d/a6d36/cl-2.png 650w,\n/static/ffdfc7286c5e6e8f036abc5b8b24014d/b2982/cl-2.png 729w\"\n        sizes=\"(max-width: 729px) 100vw, 729px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>This command (<em>lr login</em>) will help you to login to your LoginRadius Enterprise Dashboard. Once logged in, you can perform other operations and configure your LoginRadius Application through CLI.</p>\n<p><strong>2. Manage Application Credentials</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.92307692307693%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cl-3\"\n        title=\"cl-3\"\n        src=\"/static/34e18ed3bfd4b0b652b57859a93e640c/e5715/cl-3.png\"\n        srcset=\"/static/34e18ed3bfd4b0b652b57859a93e640c/a6d36/cl-3.png 650w,\n/static/34e18ed3bfd4b0b652b57859a93e640c/e5715/cl-3.png 768w,\n/static/34e18ed3bfd4b0b652b57859a93e640c/b5dee/cl-3.png 1237w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>You can get our App Credentials, reset Secret key, update account password and generate SOTT through LoginRadius CLI.</p>\n<p><strong>Set Schema for Your LoginRadius Application</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 87.23076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"4\"\n        title=\"4\"\n        src=\"/static/5d4ff2be787674cb2336d3f81c30c84f/e5715/4.png\"\n        srcset=\"/static/5d4ff2be787674cb2336d3f81c30c84f/a6d36/4.png 650w,\n/static/5d4ff2be787674cb2336d3f81c30c84f/e5715/4.png 768w,\n/static/5d4ff2be787674cb2336d3f81c30c84f/29007/4.png 1600w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>This command will help you set the schema for your application. We can get all the basic fields via <em>lr get schema</em> we can update the schema via lr set schema. </p>\n<p><strong>Theme Management (LoginRadius Page)</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cl-5\"\n        title=\"cl-5\"\n        src=\"/static/ae4f8c15a6b68f1854a276973dd4fd7a/e5715/cl-5.png\"\n        srcset=\"/static/ae4f8c15a6b68f1854a276973dd4fd7a/a6d36/cl-5.png 650w,\n/static/ae4f8c15a6b68f1854a276973dd4fd7a/e5715/cl-5.png 768w,\n/static/ae4f8c15a6b68f1854a276973dd4fd7a/f680b/cl-5.png 1108w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>You can update the LoginRadius IDX Page(Hosted Page) from the available themes through LoginRadius CLI commands.  </p>\n<p><strong>Learn More LoginRadius CLI Enterprise Commands</strong></p>\n<p>Run  lr – help for available commands. For more details about commands please check out the <a href=\"https://opensource.loginradius.com/cli/manual/\">documentation</a>.</p>\n<h2 id=\"try-it-out\" style=\"position:relative;\"><a href=\"#try-it-out\" aria-label=\"try it out permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Try It Out</h2>\n<p>The LoginRadius CLI is available for Windows, Linux, and MacOS. <a href=\"https://github.com/LoginRadius/lr-cli/tree/main#readme\">Check out the installation instructions for your Operating System on our README Page</a>.</p>\n<p>We hope you will love trying LoginRadius CLI for Enterprise Dashboard. We will add and explore more features in the future. Needless to say, for developers who like working with terminals and prefer to type commands, LoginRadius CLI will be a great experience.</p>\n<p>We are eager to know your feedback, test cases and also what we can bring up next in our CLI. If you have any suggestions, please create an issue on our <a href=\"https://github.com/LoginRadius/lr-cli/issues\">open source github repository</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"LoginRadius Launches a CLI for Enterprise Dashboard","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"January 16, 2023","updated_date":null,"tags":["enterprise","admin console","developers"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4598540145985401,"src":"/static/1887b01a9c110cfa79272e2995bcd767/ee604/cli-1.png","srcSet":"/static/1887b01a9c110cfa79272e2995bcd767/69585/cli-1.png 200w,\n/static/1887b01a9c110cfa79272e2995bcd767/497c6/cli-1.png 400w,\n/static/1887b01a9c110cfa79272e2995bcd767/ee604/cli-1.png 800w,\n/static/1887b01a9c110cfa79272e2995bcd767/a8378/cli-1.png 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/loginradius-launches-cli-enterprise-dashboard/"}}},{"node":{"id":"c70129fd-4709-5c3c-8cef-506212098a48","html":"<p>There are many use cases of a system where machine-to-machine (M2M) communication is required, or you need to manage access for internal and external APIs. The example of M2M communications are:</p>\n<ul>\n<li>Service to service</li>\n<li>Daemon to backend</li>\n<li>CLI client to internal service</li>\n<li>IoT tools authorization</li>\n<li>External APIs authorization</li>\n</ul>\n<p>In such cases, the generic authentication methods such as email/password and social login — requiring human intervention — don’t fit well. These interactions also need a secure and easy-to-use authorization process for permission-based data access.</p>\n<p>M2M Authorization fulfills both these requirements. Let’s know more about what it is and how it works.</p>\n<h2 id=\"what-is-m2m-authorization\" style=\"position:relative;\"><a href=\"#what-is-m2m-authorization\" aria-label=\"what is m2m authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is M2M Authorization?</h2>\n<p>M2M Authorization is the process of providing remote systems with secure access to information. Using this process, business systems can communicate autonomously and execute business functions based on predefined authorization.</p>\n<p>It is exclusively used for scenarios in which a business system authenticates and authorizes a service rather than a user.</p>\n<p>LoginRadius M2M Authorization uses the <a href=\"#client-credentials-grant-flow\">Client Credentials Grant Flow</a> (defined in OAuth 2.0 RFC 6749), in which the client passes along secure credentials to authenticate themselves and receive an authorization token.</p>\n<h2 id=\"how-loginradius-m2m-authorization-works\" style=\"position:relative;\"><a href=\"#how-loginradius-m2m-authorization-works\" aria-label=\"how loginradius m2m authorization works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius M2M Authorization Works</h2>\n<p>Suppose an organization has a microservices environment consisting of multiple services running locally. The organization also has data storage on a different network and requires:</p>\n<ul>\n<li>One service to archive data to that storage at regular intervals</li>\n<li>Another service to read data from that storage at regular intervals</li>\n</ul>\n<p>As a standard process and security measure, services require authorization while saving and reading the data to and from the storage. The organization can use LoginRadius for autonomous authorization by creating two dedicated M2M apps with write and read permissions.</p>\n<p>The following two scenarios explain how you can use LoginRadius M2M Authentication and Authorization to share permission-based access of APIs to any internal or external systems:</p>\n<blockquote>\n<p><strong>Important:</strong> M2M App referred to in the scenarios below must be created individually for each internal or external system you want to grant access to. Upon app creation, you receive the Client Id and Client Secret.</p>\n</blockquote>\n<p><strong><a href=\"#implement-m2m-authorization-with-loginradius-apis\">Scenario 1</a>:</strong> To grant desired access to your LoginRadius Management APIs.</p>\n<p>To start using the M2M Authorization for this scenario, you need to create an M2M App and define the desired scope of API(s), as <a href=\"https://www.loginradius.com/docs/api/v2/single-sign-on/Machine-to-Machine/overview/#adminconsoleconfigurationformmauthentication3\">explained here</a>.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 417px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 122.78177458033572%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Manage Machine to Machine App\"\n        title=\"Manage Machine to Machine App\"\n        src=\"/static/1e60d54fd37696feeaa54f36f5eb455c/f27fb/manage-machine-to-machine-app.png\"\n        srcset=\"/static/1e60d54fd37696feeaa54f36f5eb455c/f27fb/manage-machine-to-machine-app.png 417w\"\n        sizes=\"(max-width: 417px) 100vw, 417px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong><a href=\"#implement-m2m-authorization-with-business-apis\">Scenario 2</a>:</strong> To grant desired access to your Business APIs.</p>\n<p>To start using the M2M Authorization for this scenario, you need to define your API in LoginRadius with name, identifier, and scope details and then create an M2M App with the desired scope of API(s), as <a href=\"https://www.loginradius.com/docs/api/v2/single-sign-on/Machine-to-Machine/overview/#adminconsoleconfigurationformmauthentication3\">explained here</a>. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 477px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 107.33752620545074%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Manage Authorization Server APIs\"\n        title=\"Manage Authorization Server APIs\"\n        src=\"/static/700d967b2519585e4f83f0f9bd9e65cc/d743b/manage-authorization-server-apis.png\"\n        srcset=\"/static/700d967b2519585e4f83f0f9bd9e65cc/d743b/manage-authorization-server-apis.png 477w\"\n        sizes=\"(max-width: 477px) 100vw, 477px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>In both scenarios, you get the Client Id and Client Secret for the created app, which you need to share with the partner or service who wants to access your APIs.</p>\n<h3 id=\"client-credentials-grant-flow\" style=\"position:relative;\"><a href=\"#client-credentials-grant-flow\" aria-label=\"client credentials grant flow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Client Credentials Grant Flow</h3>\n<p>LoginRadius M2M Authorization uses client credentials grant flow from OAuth 2.0. In this flow, the client (depicted as Server 1 and Server 2 in the diagram below) holds Client ID and Client Secret and uses them to request an access token.</p>\n<p>This grant-type flow occurs strictly between a client app and the authorization server. The user does not participate in this grant-type flow.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50.5859375%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Client Credentials Grant Flow\"\n        title=\"Client Credentials Grant Flow\"\n        src=\"/static/08e87f1c9f74444e14c724cbbcd0cb1c/01e7c/client-credentials-grant-flow.png\"\n        srcset=\"/static/08e87f1c9f74444e14c724cbbcd0cb1c/01e7c/client-credentials-grant-flow.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li>The client (server) requests with the Client ID, Client Secret, Audience, and Claims to the authorization server.</li>\n<li>If the request is valid, the authorization server sends a JWT access token to the client (server). </li>\n<li>The client (server) uses the JWT access token to call LoginRadius Management or your APIs. APIs share data according to permissions given against the M2M app without using client Secret in this step.</li>\n</ul>\n<h2 id=\"implement-m2m-authorization-with-loginradius-apis\" style=\"position:relative;\"><a href=\"#implement-m2m-authorization-with-loginradius-apis\" aria-label=\"implement m2m authorization with loginradius apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implement M2M Authorization with LoginRadius APIs</h2>\n<ol>\n<li>\n<p>The client (partner, API, service, etc.) requests the access token using the following API:</p>\n<p>API endpoint: <code>https://api.loginradius.com/services/oauth/token</code></p>\n<p>The following is an example request:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">POST https://&lt;LoginRadiusAppName&gt;.hub.loginradius.com/service/oauth/token</span>\n<span class=\"grvsc-line\">Content-Type: application/json</span>\n<span class=\"grvsc-line\">{</span>\n<span class=\"grvsc-line\">  &quot;audience&quot;: &quot;`https://api.loginradius.com/identity/v2/manage&quot;,`</span>\n<span class=\"grvsc-line\">  &quot;grant_type&quot;: &quot;client_credentials&quot;,</span>\n<span class=\"grvsc-line\">  &quot;client_id&quot;: &quot;&lt;YOUR_CLIENT_ID&gt;&quot;,</span>\n<span class=\"grvsc-line\">  &quot;client_secret&quot;: &quot;&lt;YOUR_CLIENT_SECRET&gt;&quot;</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n</li>\n<li>\n<p>LoginRadius Authorization Server validates the request. Upon validation, it returns the JWT access token to the client.</p>\n<p>The following is an example response with an access token:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">{</span>\n<span class=\"grvsc-line\">  &quot;access_token&quot;: &quot;eyJz93a...k4laUWw&quot;,</span>\n<span class=\"grvsc-line\">  &quot;token_type&quot;: &quot;Bearer&quot;,</span>\n<span class=\"grvsc-line\">  &quot;expires_in&quot;: 86400,</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">JWT Token Details</span>\n<span class=\"grvsc-line\">{</span>\n<span class=\"grvsc-line\">  &quot;iss&quot;: &quot;https://&lt;LoginRadiusAppName&gt;.hub.loginradius.com/&quot;,</span>\n<span class=\"grvsc-line\">  &quot;sub&quot;: &quot;&lt;OAuth APPs APIKey&gt;@client&quot;,</span>\n<span class=\"grvsc-line\">  &quot;jti&quot;: &quot;&lt;unique Identifier&gt;&quot;</span>\n<span class=\"grvsc-line\">  &quot;aud&quot;:&quot;`https://api.loginradius.com/identity/v2/manage&quot;,  //or https://service.example.com/api/v2`</span>\n<span class=\"grvsc-line\">  &quot;cid&quot;: &quot;&lt;APPConfig APIKey&gt;&quot;,</span>\n<span class=\"grvsc-line\">  &quot;sid&quot;: &quot;&lt;LR access Token&gt;&quot;  </span>\n<span class=\"grvsc-line\">  &quot;exp&quot;: 1311281970,</span>\n<span class=\"grvsc-line\">  &quot;iat&quot;: 1311281670,</span>\n<span class=\"grvsc-line\">  &quot;scp&quot;: [</span>\n<span class=\"grvsc-line\">    &quot;profile:read&quot;,</span>\n<span class=\"grvsc-line\">    &quot;profile:create&quot;,</span>\n<span class=\"grvsc-line\">  ],</span>\n<span class=\"grvsc-line\">  &quot;gty&quot;:&quot;client_credentials&quot;</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n</li>\n<li>\n<p>The client can call APIs (as per the defined scope) using the JWT token. APIs will work based on permissions without the use of Client Secret.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">curl --request GET \\</span>\n<span class=\"grvsc-line\">  --url `https://api.loginradius.com/identity/v2/manage/account/{uid} \\`</span>\n<span class=\"grvsc-line\">  --header &#39;authorization: Bearer eyJhb……….jVZ2w&#39;</span>\n<span class=\"grvsc-line\">  --header &#39;X-LoginRadius-ApiKey: {apiKey}</span></code></pre>\n</li>\n<li>The respective API(s) will work according to the scope or permission.</li>\n</ol>\n<h2 id=\"implement-m2m-authorization-with-business-apis\" style=\"position:relative;\"><a href=\"#implement-m2m-authorization-with-business-apis\" aria-label=\"implement m2m authorization with business apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implement M2M Authorization with Business APIs</h2>\n<ol>\n<li>\n<p>The client (partner, API, service, etc.) requests the access token using the following API:\nAPI endpoint: https://<LoginRadiusAppName>hub.loginradius.com/service/oauth/token</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">POST https://&lt;LoginRadiusAppName&gt;.hub.loginradius.com/service/oauth/token</span>\n<span class=\"grvsc-line\">Content-Type: application/json</span>\n<span class=\"grvsc-line\">{</span>\n<span class=\"grvsc-line\">&quot;audience&quot;: &quot;&lt;business API endpoint&gt;&quot;,</span>\n<span class=\"grvsc-line\">&quot;grant_type&quot;: &quot;client_credentials&quot;,</span>\n<span class=\"grvsc-line\">&quot;client_id&quot;: &quot;&lt;YOUR_CLIENT_ID&gt;&quot;,</span>\n<span class=\"grvsc-line\">&quot;client_secret&quot;: &quot;&lt;YOUR_CLIENT_SECRET&gt;&quot;</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<blockquote>\n<p><strong>Note:</strong> Where <code>&#x3C;LoginRadiusAppName></code> is the name of your LoginRadius App.\nIn response, the client will get an access token. </p>\n</blockquote>\n</li>\n<li>\n<p>Use the generated JWT token in the authorization for APIs.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">curl --request GET \\</span>\n<span class=\"grvsc-line\">--url &lt; API URL &gt; \\</span>\n<span class=\"grvsc-line\">--header &#39;authorization: Bearer eyJh………VZ2w&#39;</span></code></pre>\n</li>\n<li>The client will get access to the information as per the defined scope.</li>\n</ol>\n<h2 id=\"loginradius-m2m-authorization--benefits\" style=\"position:relative;\"><a href=\"#loginradius-m2m-authorization--benefits\" aria-label=\"loginradius m2m authorization  benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius M2M Authorization — Benefits</h2>\n<p>Overall, M2M Authorization offers secure access to improve business efficiency — and ultimately enhances user experience. In detail, the benefits include but are not limited to:</p>\n<ul>\n<li>Secure data access across internal and external business systems</li>\n<li>Granular data access with predefined scopes with minimal configuration</li>\n<li>Efficient authentication and data exchange </li>\n<li>Grant, limit, or block access permissions at any time</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>M2M Authorization is a secure and reliable method of autonomous interactions. It aids business systems in achieving greater efficiency and eliminates the need for human involvement. It also enables businesses to provide flexible machine-to-machine communication while enforcing granular access, authorization, and security requirements.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"title":"M2M Authorization: Authenticate Apps, APIs, and Web Services","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"April 29, 2022","updated_date":null,"tags":["M2M","Authorization","Authentication"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/55b15bddf195e3eaa39cb0e655abac95/ee604/m2m-authorization-for-apis-apps-and-web-services.png","srcSet":"/static/55b15bddf195e3eaa39cb0e655abac95/69585/m2m-authorization-for-apis-apps-and-web-services.png 200w,\n/static/55b15bddf195e3eaa39cb0e655abac95/497c6/m2m-authorization-for-apis-apps-and-web-services.png 400w,\n/static/55b15bddf195e3eaa39cb0e655abac95/ee604/m2m-authorization-for-apis-apps-and-web-services.png 800w,\n/static/55b15bddf195e3eaa39cb0e655abac95/f3583/m2m-authorization-for-apis-apps-and-web-services.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/using-m2m-authorization-for-apis-and-apps/"}}},{"node":{"id":"8d3dc4bb-0d79-5975-bd3b-dd8eefa2f1fd","html":"<p>Protecting customer data is paramount to every business organization. Even though businesses deploy the most stringent security measures to safeguard data, malicious actors somehow find security shortcomings to access network systems and cause data breaches, compromising the confidentiality, integrity, and availability of information.</p>\n<p>Cybersecurity firms like Okta, which provides identity management solutions and deals in authentication space, make the backbone of an organization's cybersecurity posture. Okta serves 15000+ customers worldwide. The Okta data breach by Lapsus$ is a recent example of what can happen if business organizations depend on third-party solution providers who show laxity in implementing robust cybersecurity strategies, frameworks, and controls.</p>\n<p>It is also a cautionary tale for cybersecurity MSPs (Managed Services Providers) and ITSPs (IT Solution Providers) to ensure that they have the best of security controls in place to prevent incidents like this.</p>\n<h2 id=\"what-is-okta\" style=\"position:relative;\"><a href=\"#what-is-okta\" aria-label=\"what is okta permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is Okta?</h2>\n<p>Okta is an identity platform and offers identity and access management solutions such as Single sign-on (SSO), Multi-Factor Authentication (MFA), etc., for an organization's customers and employees.</p>\n<h2 id=\"why-is-okta-in-the-news\" style=\"position:relative;\"><a href=\"#why-is-okta-in-the-news\" aria-label=\"why is okta in the news permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Is Okta In the News?</h2>\n<p>Okta’s CSO (Chief Security Officer) <a href=\"https://www.okta.com/blog/2022/03/updated-okta-statement-on-lapsus/\">David Bradbury</a> recently published an <a href=\"https://sec.okta.com/articles/2022/03/official-okta-statement-lapsus-claims\">official statement</a> about a support engineer whose computer was accessed by malicious actors for five days in mid-January (between January 16 to 21, 2022) and said they detected the unsuccessful attempt early on.</p>\n<h2 id=\"how-was-the-attack-executed\" style=\"position:relative;\"><a href=\"#how-was-the-attack-executed\" aria-label=\"how was the attack executed permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Was the Attack Executed?</h2>\n<p>Okta has now confirmed that malicious actors had access to one of its employees' laptops for five days in January 2022 but maintained there has been no data breach and remains fully operational. However, they concede that around <a href=\"https://www.okta.com/blog/2022/03/updated-okta-statement-on-lapsus/\">2.5% of its customers (about 366)</a> might have been affected.</p>\n<p>Here is how the attack happened.</p>\n<ul>\n<li>On March 22, 2022, a hacking group identifying itself as Lapsus$ posted some screenshots in its Telegram channel claiming to have compromised Okta's internal systems. The screenshots included Okta's Slack channels, super admin dashboard (access to reset passwords and MFA of their business customer’s employees — the customer in the screenshot was Cloudflare), and JIRA board.</li>\n<li>Okta's CSO responded through a blog post stating that the incident that Lapsus$ refers to had happened in January 2021 when it detected an attempt by hackers to compromise the account of a customer support engineer working for a third-party service provider.</li>\n<li>Okta alerted the service provider, suspended the engineer's account, and terminated the user's active Okta sessions. Besides, the company shared pertinent information with a third-party forensics firm for investigation.</li>\n<li>The investigation reported that hackers accessed the engineer's laptop for five days in January 2022.</li>\n<li>However, Lapsus$ claims that it had gained admin access to Okta's systems for two months, and it found Okta storing AWS keys in Slack channels. Furthermore, the hacker group claimed that it used its access to focus on Okta's customers.</li>\n</ul>\n<h2 id=\"who-is-behind-oktas-breach\" style=\"position:relative;\"><a href=\"#who-is-behind-oktas-breach\" aria-label=\"who is behind oktas breach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Who Is Behind Okta’s Breach?</h2>\n<p>News reports show that a group of unscrupulous actors identifying themselves as Lapsus$ in their Telegram channel was behind this Okta breach. They were aided by a customer support engineer working for a third-party service provider whose laptop was accessed by these hackers to gain vital information. Lapsus$ is also known as a notorious threat actor group — <a href=\"https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/\">DEV-0537</a>. This group has a history of taking over individual user accounts to drain their crypto holdings at cryptocurrency exchanges.</p>\n<h2 id=\"the-key-reasons-that-caused-the-security-breach\" style=\"position:relative;\"><a href=\"#the-key-reasons-that-caused-the-security-breach\" aria-label=\"the key reasons that caused the security breach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Key Reasons That Caused The Security Breach</h2>\n<p>The forensics report cited by Okta's CSO did not state how the hackers managed to gain access to the support engineer’s laptop, but the fingers point towards negligence by the engineer. However, the hackers claim to have had access to Okta's systems for more than a month before the January 2022 incident. If these claims are valid, it indicates a significant security breach at Okta's network center.</p>\n<h3 id=\"okta-breach-what-was-the-impact\" style=\"position:relative;\"><a href=\"#okta-breach-what-was-the-impact\" aria-label=\"okta breach what was the impact permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Okta Breach: What Was the Impact?</h3>\n<p>The Okta breach exposed the security frailties of the Okta network system and put 15,000 Okta customers’ data at risk. However, Okta stated it had contacted the affected 2.5% of customers, appraising them of the matter. Okta further noted that the customers need not take any precautionary measures as their data is safe.</p>\n<p>The CSO blog post went on to add that the damage was restricted to the access that support engineers have, such as Jira tickets and lists of users. Though customer support engineers facilitate password resetting and MFA, the hackers did not seem to have obtained this information. The CSO also confirmed that customer service engineers could not create or delete users.</p>\n<p>Notably, Okta's customers include high-profile enterprises like FedEx Corporation and Moody's Corporation. Hence, <a href=\"https://www.reuters.com/technology/okta-says-up-366-customers-have-potentially-been-impacted-by-hacker-attack-2022-03-23/\">Okta's shares plunged 11%</a> immediately after hackers claimed the breach that has put thousands of Okta customers at risk.</p>\n<h2 id=\"what-to-learn-from-oktas-cyber-hack\" style=\"position:relative;\"><a href=\"#what-to-learn-from-oktas-cyber-hack\" aria-label=\"what to learn from oktas cyber hack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What to Learn From Okta's Cyber Hack?</h2>\n<h3 id=\"1-limit-access-on-a-need-to-know-basis\" style=\"position:relative;\"><a href=\"#1-limit-access-on-a-need-to-know-basis\" aria-label=\"1 limit access on a need to know basis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1) Limit Access on a ‘Need-to-Know’ Basis</h3>\n<p>Limiting access and permissions to the employees is the first step to take. Employees and contractors should only be provided access on a 'need-to-know' basis and must be provided on a ‘least privilege’ basis (minimum access needed to perform a task or job). For example, support engineers shouldn't be able to access internal HR, accounting, or payroll systems. At the same time, marketing personnel should not have access to network configuration or applications that they do not use.</p>\n<h3 id=\"2-validate-third-party-apps-and-saas-solutions\" style=\"position:relative;\"><a href=\"#2-validate-third-party-apps-and-saas-solutions\" aria-label=\"2 validate third party apps and saas solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2) Validate Third-party Apps and SaaS Solutions</h3>\n<p>In an increasing multi-cloud and hybrid-cloud environment, it's paramount to understand the s IT ecosystem, third-party APIs (Application Programming Interfaces) and applications, and Software as a Service (SaaS) solutions deployed. Requesting SOC reports from vendors and contractors can help understand how their information systems are maintained and secured.</p>\n<h3 id=\"3-implement-robust-iam-pam-solutions\" style=\"position:relative;\"><a href=\"#3-implement-robust-iam-pam-solutions\" aria-label=\"3 implement robust iam pam solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3) Implement Robust IAM-PAM Solutions</h3>\n<p>Implementing robust processes around Identity and Access Management (IAM) and Privileged Access Management (PAM) can help strengthen the cybersecurity posture by making it almost impossible for attackers to barge into the organization’s periphery.</p>\n<h3 id=\"4-train-employees-and-customers\" style=\"position:relative;\"><a href=\"#4-train-employees-and-customers\" aria-label=\"4 train employees and customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4) Train Employees and Customers</h3>\n<p>'People' are the most valuable asset for any organization but can also be the weakest link in the cybersecurity chain. Therefore, organizations must regularly review the processes around training and educating employees, vendor-contractors, customers, and users to follow basic cyber hygiene.</p>\n<h3 id=\"5-be-vigilant\" style=\"position:relative;\"><a href=\"#5-be-vigilant\" aria-label=\"5 be vigilant permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5) Be Vigilant</h3>\n<p>Organizations must continue to monitor and audit the control environments. Leveraging automated monitoring and alerting tools can help overcome many challenges SOC teams face.</p>\n<h3 id=\"6-audit-and-review-regularly\" style=\"position:relative;\"><a href=\"#6-audit-and-review-regularly\" aria-label=\"6 audit and review regularly permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6) Audit and Review Regularly</h3>\n<p>Organizations should perform internal audits and review the systems and monitor the traffic and access permission more frequently. It is also advisable to engage third-party audit firms to get an external and independent view of the cybersecurity posture.</p>\n<h3 id=\"7-communicate-transparently\" style=\"position:relative;\"><a href=\"#7-communicate-transparently\" aria-label=\"7 communicate transparently permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7) Communicate Transparently</h3>\n<p>In case of a security incident, it is essential to be transparent to the employees, customers, vendors, and regulators and communicate with them immediately about the incident. Organizations should also provide specific guidance on how to safeguard the information assets.</p>\n<h2 id=\"to-conclude\" style=\"position:relative;\"><a href=\"#to-conclude\" aria-label=\"to conclude permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>To Conclude</h2>\n<p>The Okta breach shows that no business organization is 100% safe from malicious attacks. One simplest security issue is sufficient for malicious actors to wreak havoc.</p>\n<p>In this specific example, the hackers accessed the laptop of one of Okta's customer service engineers to gain vital insights into the company's customer data. Such incidents prove that customers can never be sure that their information is safe and leak-proof.</p>\n<p>However, it offers a valuable learning experience that business entities should not ignore the minutest of details regarding network security. It surfaces the adage that ' A chain is only as strong as its weakest link.'</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book a Demo\"\n        title=\"Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"How Lapsus$ Breached Okta and What Organizations Should Learn","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"March 25, 2022","updated_date":null,"tags":["Breach","Cybersecurity"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/77821bf8e2f3b044726de88f2494a879/ee604/how-lapsus-breached-okta.png","srcSet":"/static/77821bf8e2f3b044726de88f2494a879/69585/how-lapsus-breached-okta.png 200w,\n/static/77821bf8e2f3b044726de88f2494a879/497c6/how-lapsus-breached-okta.png 400w,\n/static/77821bf8e2f3b044726de88f2494a879/ee604/how-lapsus-breached-okta.png 800w,\n/static/77821bf8e2f3b044726de88f2494a879/f3583/how-lapsus-breached-okta.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/okta-and-the-lapsus-breach/"}}},{"node":{"id":"d74b661f-06ec-5532-9239-6a52866518a3","html":"<p>Authentication remains at the core of any application with user data and accounts. It ensures that only the authorized person is accessing the data and account. So far, Password-based authentication has been prevalent that developers mostly use.</p>\n<p>Unfortunately, passwords are no longer a wise choice for developers to ensure secure and seamless authentication. Let’s see why:</p>\n<ul>\n<li><strong>Vulnerable to cyberattacks:</strong> Passwords are still used as an authentication mechanism because of the long-standing efforts developers and technology industry leaders are delivering to secure the passwords. But hackers are in constant pursuit to breach passwords through different cyber-attacks and as a result, nearly 1 million passwords get stolen each week.</li>\n<li><strong>Security is subjected to chosen passwords:</strong> Users tend to use repetitive or insecure passwords for their accounts, which weakens the authentication security. If a user's password is leaked in one breach, it can impact the security of other applications where the user is using the same password.</li>\n<li><strong>Easily forgotten by users:</strong> Considering the risks password-based authentication poses to an application, developers need to include password policies and enforce restrictive logic in their authentication algorithms to accept strong passwords. This makes it even more difficult for the user to remember their account password. Such setup results in higher forgotten password requests requiring more development and support resources.</li>\n<li><strong>Efforts in securing and managing password-based authentication:</strong> Password policies, security algorithms, encryption techniques have become minimal viable requirements to manage password-based authentication. This increases the development efforts involved in developing and managing password-based authentication.</li>\n</ul>\n<p>Before talking about the solution in detail, let’s get deeper into the problem and see what are the common cyber-attacks faced by password-based authentication.</p>\n<h2 id=\"common-cyber-attacks-with-password-based-authentication\" style=\"position:relative;\"><a href=\"#common-cyber-attacks-with-password-based-authentication\" aria-label=\"common cyber attacks with password based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common Cyber-attacks with Password-based Authentication</h2>\n<p>The following is the list of common password attacks. It also explains what additional efforts developers need to put in to fight these cyber-attacks and protect user data:</p>\n<ul>\n<li><strong>Brute force:</strong> This password cracking attack use automation to guess a password millions of times. It tries all the possible combinations and permutations of passwords to exploit weak passwords like abcd@9876.</li>\n</ul>\n<p>To protect against this attack, developers have to develop security features like suspending or locking user accounts on multiple subsequent attempts to log in with an incorrect password.</p>\n<ul>\n<li><strong>Credential Stuffing:</strong> It is a type of identity theft where the attacker injects breached or leaked credentials of one account to access numerous other user accounts.</li>\n</ul>\n<p>To protect against this attack, developers have to ensure that users are not using insecure or previously breached passwords.</p>\n<ul>\n<li><strong>Keylogging:</strong> It records the user's keyboard interactions and key presses. Keylogger programs are used to record what users are typing on their keyboard and send the logged data to the creator.</li>\n</ul>\n<p>To protect against this attack, developers need to introduce 2FA (two-factor authentication). Stakes are high in this case as a lot depends on how users take security measures.</p>\n<ul>\n<li><strong>Man-in-the-Middle (MiTM):</strong> In this type of attack, the attacker sits in between the target user and the web application and deciphers all traffic passed among each other such as username, passwords, etc.</li>\n</ul>\n<p>That is where developers have to be cautious, keeping all the data-in-transit encrypted.</p>\n<p>Luckily getting rid of passwords from the authentication mechanism can address all the above-stated problems. Eliminating passwords from internet space is certainly not a 1-day thing, but the responsibility lies with developers.</p>\n<p>Developers should introduce more secure and user-friendly authentication methods to their application users such as magic links, single sign-on (SSO), biometric, hardware-based authentication.</p>\n<h2 id=\"alternatives-to-password-based-authentication\" style=\"position:relative;\"><a href=\"#alternatives-to-password-based-authentication\" aria-label=\"alternatives to password based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Alternatives to Password-based Authentication</h2>\n<h3 id=\"passwordless-authentication\" style=\"position:relative;\"><a href=\"#passwordless-authentication\" aria-label=\"passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Authentication</h3>\n<p>It does the user authentication based on the \"possession factor.\" That is where developers find passwordless authentication trustworthy, as the authentication uses a phone number, email ID, or authenticator app to cater to an OTP, one-time link, or code respectively to verify the user.</p>\n<p>Through this, developers can improve the user experience of the application and reduce risk while minimizing the total cost of storing the login credentials. Users will employ the one-time link or OTP only if they are logged into their email or possess the phone for SMS. This assures the developer a better security.</p>\n<h3 id=\"single-sign-on\" style=\"position:relative;\"><a href=\"#single-sign-on\" aria-label=\"single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Single Sign-on</h3>\n<p>Almost all websites demand some form of authentication to access their content and features. Single sign-on authentication has become a standard authentication method for website logins.</p>\n<p>Developers can integrate the single sign-on feature in their web applications to facilitate users to securely authenticate multiple apps and websites by leveraging one set of login credentials.</p>\n<p>Through SSO, developers can implement multi-factor authentication implicitly. It uses a federated identity management architecture that relies on open standard protocols to exchange identity and authentication information among these protocols. That makes implementing the security easier for developers.</p>\n<h3 id=\"biometric-authentication\" style=\"position:relative;\"><a href=\"#biometric-authentication\" aria-label=\"biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Authentication</h3>\n<p>Biometrics refers to the user's physical characteristics allowing them to identify uniquely on a digital platform. Instead of typing letters, numbers, and symbols (for passwords), biometric authentication uses biometric systems to calculate and estimate the user's physical attributes. Facial recognition, tiny impressions made by fingerprints, and vocal cadence are well-known biometric authentication techniques.</p>\n<p>It is gaining traction because developers do not have to maintain a separate database of usernames and passwords since the authentication takes place from the user device rather than the application's database.</p>\n<h3 id=\"smart-authentication\" style=\"position:relative;\"><a href=\"#smart-authentication\" aria-label=\"smart authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Smart Authentication</h3>\n<p>Most in-house developers and smart device vendors leverage this authentication technique to avoid password authentication. This authentication mostly uses QR codes or link-based login approaches. Here the one-time link or the QR code uniquely generates the verification process that helps initiate the user login process without any password.</p>\n<h3 id=\"hardware-based-authentication\" style=\"position:relative;\"><a href=\"#hardware-based-authentication\" aria-label=\"hardware based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hardware-based authentication</h3>\n<p>In this approach, the authentication uses a dedicated plug-and-run physical device belonging to the authorized user. These versatile security devices help users log in to desktops, Wi-Fi, websites, and other applications.</p>\n<p>FIDO2 devices are touch-sensed USB sticks that enable hardware authentication and follow the FIDO Alliance standards and specifications. Leveraging this authentication mechanism is a plus point as the developers do not have to maintain a secure database for the login credentials.</p>\n<h2 id=\"can-we-actually-get-rid-of-passwords\" style=\"position:relative;\"><a href=\"#can-we-actually-get-rid-of-passwords\" aria-label=\"can we actually get rid of passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Can we actually get rid of passwords?</h2>\n<p>For decades, password-based authentication has been the mainstay for security and user verification. On average, almost all online users have 20 to 30 login credentials for different applications and sites. Password logins have become so common that changing the authentication trend and adopting a new authentication approach will take time.</p>\n<p>All the alternatives mentioned in this article can help minimize using passwords to a significant level. It's time developers should seriously ponder the problems that passwords can create for themselves and opt for reasonable alternatives as per the situation, requirements, or policy standards.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Passwords are becoming more like a liability rather than a security asset. Hence, to get rid of them, developers are leveraging other means of authentication that are more reliable and less susceptible to security breaches and threats.</p>\n<p>Worried about efforts involved in implementing these alternative authentication methods from scratch? <a href=\"https://accounts.loginradius.com/auth.aspx?action=register&#x26;return_url=https://dashboard.loginradius.com/login&#x26;plan=pro\">LoginRadius</a> identity platform comes with these authentication techniques so that developers do not have to implement them from scratch in their applications to provide alternate authentication.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"When Can Developers Get Rid of Password-based Authentication?","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"January 31, 2022","updated_date":null,"tags":["Authentication"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/ec99b982c7381590d9835756acbaf197/ee604/password-dev.png","srcSet":"/static/ec99b982c7381590d9835756acbaf197/69585/password-dev.png 200w,\n/static/ec99b982c7381590d9835756acbaf197/497c6/password-dev.png 400w,\n/static/ec99b982c7381590d9835756acbaf197/ee604/password-dev.png 800w,\n/static/ec99b982c7381590d9835756acbaf197/f3583/password-dev.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/developers-can-get-rid-of-password-based-authentication/"}}},{"node":{"id":"bb4a2064-0b7a-5e1e-bd35-8029688d07b6","html":"<p>Securing communications between a client and a server often requires credentials to identify both parties. That is where the different authentication techniques comes in. Two popular authentication methods are cookie-based and cookieless authentication. However, choosing any one of them depends on the organization's requirements. Both come with their benefits and challenges. This article will give a quick walkthrough of cookie-based and cookieless authentication along with their advantages and disadvantages.</p>\n<h2 id=\"what-is-cookie-based-authentication\" style=\"position:relative;\"><a href=\"#what-is-cookie-based-authentication\" aria-label=\"what is cookie based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Cookie-based Authentication?</h2>\n<p>Cookies are pieces of data used to identify the user and their preferences. The browser returns the cookie to the server every time the page is requested. Specific cookies like HTTP cookies are used to perform cookie-based authentication to maintain the session for each user.</p>\n<p>The entire cookie-based authentication works in the following manner:</p>\n<ol>\n<li>The user gives a username and password at the time of login. Once the user fills in the login form, the browser (client) sends a login request to the server.</li>\n<li>\n<p>The server verifies the user by querying the user data. If the authentication request is valid, the server generates the following:</p>\n<ul>\n<li>A session by utilizing the user information</li>\n<li>A unique ID, known as the session ID</li>\n</ul>\n<p>The server then passes the session ID to the browser that keeps it. The server also keeps track of the active sessions.</p>\n</li>\n<li>The browser has to submit this generated session ID while sending a subsequent request. Every time the server validates the session ID. The session ID helps the authentication process identify the user and provides access accordingly.</li>\n<li>When the user logs out of the application, the session gets destroyed from both client (browser) and the server. It discontinues the authentication process from happening again through the respective session ID.</li>\n</ol>\n<h3 id=\"benefits-of-cookie-based-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-cookie-based-authentication\" aria-label=\"benefits of cookie based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Cookie-based Authentication</h3>\n<ul>\n<li><strong>Availability:</strong> In cookies-based authentication, cookies can be made available for an extended period, maintaining a session for a long time.</li>\n<li><strong>Easy Configuration:</strong> Websites can deliver cookies by configuring them as per requirement. For example, a website can send cookies that will expire as the users close the browser tab. It is also possible to configure cookies for a specified length of time on the client-side.</li>\n<li><strong>User-friendly:</strong> Cookie-based authentications are simple, and the cookies used in this method are user-friendly. Users can choose what to do with cookie files that have kept user credentials. All modern browsers come with settings to clear the cookies. Users can find cookies in the hard drive and delete them manually.</li>\n</ul>\n<h3 id=\"challenges-of-cookie-based-authentication\" style=\"position:relative;\"><a href=\"#challenges-of-cookie-based-authentication\" aria-label=\"challenges of cookie based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenges of Cookie-based Authentication</h3>\n<ul>\n<li><strong>Vulnerable to CSRF:</strong> Cookie-based authentications are prone to <a href=\"https://www.loginradius.com/blog/engineering/introduction-to-cross-site-request-forgery-csrf/\">Cross-site Request Forgery (CSRF) attacks</a>. Hence, they often require additional security postures for protection.</li>\n<li><strong>Less Mobile-friendly:</strong> Cookie-based authentication does not work well with all native applications.</li>\n<li><strong>Limitations:</strong> There are certain limitations and concerns such as size limit (not more than 4KB of information per cookie), browser limitations on cookies, user privacy, etc., come with cookies and cookie-based authentication.</li>\n<li><strong>Less Scalable:</strong> Cookie-based authentication is less scalable, and the overhead rises when the user count increases on a particular site.</li>\n</ul>\n<h2 id=\"what-is-cookieless-authentication\" style=\"position:relative;\"><a href=\"#what-is-cookieless-authentication\" aria-label=\"what is cookieless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Cookieless Authentication?</h2>\n<p>Cookieless authentication, also known as token-based authentication, is a technique that leverages JSON web tokens (JWT) instead of cookies to authenticate a user. It uses a protocol that creates encrypted security tokens. These tokens allow the user to verify their identity. In return, the users receive a unique access token to perform the authentication. The token contains information about user identities and transmits it securely between the server and client.\nThe entire cookieless authentication works in the following manner:</p>\n<ol>\n<li>The user logs into the service by providing their login credentials. It issues an access request from the client-side by sending the credential and API key (public key) to the application server.</li>\n<li>The server verifies the login credentials that checks the password entered against the username. Once approved, the server will generate a unique session token that will help authorize subsequent actions.</li>\n<li>This access token is sent back to the client via URL query strings, post request body, or other means. The server-generated signed authentication token gets assigned with an expiration time.</li>\n<li>The token gets transmitted back to the user's browser. On every subsequent request to the application server or future website visits, the access token gets added to the authorization header along with the public key. If there is a match from the application server against the private key, the user can proceed. If a given token expires, a new token gets generated as an authentication request.</li>\n</ol>\n<h3 id=\"benefits-of-cookieless-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-cookieless-authentication\" aria-label=\"benefits of cookieless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Cookieless Authentication</h3>\n<ul>\n<li><strong>Scalable and Efficient:</strong> In cookieless authentication, the tokens remain stored on the user's end. The server only needs to sign the authentication token once on successful login. That makes the entire technique scalable and allows maintaining more users on an application at once without any hassle.</li>\n<li><strong>Better Performance:</strong> Cookie-based authentication requires the server to perform an authentication lookup every time the user requests a page. You can eliminate the round-trips with tokens through the cookieless authentication technique. In cookieless authentication, the access token and the public key are added to the authorization header on every page request.</li>\n<li><strong>Robust Security:</strong> Since cookieless authentication leverages tokens like JWT (stateless), only a private key (used to create the authentication token) can validate it when received at the server-side.</li>\n<li><strong>Seamless Across Devices:</strong> Cookieless authentication works well with all native applications. Tokens are much easier to implement on iOS, Android, IoT devices, and distributed systems, making the authentication system seamless.</li>\n<li><strong>Expiration Time:</strong> Usually, tokens get generated with an expiration time, after which they become invalid. Then a new token needs to be obtained for reauthentication. If a token gets leaked, the potential damage becomes much smaller due to its short lifespan.</li>\n</ul>\n<h3 id=\"challenges-with-cookieless-authentication\" style=\"position:relative;\"><a href=\"#challenges-with-cookieless-authentication\" aria-label=\"challenges with cookieless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenges with Cookieless Authentication</h3>\n<ul>\n<li><strong>Single-key Token:</strong> One of the significant challenges with cookieless authentication is that these access tokens rely on just one key. Tokens that use JWT leverages a single key for authentication. If the developers/administrators handle the key poorly, it can lead to severe consequences that can compromise sensitive information.</li>\n<li><strong>Data Overhead:</strong> Storing a lot of data increases the overall size of the token. It slows down the request impacting the overall loading speed. This slowing down ultimately hampers the user experience. Thus proper development practices need to be followed, regulating minimum but essential data into the token.</li>\n<li><strong>Vulnerable to XSS and CSRF:</strong> Cookieless authentications are susceptible to <a href=\"https://www.loginradius.com/blog/engineering/http-security-headers/\">XSS</a> and CSRF attacks. So, the best practice is to have a short expiration time for access tokens. Keeping a longer expiration time might allow the attackers to hijack the access token and use it to gain unauthorized authentication.</li>\n</ul>\n<h2 id=\"how-does-loginradius-have-native-support-for-cookieless-authentication\" style=\"position:relative;\"><a href=\"#how-does-loginradius-have-native-support-for-cookieless-authentication\" aria-label=\"how does loginradius have native support for cookieless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does LoginRadius have Native Support for Cookieless Authentication?</h2>\n<p>LoginRadius provides multiple methods to implement a cookieless login workflow leveraging industry and security best practices. As a consumer-centric Identity platform, LoginRadius ensures that modern implementation methodologies comply with the changing security landscape. The cookieless authentication workflows detailed below are systems that LoginRadius has developed support for even before the recent browser-based privacy policies and are a core part of the LoginRadius platform.</p>\n<h3 id=\"loginradius-apis\" style=\"position:relative;\"><a href=\"#loginradius-apis\" aria-label=\"loginradius apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius APIs</h3>\n<p>The LoginRadius API has been architected and designed to function as a cookieless authentication system. Once authentication occurs, a session token gets returned to the requesting client in the form of an access token which can be leveraged to take further authorized actions against the Consumer account. It is a core part of the LoginRadius authentication workflows, and APIs developed based on Oauth 2.0 protocols.</p>\n<p>These APIs provide flexibility in generating access tokens based on consumer authentication requests and are automatically validated and signed leveraging the LoginRadius API Key and Secret. <a href=\"https://www.loginradius.com/developers/\">Detailed API documentation is available here</a>.</p>\n<h3 id=\"json-web-tokens\" style=\"position:relative;\"><a href=\"#json-web-tokens\" aria-label=\"json web tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>JSON Web Tokens</h3>\n<p>In addition to the LoginRadius APIs, JWTs are a standard method to handle cookieless login. Once authentication is completed and verified, a signed token can be generated(leveraging LoginRadius APIs) to pass the consumer session to the client.</p>\n<p>JWTs are a standard industry mechanism leveraged by various service providers and tools, making them ideal for interoperability with multiple applications. Find additional details on <a href=\"https://www.loginradius.com/developers/\">how to use JWT as part of your authentication workflows here</a>.</p>\n<h3 id=\"additional-options\" style=\"position:relative;\"><a href=\"#additional-options\" aria-label=\"additional options permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Additional Options</h3>\n<p>In addition to the above two options, LoginRadius provides flexibility and support for various authentication and authorization standards that support a cookieless authentication approach. Outbound authentication workflows such as OIDC and Oauth 2.0 allow for a modern standardized approach to authentication.</p>\n<p>These are industry-recognized and recommended authentication and authorization protocols that comply with security and privacy best practices, including supporting a cookieless authentication approach. Check out <a href=\"https://www.loginradius.com/developers/\">our dedicated documentation on outbound workflows</a>.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Cookieless authentication can facilitate more secure and scalable authentication. You should decide how to authenticate consumers considering your requirements and the benefits and challenges of cookie-based and cookieless authentication.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Cookie-based vs. Cookieless Authentication: What’s the Future?","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"December 14, 2021","updated_date":null,"tags":["Authentication","JWT","Cookie"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/581ff70fe87fda67a0bad33af670f950/ee604/coverImage.png","srcSet":"/static/581ff70fe87fda67a0bad33af670f950/69585/coverImage.png 200w,\n/static/581ff70fe87fda67a0bad33af670f950/497c6/coverImage.png 400w,\n/static/581ff70fe87fda67a0bad33af670f950/ee604/coverImage.png 800w,\n/static/581ff70fe87fda67a0bad33af670f950/f3583/coverImage.png 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/cookie-based-vs-cookieless-authentication/"}}},{"node":{"id":"4121e0ae-ac5e-57c6-a0ec-5789a65a4520","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>For organizations today, maintaining an array of productive networking tools is all about easy access. Enterprises often introduce new applications that support their production and help them implement their business strategies successfully. However, every time an application or tool gets implemented, the end-users are forced to create new credentials for access.</p>\n<p>As a result, employees and customers end up with too many passwords to remember. Unfortunately, remembering all the different credentials is easier said than done. More than <a href=\"https://www.techrepublic.com/article/25-of-employees-admit-that-they-use-the-same-password-for-everything/\">60% of employees</a> use the same password for their work and personal applications, leading to greater vulnerability to data breaches. And about 13% of users reuse passwords on all their accounts regularly. In fact, compromised passwords are accountable for 81% of hacking-related breaches. </p>\n<p>Enterprises need to use methods to maximize the use of digital identities for multiple users. And tools like <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">single sign-on (SSO)</a> and federated identity management (FIM) seem to be the go-to methods for most organizations. However, most companies do not understand the differences between these two methods. And the implications they may have on the overall company security.</p>\n<p>What is SSO, how is it different from FIM, and what are the benefits of both methods? Let's find out all the aspects associated with federated identity management vs SSO. </p>\n<h2 id=\"what-is-single-sign-on\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on\" aria-label=\"what is single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On?</h2>\n<p>Since the early days of the internet, using a single digital identity for multiple logins was considered a risk from cybersecurity's perspective. And it is indeed. However, logging in to different web applications one by one is time-consuming, inconvenient, and disrupts the workflow. The solution to this dilemma lies with SSO. </p>\n<p>A <a href=\"https://www.loginradius.com/single-sign-on/\">single sign-on</a> or SSO is an authentication scheme that allows users to access multiple web applications securely through a single set of credentials. For example, it's what lets you browse your Gmail account in one tab and use Youtube in another tab on your browser. </p>\n<p>It also allows web services like online banking to grant access to various sections within the same account. Typically, your savings and general account are very distinct and require separate login credentials. However, with SSO, when you click on another section of your account, the site re-authenticates you with the credentials you used during the initial login.</p>\n<p>In enterprises, it lets employees access various business applications like HR functions, financial records, and more with only one login credential. </p>\n<h2 id=\"how-single-sign-on-works\" style=\"position:relative;\"><a href=\"#how-single-sign-on-works\" aria-label=\"how single sign on works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Single Sign-On Works?</h2>\n<p>SSO is a <a href=\"https://www.loginradius.com/blog/identity/pros-cons-token-authentication/\">token-based system</a>, which means users are assigned a token for identification instead of a password. Let's say you go to an application you want to use; you will receive a security token that contains all your information (like your email address, username, etc.). Then, an Identity Provider compares this token to the credentials you provide during login and grants your authentication.</p>\n<h2 id=\"benefits-of-single-sign-on\" style=\"position:relative;\"><a href=\"#benefits-of-single-sign-on\" aria-label=\"benefits of single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Single Sign-On</h2>\n<h3 id=\"1-reduces-costs-and-password-resets\" style=\"position:relative;\"><a href=\"#1-reduces-costs-and-password-resets\" aria-label=\"1 reduces costs and password resets permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Reduces costs and password resets</h3>\n<p>It eliminates the need for frequent password resets and reduces customer care calls, lowering IT costs.</p>\n<h3 id=\"2-streamlines-production\" style=\"position:relative;\"><a href=\"#2-streamlines-production\" aria-label=\"2 streamlines production permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Streamlines production</h3>\n<p>It eliminates the need for employees to remember multiple passwords and can cut down the time it takes to access the resources they need to do their jobs securely.</p>\n<h3 id=\"3-enhanced-customer-experience\" style=\"position:relative;\"><a href=\"#3-enhanced-customer-experience\" aria-label=\"3 enhanced customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Enhanced customer experience</h3>\n<p>It allows customers to access all the services and products an organization offers through a single login, removing the vexation of logging in multiple times.</p>\n<h3 id=\"4-reliable-security\" style=\"position:relative;\"><a href=\"#4-reliable-security\" aria-label=\"4 reliable security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Reliable security</h3>\n<p>Most SSO platforms now have built-in security integrations with thousands of software applications. And, one password can grant you access to all of them.</p>\n<h2 id=\"challenges-in-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#challenges-in-single-sign-on-sso\" aria-label=\"challenges in single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenges in Single Sign-On (SSO)</h2>\n<h3 id=\"1-integration-complexity\" style=\"position:relative;\"><a href=\"#1-integration-complexity\" aria-label=\"1 integration complexity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Integration Complexity</h3>\n<p>Implementing SSO across heterogeneous IT environments with diverse applications and systems can be challenging. Ensuring seamless integration and compatibility with existing infrastructure requires careful planning and coordination.</p>\n<h3 id=\"2-user-experience\" style=\"position:relative;\"><a href=\"#2-user-experience\" aria-label=\"2 user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. User Experience</h3>\n<p>While SSO aims to enhance user experience by simplifying authentication processes, issues such as session management, logout procedures, and cross-domain authentication can impact usability. Ensuring a seamless and intuitive user experience is crucial to maximize the benefits of SSO.</p>\n<h3 id=\"3-security-concerns\" style=\"position:relative;\"><a href=\"#3-security-concerns\" aria-label=\"3 security concerns permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Security Concerns</h3>\n<p>SSO introduces potential security risks, as compromising the user's single sign-on credentials can grant unauthorized access to multiple applications and systems. Implementing robust authentication mechanisms, such as multi-factor authentication (MFA) and encryption, is essential to mitigate security threats.</p>\n<h3 id=\"4-vendor-lock-in\" style=\"position:relative;\"><a href=\"#4-vendor-lock-in\" aria-label=\"4 vendor lock in permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Vendor Lock-in</h3>\n<p>Depending on third-party SSO solutions can lead to vendor lock-in, limiting flexibility and scalability. Organizations must evaluate vendor dependencies and consider interoperability with other identity management solutions to avoid potential vendor lock-in issues.</p>\n<h3 id=\"5-identity-lifecycle-management\" style=\"position:relative;\"><a href=\"#5-identity-lifecycle-management\" aria-label=\"5 identity lifecycle management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Identity Lifecycle Management</h3>\n<p>Managing the lifecycle of user identities, including provisioning, deprovisioning, and access management, can be complex in SSO environments. Ensuring timely updates and synchronization of user attributes across all connected systems is essential to maintain data accuracy and security.</p>\n<h2 id=\"what-is-federated-identity-management-fim\" style=\"position:relative;\"><a href=\"#what-is-federated-identity-management-fim\" aria-label=\"what is federated identity management fim permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Federated Identity Management (FIM)?</h2>\n<p>When we talk about federated identity vs SSO, it’s crucial to understand what each individual system is about. <a href=\"https://www.loginradius.com/blog/identity/what-is-federated-identity-management/\">Federated Identity Management</a> (Identity Federation) is a system that allows users from different enterprises (domains) to use the same digital identity to access all their applications and networks. </p>\n<p>Through FIM, an enterprise maintains its unique management system. It is interlinked with other enterprises through a third service (the identity provider) that stores the credentials. The identity provider or identity broker also offers the trust mechanism required for FIM to work. </p>\n<h2 id=\"how-does-federated-identity-management-work\" style=\"position:relative;\"><a href=\"#how-does-federated-identity-management-work\" aria-label=\"how does federated identity management work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Federated Identity Management Work?</h2>\n<p>While we explore sso vs federation, let’s quickly understand how federated identity management works. <a href=\"https://www.loginradius.com/federated-sso/\">Federated identity management</a> (FIM) is a system that enables the use of a single digital identity across multiple domains and organizations. The process begins when a user attempts to access a resource from a service provider. </p>\n<p>The service provider then sends a request to the user's identity provider, which authenticates the user's identity and provides the service provider with the necessary credentials to grant access to the requested resource. </p>\n<p>This process is known as identity federation and allows users to access resources from multiple organizations without the need for separate login credentials for each organization. The FIM system uses industry-standard protocols like <a href=\"https://www.loginradius.com/glossary/saml/\">SAML</a>, OAuth, and OpenID Connect to establish trust and securely exchange identity information between the identity provider and service provider.</p>\n<p><a href=\"https://www.loginradius.com/resource/federated-identity-management-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-fim\"\n        title=\"DS-fim\"\n        src=\"/static/ef0c27dd7f9672e1684d62550b85a3ba/e5715/DS-fim.png\"\n        srcset=\"/static/ef0c27dd7f9672e1684d62550b85a3ba/a6d36/DS-fim.png 650w,\n/static/ef0c27dd7f9672e1684d62550b85a3ba/e5715/DS-fim.png 768w,\n/static/ef0c27dd7f9672e1684d62550b85a3ba/81501/DS-fim.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"benefits-of-federated-identity-management\" style=\"position:relative;\"><a href=\"#benefits-of-federated-identity-management\" aria-label=\"benefits of federated identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Federated Identity Management</h2>\n<p>Federated identity management (FIM) offers several benefits to both users and organizations. For users, FIM provides a seamless experience across multiple domains and services, eliminating the need to remember and manage multiple usernames and passwords. </p>\n<p>FIM improves security by centralizing identity management and reducing the number of identity stores that need to be maintained. Organizations benefit from FIM by reducing the complexity and cost associated with managing multiple identities and credentials. </p>\n<p>FIM also enhances security by implementing consistent authentication and authorization policies across all domains and services, reducing the risk of unauthorized access and data breaches. </p>\n<p>Furthermore, FIM supports compliance by providing organizations with the ability to enforce regulatory requirements and audit access to sensitive resources.</p>\n<h2 id=\"challenges-in-federated-identity-management\" style=\"position:relative;\"><a href=\"#challenges-in-federated-identity-management\" aria-label=\"challenges in federated identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenges in Federated Identity Management</h2>\n<h3 id=\"1-interoperability\" style=\"position:relative;\"><a href=\"#1-interoperability\" aria-label=\"1 interoperability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Interoperability</h3>\n<p>Federated Identity Management (FIM) involves establishing trust between multiple identity providers across different organizations. Achieving interoperability between these disparate systems can be challenging, requiring standardized protocols and careful coordination.</p>\n<h3 id=\"2-security-risks\" style=\"position:relative;\"><a href=\"#2-security-risks\" aria-label=\"2 security risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Security Risks</h3>\n<p>FIM introduces potential security risks, as it involves sharing user identity information across organizational boundaries. Ensuring the secure transmission and storage of sensitive authentication data is crucial to mitigate the risk of data breaches and unauthorized access.</p>\n<h3 id=\"3-trust-establishment\" style=\"position:relative;\"><a href=\"#3-trust-establishment\" aria-label=\"3 trust establishment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Trust Establishment</h3>\n<p>Establishing trust relationships between identity providers (IdPs) and service providers (SPs) requires mutual agreements and verification mechanisms. Building and maintaining trust can be complex, particularly in multi-party federations involving diverse stakeholders.</p>\n<h3 id=\"4-identity-mapping\" style=\"position:relative;\"><a href=\"#4-identity-mapping\" aria-label=\"4 identity mapping permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Identity Mapping</h3>\n<p>Mapping user identities across federated domains can be challenging, especially when dealing with different naming conventions, attribute formats, and data schemas. Ensuring accurate identity mapping is essential to maintain seamless user access across federated environments.</p>\n<h3 id=\"5-policy-enforcement\" style=\"position:relative;\"><a href=\"#5-policy-enforcement\" aria-label=\"5 policy enforcement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Policy Enforcement</h3>\n<p>Enforcing access control policies and authorization rules across federated domains can be complex, particularly when dealing with diverse regulatory requirements and organizational policies. Establishing consistent policy enforcement mechanisms is essential to ensure compliance and mitigate security risks.</p>\n<h2 id=\"federated-identity-management-vs-sso\" style=\"position:relative;\"><a href=\"#federated-identity-management-vs-sso\" aria-label=\"federated identity management vs sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Federated Identity Management vs. SSO</h2>\n<p>While discussing sso vs federated identity, SSO and FIM are used together, they do not mean the same thing. While single sign-on is an important component of FIM, it is not the same as FIM. The main difference between Identity Federation and SSO or federated login vs SSO lies in the range of access.</p>\n<p>SSO allows users to use a single set of credentials to access multiple systems within a single organization (a single domain). On the other hand, FIM lets users access systems across federated organizations. They can access the applications, programs, and networks of all members within the federated group.</p>\n<p>If we follow the above bank example, customers can access various external banking services like loan applications or ordering checks seamlessly through a single login with FIM.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Expanding digital identity management can boost an organization's work efficiency by reducing authentication time for all programs and applications. As we discuss federated authentication vs sso, Using SSO or FIM have their benefits, along with the associated security and financial incentives. </p>\n<p>As you advance towards improving customer and employee support, these protocols can help you streamline password creation and <a href=\"https://www.loginradius.com/authentication/\">user authentication</a>.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is an example of a federated SSO?</strong></p>\n<p>An example is when a user logs into a third-party application (like Google) using their credentials from another identity provider (like Facebook).</p>\n<p><strong>2. What is federated SSO a mechanism?</strong></p>\n<p>Federated SSO is a mechanism allowing users to access multiple applications using a single set of credentials, authenticated across different organizations or domains.</p>\n<p><strong>3. Is identity federation the same as SSO?</strong></p>\n<p>No, identity federation is broader, involving the establishment of trust relationships between different identity providers, while SSO focuses on seamless access to multiple applications with one set of credentials.</p>\n<p><strong>4. What is federation identity management?</strong></p>\n<p>Federation identity management is a system allowing users from different organizations or domains to access shared resources using a single digital identity, managed through mutual trust agreements.</p>\n<p><strong>5. What is identity federation in AWS?</strong></p>\n<p>Identity federation in AWS enables users to access AWS resources securely using their existing identity credentials from external identity providers, such as Active Directory or SAML-based systems.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Federated Identity Management vs. SSO: What's The Difference?","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"November 22, 2021","updated_date":null,"tags":["federated identity management","sso","data security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/d0c6f2a6a299a0c2f53d7540cc65087e/33aa5/sso-vs-fim.jpg","srcSet":"/static/d0c6f2a6a299a0c2f53d7540cc65087e/f836f/sso-vs-fim.jpg 200w,\n/static/d0c6f2a6a299a0c2f53d7540cc65087e/2244e/sso-vs-fim.jpg 400w,\n/static/d0c6f2a6a299a0c2f53d7540cc65087e/33aa5/sso-vs-fim.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/federated-identity-management-vs-sso/"}}},{"node":{"id":"6c9a4834-d59a-5691-ad91-9f586bdde292","html":"<p>Businesses can't build and manage everything in-house. Many a time, they require third-party experts to help them meet a variety of critical needs. The use of third-party APIs for their applications is a similar requirement. </p>\n<p>In addition, businesses need the right data to address the following questions:</p>\n<ul>\n<li>How are the third-party APIs performing?</li>\n<li>What are the API consumption patterns?</li>\n<li>Are there any useful API Insights that can help in future decisions? </li>\n</ul>\n<p>LoginRadius being a CIAM solution provider, completely understands these requirements and launches Authentication API Analytics for businesses. </p>\n<p>The feature contains useful charts and analytic tools to view and measure an application's overall performance (where using LoginRadius).</p>\n<p><a href=\"https://www.loginradius.com/resource/authentication-api-analytics/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius API Authentication Analytics\"\n        title=\"LoginRadius API Authentication Analytics\"\n        src=\"/static/306e893dcf406af34e915db03a305596/e5715/loginradius-api-authentication.png\"\n        srcset=\"/static/306e893dcf406af34e915db03a305596/a6d36/loginradius-api-authentication.png 650w,\n/static/306e893dcf406af34e915db03a305596/e5715/loginradius-api-authentication.png 768w,\n/static/306e893dcf406af34e915db03a305596/63ff0/loginradius-api-authentication.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>The <a href=\"https://www.loginradius.com/resource/authentication-api-analytics/\">Authentication API Analytics</a> feature offers the following benefits from the business and its developer's point of view:</p>\n<ul>\n<li><strong>Assess app performance</strong>: LoginRadius allows your  developers to create high-quality and secure authentication for your apps. Besides, your developers can also evaluate the efficiency of your applications based on provided API insights.</li>\n<li><strong>Assess API performance</strong>: Based on the provided dataset and insights, your developers and business team can evaluate how the LoginRadius APIs are performing, like API response time and the number of requests handled.</li>\n<li><strong>Informed business decisions</strong>: API consumption insights and data help businesses analyze their consumer behavior, detect patterns and make informed business decisions based on the data.</li>\n</ul>\n<h2 id=\"key-characteristics-of-authentication-api-analytics\" style=\"position:relative;\"><a href=\"#key-characteristics-of-authentication-api-analytics\" aria-label=\"key characteristics of authentication api analytics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Characteristics of Authentication API Analytics</h2>\n<p><img src=\"https://apidocs.lrcontent.com/images/Api-Analytics-4_17205ea22900876201.71720532.png\" alt=\"Authentication API Analytics\"></p>\n<p>The API analytical and performance data are available in the following three categories:</p>\n<ul>\n<li><strong>Request Count</strong>: It offers a comparative chart view for the number of requests made to various forms of LoginRadius APIs. </li>\n<li><strong>Response Code</strong>: It lets you track all response codes from your API to see the number of HTTP success(2xx) and error(4xx, 5xx) requests the LoginRadius server has handled for the selected time interval. </li>\n<li><strong>Performance Analysis</strong>: This gives information on how the LoginRadius APIs are performing for you, i.e., the response time of the APIs. It is available for APIs like Profile lookup APIs, Authentication APIs, Profile creation APIs, Profile deletion API, and Profile update APIs. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius lets talk\"\n        title=\"LoginRadius lets talk\"\n        src=\"/static/de654dc21dca09244813b4e7fd97c28a/e5715/lets-talk.png\"\n        srcset=\"/static/de654dc21dca09244813b4e7fd97c28a/a6d36/lets-talk.png 650w,\n/static/de654dc21dca09244813b4e7fd97c28a/e5715/lets-talk.png 768w,\n/static/de654dc21dca09244813b4e7fd97c28a/63ff0/lets-talk.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>As businesses evolve toward becoming more data-driven, analytics become essential. LoginRadius’ Authentication API Analytics not only helps businesses create personalized sales and marketing campaigns, but also enhances the experience of their developer towards the use of APIs.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Announcement - Authentication API Analytics to Evaluate the Performance of LoginRadius APIs for Your Applications","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"March 23, 2021","updated_date":null,"tags":["authentication","ciam solution","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/bcd78abfd4cdef67d370c540df59ba95/6051d/api-authentication-analytics-cover.png","srcSet":"/static/bcd78abfd4cdef67d370c540df59ba95/69585/api-authentication-analytics-cover.png 200w,\n/static/bcd78abfd4cdef67d370c540df59ba95/497c6/api-authentication-analytics-cover.png 400w,\n/static/bcd78abfd4cdef67d370c540df59ba95/6051d/api-authentication-analytics-cover.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/api-authentication-analytics/"}}},{"node":{"id":"50acc984-2cf2-59b5-9660-298452f030d4","html":"<p>Businesses are accountable to consumers that trust them with their personal data. So, they should not only be protecting it but also should be explaining how they are managing and processing such data. </p>\n<p>Our recently launched Privacy Policy Management serves as the central place where businesses maintain versions of their privacy policy, notify consumers when it changes, or get their acceptance of the newer versions. </p>\n<p><img src=\"/c29788d47d12bf23b1516637bc3d2437/privacy-policy-loginradius.gif\" alt=\"privacy-policy-loginradius\"></p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>With LoginRadius Privacy Policy Management, we achieve the following benefits for businesses. </p>\n<ul>\n<li><strong>Win consumer trust</strong>: With privacy policy briefing about consumer data collection and usage, businesses can give more clarity around what they're doing to <a href=\"https://www.loginradius.com/security/\">protect such data</a>, and in the process win consumers’ trust.</li>\n<li><strong>Easy implementation</strong>: Businesses can easily configure and deploy privacy policy versioning and related workflows from the LoginRadius Admin Console. It significantly saves time and development efforts.</li>\n<li><strong>Be compliance-ready</strong>: Businesses can be easily <a href=\"https://www.loginradius.com/compliances/\">compliant and audit-ready</a> by keeping a record of information like time of issuing a policy version, until when a policy version was effective, who agreed to which policy version, etc.</li>\n</ul>\n<h2 id=\"key-features-of-loginradius-privacy-policy-management\" style=\"position:relative;\"><a href=\"#key-features-of-loginradius-privacy-policy-management\" aria-label=\"key features of loginradius privacy policy management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features of LoginRadius Privacy Policy Management</h2>\n<p>As the global compliance and data protection landscape continue to evolve, LoginRadius offers the following capabilities:</p>\n<ul>\n<li>**Versions **- Businesses can name the privacy policy version after each update, making it easier to handle versioning.</li>\n<li>**Timestamps **- Businesses can set and manage the date and time from when a privacy policy version will be effective. They can set the schedule in advance, and the consumers are notified about the new version with a message of their choice to ensure personalization.</li>\n<li>**Flow Type **- Businesses can choose whether notifying the consumers about the privacy policy change is enough or <a href=\"https://www.loginradius.com/blog/identity/2020/06/consumer-data-privacy-security/\">consumers should provide acceptance</a> on the same. LoginRadius handles the notification or the acceptance process on their behalf. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/privacy-policy-management-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABh0lEQVQY0z2RS0tbQRiGD1L1GG9Bxba5qKQ1JsYoUXM3CcfEWI3iBQW1LYhLxdBNd9GNK39JiwuhRRB1IbpRN+7cCEKpLYFS0DTZ6ObpnDHHgZfh/ead5/uGUWqcQ+gydQ1R64oJxaXq9L0rhnGuS30bweRJ0hKaobk3SU1PCtWVQO2MopYzyhMsRqsvLUMN7gTm3hGafKO89Gcw9wzLCxLaGaHWm6JNW8STWsAUnKXam5Z12VDkFKO71T+OW5vDEZ3Cpc1jCWRQ3RqNHu1pAqHmvhTt4Qle96flAPbAGB3C24IZTAbQ6G4PTuCMz+JMCMVnsApvi05LiAGs707wauAd1sC4hLSFJ7H4x2gpZ56fXOkIs7N3ROFfkR8/f3H7O0/+z18KxRLJxVUqOgIo1n7WcttcXd+wu3/Ml28HfP1+yOnFJQcnZ5i9w1S9iaDon/HCERLFc/R1f3dHqVTk8fFB+tGP6yj2QZkJTi2zKqDvsxssredYyuZY+bzFh0+b1LnjVIsp/wMC/N9kbGhWMgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"privacy-policy-management-datasheet\"\n        title=\"privacy-policy-management-datasheet\"\n        src=\"/static/4a6a4d40995fdda4041041c29221207a/e5715/privacy-policy-management-datasheet.png\"\n        srcset=\"/static/4a6a4d40995fdda4041041c29221207a/a6d36/privacy-policy-management-datasheet.png 650w,\n/static/4a6a4d40995fdda4041041c29221207a/e5715/privacy-policy-management-datasheet.png 768w,\n/static/4a6a4d40995fdda4041041c29221207a/81501/privacy-policy-management-datasheet.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"implementation-and-deployment\" style=\"position:relative;\"><a href=\"#implementation-and-deployment\" aria-label=\"implementation and deployment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementation and Deployment</h2>\n<p>LoginRadius supports the following implementation and deployment methods for Privacy Policy Management.</p>\n<ul>\n<li><strong>JavaScript:</strong> Implementation and deployment using LoginRadiusV2.js automatically populate the privacy policy message on the registration and login pages if the flow type is Strict in the configuration. </li>\n<li><strong>APIs</strong>: LoginRadius offers <a href=\"https://www.loginradius.com/identity-api/\">API support</a> to prompt consumers to view the privacy policy and allow them to accept it.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Businesses cannot escape from maintaining privacy policy versions and workflows for their consumers. Looking forward, LoginRadius' Privacy Policy Management will effortlessly ensure a holistic insight into privacy policies where consumers are notified about new updates, everytime. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Announcement: LoginRadius Embraces Privacy Policy Management Amid Heightened Regulatory Updates","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"December 16, 2020","updated_date":null,"tags":["compliance","data privacy","data security","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/02a23c9872be63fa3fa34ca9490470a2/6051d/privacy-policy-management.png","srcSet":"/static/02a23c9872be63fa3fa34ca9490470a2/69585/privacy-policy-management.png 200w,\n/static/02a23c9872be63fa3fa34ca9490470a2/497c6/privacy-policy-management.png 400w,\n/static/02a23c9872be63fa3fa34ca9490470a2/6051d/privacy-policy-management.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/privacy-policy-management/"}}},{"node":{"id":"fbb269f8-8629-585f-9dba-5e666cd00e4d","html":"<p>Back in the day, when consumers wanted to access different sites and applications, they had to register first, and then log in with their usernames and passwords every single time. Such experiences are no longer acceptable to consumers and they choose to opt-out of such services.</p>\n<p>The recently launched Federated Identity Management by LoginRadius is an arrangement to simplify the implementation of <a href=\"https://www.loginradius.com/single-sign-on/\">Single Sign-On (SSO)</a> and user experience across applications. </p>\n<h2 id=\"intent-behind-the-launch\" style=\"position:relative;\"><a href=\"#intent-behind-the-launch\" aria-label=\"intent behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intent Behind the Launch</h2>\n<p>Federated Identity Management by LoginRadius helps businesses and applications use a single set of identity data. Consumers need not create multiple accounts for multiple organizations to access their web applications. These applications do not  communicate with each other directly and standard SSO protocols like JWT, SAML, OAuth 2.0, OIDC etc are used to establish the communication.</p>\n<p><a href=\"https://www.loginradius.com/resource/federated-identity-management-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Federated Identity Management\"\n        title=\"Federated Identity Management\"\n        src=\"/static/70007d8283328a34a4613733cae2dbe9/e5715/DS-Product-Federated-Identity-Management-1.png\"\n        srcset=\"/static/70007d8283328a34a4613733cae2dbe9/a6d36/DS-Product-Federated-Identity-Management-1.png 650w,\n/static/70007d8283328a34a4613733cae2dbe9/e5715/DS-Product-Federated-Identity-Management-1.png 768w,\n/static/70007d8283328a34a4613733cae2dbe9/2bef9/DS-Product-Federated-Identity-Management-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><a href=\"https://www.loginradius.com/federated-sso/\">Federated Identity Management</a> is designed by LoginRadius to help your business in the following ways: </p>\n<ul>\n<li><strong>Gain access across multiple applications</strong>: It helps applications work together, so consumers can access multiple applications without requiring a new access credential.</li>\n<li><strong>Seamless consumer authentication</strong>: It provides seamless access to applications, making the consumer experience quicker, simpler, and more convenient. </li>\n<li><strong>Cost-effectiveness</strong>: It lowers the administrative cost as the support for maintenance of web pages like login, register, access management, consumer management is not required to be managed by your organization.</li>\n<li><strong>Highly secure model</strong>: Because there is no direct communication with multiple service providers, passwords aren't exposed, leading to higher levels of security.</li>\n</ul>\n<p><strong>Key Capabilities of Federated Identity Management by LoginRadius</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Federated Identity Management Features\"\n        title=\"Federated Identity Management Features\"\n        src=\"/static/296728d7e7b4786b699d75bd974846aa/e5715/image-2.png\"\n        srcset=\"/static/296728d7e7b4786b699d75bd974846aa/a6d36/image-2.png 650w,\n/static/296728d7e7b4786b699d75bd974846aa/e5715/image-2.png 768w,\n/static/296728d7e7b4786b699d75bd974846aa/d0143/image-2.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>1. <strong>Support for industry-standard SSO protocols</strong>: LoginRadius supports the following standard SSO protocols: </p>\n<ul>\n<li><strong>SAML</strong>: The LoginRadius Admin Console offers a comprehensive self-service of SAML configurations. </li>\n<li><strong>JWT</strong>: LoginRadius offers JWT formatted, encrypted token by email, phone, and username.</li>\n<li><strong>OAuth 2.0</strong>: All authentication-related APIs of LoginRadius accept OAuth 2.0 token.</li>\n<li><strong>OpenID Connect (OIDC)</strong>: LoginRadius follows all standards specified in the OpenID Connect specs.</li>\n<li><strong>Web Services Federation</strong>: LoginRadius extends support for WS Federation by creating a token-based security model. </li>\n</ul>\n<p>2. <strong>LoginRadius Admin Console</strong>: LoginRadius offers a simple dashboard to manage all configurations required for the above mentioned SSO protocols.</p>\n<p>3. <strong>API support for protocols</strong>: LoginRadius covers end-to-end API support for the SSO protocols mentioned above which make integration and implementation relatively easy to be executed within any system.</p>\n<p>4. <strong>LoginRadius acts as Identity Provider</strong>: LoginRadius acts as an IdP which stores and authenticates the identities that consumers use to log in to systems, applications, files servers, and more depending upon the configuration.</p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>Federated Identity Management by LoginRadius is a way to connect multiple web applications and services using the same identity data. It’s a many to one mapping to help your consumers access your business and partners with a single credential set.   </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Announcement - LoginRadius Simplifies the Implementation of Federated SSO With Federated Identity Management","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"October 15, 2020","updated_date":null,"tags":["industry-news"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/e3e15cc0e99afbd02b2a610532659be3/33aa5/fim-image.jpg","srcSet":"/static/e3e15cc0e99afbd02b2a610532659be3/f836f/fim-image.jpg 200w,\n/static/e3e15cc0e99afbd02b2a610532659be3/2244e/fim-image.jpg 400w,\n/static/e3e15cc0e99afbd02b2a610532659be3/33aa5/fim-image.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/loginradius-federated-identity-management/"}}},{"node":{"id":"93f37ecb-f7df-510e-aed8-37e556c01a62","html":"<p>Determining how consumers are introduced to a brand is as important as managing their subsequent journey. With LoginRadius’ recently <a href=\"https://www.loginradius.com/user-management/\">launched User Management feature</a>, businesses can enjoy streamlined access control and adjustable privileges for their consumers. </p>\n<h2 id=\"intent-behind-the-launch\" style=\"position:relative;\"><a href=\"#intent-behind-the-launch\" aria-label=\"intent behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intent Behind the Launch</h2>\n<p>Simply put, the LoginRadius User Management feature solves the problem of managing the multiple operations that revolve around consumer data. </p>\n<p>It also has been designed to help your business in the following ways: </p>\n<ul>\n<li>It is an easy-to-use feature launched to handle your user management and support requirements.</li>\n<li>It allows you to control and restrict access for consumers from the LoginRadius Admin Console. You can also handle consumers from your application’s admin console.</li>\n<li>It allows you to block, or delete consumers based on your business policies. </li>\n<li>It allows you to feed consumers' data in real-time using Webhooks and APIs.</li>\n<li>It reduces your team effort to maintain and manage consumer data.</li>\n<li>It helps you to migrate the existing consumer data from multiple sources.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-user-management/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"loginradius user management datasheet\"\n        title=\"loginradius user management datasheet\"\n        src=\"/static/fe328332d6d3ccc84958da4e801dce17/e5715/DS-LoginRadius-User-Management.png\"\n        srcset=\"/static/fe328332d6d3ccc84958da4e801dce17/a6d36/DS-LoginRadius-User-Management.png 650w,\n/static/fe328332d6d3ccc84958da4e801dce17/e5715/DS-LoginRadius-User-Management.png 768w,\n/static/fe328332d6d3ccc84958da4e801dce17/2bef9/DS-LoginRadius-User-Management.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"key-capabilities-of-loginradius-user-management\" style=\"position:relative;\"><a href=\"#key-capabilities-of-loginradius-user-management\" aria-label=\"key capabilities of loginradius user management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Capabilities of LoginRadius User Management</h2>\n<p>1. <strong>User management process</strong>: LoginRadius offers complete consumer management features, including: </p>\n<ul>\n<li><strong>Provisioning</strong>: To create consumer accounts.</li>\n<li><strong>Authorization</strong>: To validate the access rights of consumers.</li>\n<li><strong>Account Management</strong>: To disable consumer accounts, and grant, or restrict access.</li>\n<li><strong>Password Management</strong>: To trigger the password reset option for consumer accounts.</li>\n<li><strong>Deprovisioning</strong>: To block, or delete consumer accounts.</li>\n</ul>\n<p>2. <strong>Multiple operations of user data</strong>: LoginRadius allows the following actions to be performed on consumers’ data:</p>\n<ul>\n<li><strong>Data filtration</strong>: To search consumers based on parameters like Name, Email, UID, ID, and Phone ID via the LoginRadius Admin Console.</li>\n<li><strong>API support for user management</strong>: To allow all user management features to be directly integrated into your application’s Admin Console.</li>\n<li><strong>Real-time user data feeds using webhooks</strong>: To obtain real-time feeds of consumer data using the LoginRadius webhooks.</li>\n<li><strong>Data migration services for user management</strong>: To offer self-serve and CSV-based data migration via the LoginRadius Admin Console.</li>\n</ul>\n<h3 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h3>\n<p>The User Management feature by LoginRadius is unique in that it monitors and manages the entire consumer journey through automated access permissions, data migration, API support, and other consumer-centric solutions. Now, blend it with creating <a href=\"https://www.loginradius.com/customer-experience-solutions/\">meaningful relationships with your consumers</a>—that’s what we offer. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-demo-loginradius\"\n        title=\"Book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Announcement – LoginRadius Announces the Availability of User Management","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"September 30, 2020","updated_date":null,"tags":["user management","identity management","password management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/c7b97877ec6e51015bd2d515b9f3f29b/0756a/image1.png","srcSet":"/static/c7b97877ec6e51015bd2d515b9f3f29b/69585/image1.png 200w,\n/static/c7b97877ec6e51015bd2d515b9f3f29b/497c6/image1.png 400w,\n/static/c7b97877ec6e51015bd2d515b9f3f29b/0756a/image1.png 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/loginradius-announces-user-management/"}}},{"node":{"id":"960c4fa6-0314-5b39-90c2-3a6973a9b6b8","html":"<p>LoginRadius is a rapidly-expanding platform. And this time, the cloud-based customer identity and access management solution has launched a PIN Login authentication environment for its existing and new customers.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind The Launch</h2>\n<p>The <a href=\"https://www.loginradius.com/multi-factor-authentication/\">method of authentication</a> is an important aspect of security, and likewise, a PIN strikes just the right balance between security and usability.</p>\n<p>To be clear, by authentication we mean how we identify and verify users on our platform to make sure <strong><em>'they are who they say they are.'</em></strong></p>\n<p>LoginRadius customers can now avoid time-consuming delays caused by entering long, complex credentials repeatedly within a trusted device. PIN login will also pose an additional challenge for hackers during or after login.</p>\n<h2 id=\"the-benefits-of-pin-authentication\" style=\"position:relative;\"><a href=\"#the-benefits-of-pin-authentication\" aria-label=\"the benefits of pin authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Benefits of PIN Authentication</h2>\n<p>In a new generation of end-users, a strong PIN based authentication uptake is a better way to validate their authenticity. Whether it’s PIN based authentication through platform or PIN authenticator, it’s always a reliable way of authentication when it comes to security and convenience. Here are a few more advantages of using PIN login as a method of authentication. </p>\n<ul>\n<li>It simplifies the login process. </li>\n<li>The validation happens in a matter of a few seconds. </li>\n<li>PIN authentication is hassle-free, convenient, and less time-consuming.</li>\n<li>The need for re-authentication during critical events strengthens security.</li>\n</ul>\n<h2 id=\"what-does-the-threat-mitigating-model-look-like\" style=\"position:relative;\"><a href=\"#what-does-the-threat-mitigating-model-look-like\" aria-label=\"what does the threat mitigating model look like permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Does the Threat Mitigating Model Look Like</h2>\n<p>We have followed strict authentication protocols to make this launch a success. Likewise, here is an outline of how our threat mitigation model looks like and what it offers:</p>\n<p><strong>Enhanced usability for end-user</strong>: For customers looking for a secure, seamless sign-in to justify the authenticity of end-users, PIN Login will offer a shorter, less time consuming, and more usable experience that <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">simplifies the sign-in process</a>.</p>\n<p><strong>No third-party integration</strong>: We conduct authentication and authorization of end-users inside our identity environment. No other third-party service provider is involved resulting in better response speed and boosted security.</p>\n<p><strong>Re-authentication upon prolonged inactivity</strong>: Long-lived sessions are harmful, especially if the user was inactive for a longer period of time. The new PIN login will require users to re-authenticate after a pre-set time duration.</p>\n<p><strong>Critical Information Accessibility</strong>: End-users will be validated every time when conducting a critical event. This event-based re-authentication flow will work for scenarios like while processing a transaction or deleting an account.</p>\n<p><strong>Complete configurable solution</strong>: Customers can configure the PIN length based on industry standards and set the flow as a mandate or optional for the end-users.</p>\n<p><strong>Forced account lockouts</strong>: The account will be locked automatically upon hitting the configured number of failed PIN attempts. The PIN will act as the protection layer against vulnerabilities like brute force attacks.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-and-pin-auth\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Pin login data sheet\"\n        title=\"Pin login data sheet\"\n        src=\"/static/e67d9aef78dc3d6232525104404555df/e5715/DS-PIN-Login-1024x310.png\"\n        srcset=\"/static/e67d9aef78dc3d6232525104404555df/a6d36/DS-PIN-Login-1024x310.png 650w,\n/static/e67d9aef78dc3d6232525104404555df/e5715/DS-PIN-Login-1024x310.png 768w,\n/static/e67d9aef78dc3d6232525104404555df/2bef9/DS-PIN-Login-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Pin Login Data Sheet</strong></p>\n<h2 id=\"making-authentication-convenient-and-simple-for-end-users\" style=\"position:relative;\"><a href=\"#making-authentication-convenient-and-simple-for-end-users\" aria-label=\"making authentication convenient and simple for end users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Making Authentication Convenient and Simple for End-Users</h2>\n<p>It is quite impressive to deliver seamless experiences from the first interaction itself. With the latest PIN authentication, we aim to streamline end-users' journey by providing a <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">passwordless experience</a>.</p>\n<p>Our PIN login is another giant step towards achieving better security, usability, and identity management.</p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>PIN login is a successful attempt at not just embracing an alternative  two factor authentication PIN method or the multi factor authentication PIN method for the LoginRadius identity platform, but using a variety of other factors and combining them contextually for secured access management. </p>\n<p>All-in-all, we aim to ensure that logins are secure, simple, seamless, and frictionless. And if it can turn customers into loyal advocates, that will serve our purpose even better.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Announcement - LoginRadius Now Supports PIN Login with Enhanced Features","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"April 28, 2020","updated_date":null,"tags":["pin authentication","ciam solution","identity management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/2e44c89cd97a7cea9a08794c5a1d9ace/6051d/LoginRadius-Pin-Authentication.png","srcSet":"/static/2e44c89cd97a7cea9a08794c5a1d9ace/69585/LoginRadius-Pin-Authentication.png 200w,\n/static/2e44c89cd97a7cea9a08794c5a1d9ace/497c6/LoginRadius-Pin-Authentication.png 400w,\n/static/2e44c89cd97a7cea9a08794c5a1d9ace/6051d/LoginRadius-Pin-Authentication.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/loginradius-pin-based-authentication/"}}},{"node":{"id":"c4b5f7fe-c5d9-5673-ad59-b811e6a5dd88","html":"<p>As a developer, you should be familiar with <a href=\"http://stackexchange.com/\">StackExchange</a>. There are tons of resources available on there about software development and programming. Out of everything, I have compiled a list of the top 8 resources that I find helpful. These resources cover a wide range of topics such as web development, general programming, and best practices to follow during development.</p>\n<p><strong>1.</strong> <a href=\"http://ish.re/HDPA\"><strong>Technical things to remember when doing the live (production) deployment of the web application</strong></a></p>\n<p>In this resource, you’ll get a checklist of the things that will make your web application deployment go smoothly as well as how to get good feedback from your users/search engines. It covers many topics such as user interface, user experience, security, SEO, browser compatibility, design, etc.</p>\n<p>URL : <a href=\"http://ish.re/HDPA\">HDPA</a></p>\n<p><strong>2.</strong> <a href=\"http://ish.re/HDPE\"><strong>Why can’t software industry deliver faultless projects quickly?</strong></a></p>\n<p>Have you ever compared the software industry with other industries such as retail, telecommunications, etc.? The article above covers many of the differences and gives tips around how, as a developer, you can focus on the issues related to software.</p>\n<p>URL : <a href=\"http://ish.re/HDPE\">HDPE</a></p>\n<p><strong>3.</strong> <a href=\"http://ish.re/HDPF\"><strong>How can I review my own code?</strong></a></p>\n<p>Have you ever reviewed your code? It’s always a fun thing to do…  Coding standards and code quality are equally important factors that feed into software quality. In this thread, you’ll find best practices for self-code review that will help improve the quality of the overall software or web application.</p>\n<p>URL : <a href=\"http://ish.re/HDPF\">HDPF</a></p>\n<p><strong>4.</strong> <a href=\"http://ish.re/HDPJ\"><strong>Must read books for programmers</strong></a></p>\n<p>Books are useful for everyone, regardless of your profession. They impart plenty of information into your brain, which you then process and output as a skill. In this thread, you’ll find a list of helpful books to read as a developer. You can choose what to read based on the technology and system you are familiar with, but my personal favourite is “<strong>code complete</strong>.”</p>\n<p>URL : <a href=\"http://ish.re/HDPJ\">HDPJ</a></p>\n<p><strong>5.</strong> <a href=\"http://ish.re/HDPL\"><strong>How to improve programming skills?</strong></a></p>\n<p>We, programmers, are always looking to improve our coding skills, but sometimes only writing code is not enough. This thread has some tips and tricks for how you can improve.</p>\n<p>URL : <a href=\"http://ish.re/HDPL\">HDPL</a></p>\n<p><strong>6.</strong> <a href=\"http://ish.re/HDSM\"><strong>Should I become a polyglot programmer?</strong></a></p>\n<p>This thread will help you understand the benefits of learning additional programming languages as a way to improve your thought processes. Understanding more language designs makes you a sharper developer.</p>\n<p>URL : <a href=\"http://ish.re/HDSM\">HDSM</a></p>\n<p><strong>7.</strong> <a href=\"http://ish.re/HDSX\"><strong>Selection between “Do it right” and “Do it ASAP”</strong></a></p>\n<p>Have you ever been in a tricky situation where you are caught choosing between whether to make the software the right way or to finish it quickly for an upcoming deadline? Well, you are not alone! All developers face the same problem. Go through this thread to understand and choose the right approach for you.</p>\n<p>URL : <a href=\"http://ish.re/HDSX\">HDSX</a></p>\n<p><strong>8.</strong> <a href=\"http://ish.re/HDPR\"><strong>For fun: list of programmers cartoons</strong></a></p>\n<p>Developers enjoy writing software and feel a deep sense of satisfaction when the program they've been working on is executed nicely and goes to production. That is the essential part of our life, but sometimes we can afford to take a break from all the coding and enjoy some nerdy cartoons… Here are some that I like.</p>\n<p>URL : <a href=\"http://ish.re/HDPR\">HDPR</a></p>\n<p>I’m sure there are lots of other resources available, so please post your recommendations in the comments section.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"StackExchange - The 8 best resources every developer must follow","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"April 25, 2020","updated_date":null,"tags":["Programmer","Skills"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/554ba40ae16d5bf67b4e87c50415b366/ee604/8-stackexchange-resources-dev-follow.png","srcSet":"/static/554ba40ae16d5bf67b4e87c50415b366/69585/8-stackexchange-resources-dev-follow.png 200w,\n/static/554ba40ae16d5bf67b4e87c50415b366/497c6/8-stackexchange-resources-dev-follow.png 400w,\n/static/554ba40ae16d5bf67b4e87c50415b366/ee604/8-stackexchange-resources-dev-follow.png 800w,\n/static/554ba40ae16d5bf67b4e87c50415b366/db955/8-stackexchange-resources-dev-follow.png 900w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/stackexchange-8-best-resources-every-developer-must-follow/"}}},{"node":{"id":"1f618f71-d4dc-50ef-ab2a-586906cbe0ca","html":"<p>With the COVID-19 pandemic forcing employees to stay indoors, how do you protect your business from a Corporate Account Takeover (CATO) fraud?</p>\n<p>The use of stolen workforce identity by cybercriminals has been a popular hacking tactic for many years now. With the current world crisis, it is even easier to exploit coronavirus fears and steal corporate information, especially financial and medical data (which is very sensitive at the moment).</p>\n<p>So, what do you do?</p>\n<p>Well, as scary as it may sound, there are capabilities around corporate account takeover risk detection that can help organizations fight back.</p>\n<p>But first, let’s get to the core.</p>\n<h2 id=\"what-is-corporate-account-takeover\" style=\"position:relative;\"><a href=\"#what-is-corporate-account-takeover\" aria-label=\"what is corporate account takeover permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Corporate Account Takeover</h2>\n<p>A corporate account takeover (CATO) is a kind of enterprise identity theft where unauthorized users steal employee passwords and other credentials to gain access to highly sensitive information within the organization.</p>\n<p>The media, finance, hospitality, retail, supply chain, gaming, travel, and hospitality industry are the hotspots for cybercriminals to devise their corporate account takeover attack.</p>\n<p>Here is how the scam works.</p>\n<p>The attacker may use phishing tactics, like approaching an employee to discuss an account-related error and then requesting login credentials to fix the issue.</p>\n<p>They use the <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">credentials to hack into the account</a> and exploit the financial stability and reputation of the account holder – in this case, the employee and the business at large.</p>\n<p>Corporate account takeover attacks are becoming more sophisticated and consequential with time and are costing millions of dollars every year.</p>\n<p>According to the 2020 Global Identity and Fraud Report by Experian, 57% of enterprises report higher fraud losses due to account takeover.</p>\n<h2 id=\"types-of-organization-mainly-targeted-by-account-takeover-ato-attacks\" style=\"position:relative;\"><a href=\"#types-of-organization-mainly-targeted-by-account-takeover-ato-attacks\" aria-label=\"types of organization mainly targeted by account takeover ato attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of organization mainly targeted by account takeover (ATO) attacks</h2>\n<ul>\n<li><strong>Media and Entertainment Industry</strong>: Lately, there is a thriving parasitic ecosystem on the verge of overpowering the <a href=\"https://www.infosecurity-magazine.com/blogs/rise-account-takeover-media-1-1-1-1/\">music and video streaming</a> industry. Criminals work on a pretty straightforward model here by stealing login credentials from premium customers and selling them at a lower price for illegal access.</li>\n<li><strong>Financial Industry</strong>: Account takeover attacks also <a href=\"https://securityboulevard.com/2019/12/digital-banks-targeted-in-account-takeover-scams/\">threaten bank security</a>, insurance companies, and other financial institutions. Fraudsters steal victim's credentials or use phishing techniques to trick banks and gain complete control of millions of accounts.</li>\n<li><strong>Hospitality Industry</strong>: The <a href=\"https://www.loginradius.com/blog/2020/03/improve-customer-experience-hospitality-industry/\">hospitality industry</a> is a popular and easy target for fraudsters to deploy account takeover strategies. Hackers often seal reward balances and exploit them, resulting in the loss of loyal customers and damage to the brand's reputation.</li>\n<li><strong>Sports Industry</strong>: The <a href=\"https://www.loginradius.com/blog/2018/11/improving-customer-fan-experience-sports-entertainment-industry/\">sports industry</a> is a lucrative business. With sensitive information, athlete negotiation figures, medical records, strategy documents, and intellectual property, fraudsters are on the lookout for loopholes to steal those assets.</li>\n<li><strong>Retail Industry</strong>: Account takeover is a complex challenge for the <a href=\"https://www.loginradius.com/blog/2018/11/improving-customer-experience-in-the-retail-e-commerce-industry/\">retail industry</a> too. Fraudsters make money from such attacks in a number of ways. Examples include ordering goods with the hacked account, purchasing gift cards, redeeming rewards points, and worst, selling compromised accounts on the dark web.</li>\n<li><strong>Gaming Industry</strong>: The <a href=\"https://www.loginradius.com/blog/2020/01/improving-customer-experience-in-the-gaming-industry/\">gaming platform</a> has always been on the account takeover radar. Cybercriminals steal in-game payment information and make illegal purchases. They use <a href=\"https://www.pymnts.com/fraud-prevention/2019/deep-dive-video-game-fraud/\">stolen account information</a> to pull off phishing scams by luring other players into opening links with free character or in-game currency.</li>\n</ul>\n<h2 id=\"business-impact-of-corporate-account-takeover\" style=\"position:relative;\"><a href=\"#business-impact-of-corporate-account-takeover\" aria-label=\"business impact of corporate account takeover permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Business Impact of Corporate Account Takeover</h2>\n<p>Corporate account takeover is a big deal. It is one of the most damaging cyber threats that businesses and customers face today.</p>\n<p>These attacks are difficult to detect as criminals hack into accounts with legitimate credentials. By and large, these attacks hurt businesses’ reputation, scare customers, and can even end up with companies having to pay a heavy penalty.</p>\n<p>For instance, if the violation is booked under the EU’s GDPR, a fine as much as 4 percent of global annual turnover may be levied.</p>\n<p><strong>Some recent account takeover attacks:</strong></p>\n<ol>\n<li><a href=\"https://www.scmagazine.com/home/security-news/j-crew-says-year-old-breach-exposed-customer-account-info/\">J.Crew data breach</a>: In March 2020, J.Crew informed its customers that an unauthorized third-party accessed their accounts nearly a year ago.</li>\n<li><a href=\"https://www.loginradius.com/blog/2020/04/marriott-data-breach-2020/\">New Marriott data breach</a>: In March 2020, Marriott International announced another data breach that approximately affected 5.2 million guests.</li>\n<li><a href=\"https://www.computerweekly.com/news/252479101/Sports-retailer-Decathlon-left-employee-data-exposed\">Decathlon left data breach</a>: In February 2020, sports retailer Decathlon accidentally exposed more than 123 million employee data on an unsecured ElasticSearch server.</li>\n</ol>\n<h2 id=\"7-common-attacks-that-lead-to-corporate-account-takeover\" style=\"position:relative;\"><a href=\"#7-common-attacks-that-lead-to-corporate-account-takeover\" aria-label=\"7 common attacks that lead to corporate account takeover permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Common Attacks That Lead To Corporate Account Takeover</h2>\n<p>Not <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">all cyber attacks</a> are highly technical. In fact, the majority of them use simple tricks to deceive users into sharing their login credentials. Here are a few authentication attacks that may end up with a corporate account takeover.</p>\n<h3 id=\"1-phishing-attack\" style=\"position:relative;\"><a href=\"#1-phishing-attack\" aria-label=\"1 phishing attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Phishing Attack</h3>\n<p>Perhaps the most common of all attacks, the bad guys during phishing attacks pose themselves as legit organizations and ask for personally identifiable information (PII) from the individual or company.</p>\n<p>The goal is to trick the recipient (over a phone call, email, or text messages) into taking action, like opening a link or downloading an attachment with malicious code.</p>\n<p>PII is any data that can be used to identify an individual. For example, name, geographic location, SSN, IP address, passport number, etc.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Protecting PII Against Data Breaches 1024x310\"\n        title=\"Protecting PII Against Data Breaches 1024x310\"\n        src=\"/static/3183d14f6c9662008b848dc5d81d718f/e5715/Protecting-PII-Against-Data-Breaches-1024x310.png\"\n        srcset=\"/static/3183d14f6c9662008b848dc5d81d718f/a6d36/Protecting-PII-Against-Data-Breaches-1024x310.png 650w,\n/static/3183d14f6c9662008b848dc5d81d718f/e5715/Protecting-PII-Against-Data-Breaches-1024x310.png 768w,\n/static/3183d14f6c9662008b848dc5d81d718f/2bef9/Protecting-PII-Against-Data-Breaches-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Tips to detect a phishing attack</strong></p>\n<ul>\n<li>Emails starting with generic greetings like “hi there” instead of the recipient’s name.</li>\n<li>Emails that ask you to complete an action almost immediately. For example, your account will be blocked if you do not provide a set of details.</li>\n<li>Emails that do not take you to a page it claims to, and the URL does not begin with HTTPS.</li>\n</ul>\n<h3 id=\"2-brute-force-attack\" style=\"position:relative;\"><a href=\"#2-brute-force-attack\" aria-label=\"2 brute force attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Brute Force Attack</h3>\n<p>Fraudsters conduct this type of corporate account takeover to target large businesses. They use automated bots to systematically check and identify valid credentials to crack password codes and log in to compromised accounts.</p>\n<p><strong>Tips to detect brute force attack</strong></p>\n<ul>\n<li>Surprisingly high login attempts on a single account.</li>\n<li>Failed testing attempts with multiple account ids and passwords.</li>\n<li>An exponential rise in account locks.</li>\n<li>More and more cases of hijacked accounts.</li>\n</ul>\n<h3 id=\"3-credential-stuffing\" style=\"position:relative;\"><a href=\"#3-credential-stuffing\" aria-label=\"3 credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Credential Stuffing</h3>\n<p>If your employees have been using the same password for multiple accounts, consider it a treat for cybercriminals. <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">Credential stuffing happens</a> when the attacker uses bot attacks to verify login credentials instead of manually testing credentials one-by-one.</p>\n<p><strong>Tips to detect credential stuffing</strong></p>\n<ul>\n<li>High rise in login attempts and failed login counts.</li>\n<li>Irregular traffic volumes.</li>\n<li>High use of non-existing user names during authentication.</li>\n<li>Abnormal bounce rate on the authentication page.</li>\n</ul>\n<h3 id=\"4-man-in-the-middle-attack\" style=\"position:relative;\"><a href=\"#4-man-in-the-middle-attack\" aria-label=\"4 man in the middle attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Man-in-the-middle attack</h3>\n<p>The man-in-the-middle attack is a kind of cyber eavesdropping where the attacker intercepts communication between two entities and manipulates the transfer of data in real-time.</p>\n<p>For example, the attacker will exploit the real-time processing of transactions between a bank and its customer by diverting the customer to a fraudulent account.</p>\n<p><strong>Tips to detect man-in-the-middle attack</strong></p>\n<ul>\n<li>TCP and HTTP signatures during user sessions do not match.</li>\n<li>Evil twin Wi-Fi networks like IkeaFreeWiFi and IkeaWiFiJoin in the same location.</li>\n<li>Login pages that look fake.</li>\n<li>Software update pop-ups that look illegitimate.</li>\n<li>Suspicious SSIDs.</li>\n</ul>\n<h3 id=\"5-password-spraying\" style=\"position:relative;\"><a href=\"#5-password-spraying\" aria-label=\"5 password spraying permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Password spraying</h3>\n<p>Password spraying is also a kind of brute force attack where the attacker feeds in a large database of usernames and password combinations in the hope that a few of those will work.</p>\n<p>It can be a dictionary attack where fraudsters enter the <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">most commonly-used passwords</a> to hack into accounts. A lot of people still use the same password for multiple sites.</p>\n<p><strong>Tips to detect password spraying attack</strong></p>\n<ul>\n<li>Login attempts from non-existent users.</li>\n<li>Significant increase in account lockouts.</li>\n<li>High login failure rate.</li>\n<li>Repeated login attempts from the same URL.</li>\n</ul>\n<h3 id=\"6-social-engineering\" style=\"position:relative;\"><a href=\"#6-social-engineering\" aria-label=\"6 social engineering permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Social Engineering</h3>\n<p>Social engineering is a kind of corporate account takeover attack where the cybercriminal manipulates an employee into giving away login credentials or access into sensitive information.</p>\n<p>Fraudsters conduct social engineering in stages. First, they gather information about the intended victim. Then, they plan to launch and execute an attack by exploiting the victim’s weakness. Finally, they use the acquired data to conduct the attack.</p>\n<p><strong>Tips to detect social engineering attack</strong></p>\n<ul>\n<li>Unsolicited emails requesting payment information.</li>\n<li>Asking for OTP following a two-factor authentication. </li>\n<li>Suspicious chat boxes popping up.</li>\n</ul>\n<h3 id=\"7-session-hijacking\" style=\"position:relative;\"><a href=\"#7-session-hijacking\" aria-label=\"7 session hijacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Session Hijacking</h3>\n<p>As the name suggests, session hijacking happens when the attacker takes complete control of a user session. Note that a session starts when you log in to a service like your banking app and ends when you log out of it.</p>\n<p>A successful session hijacking results in giving the attacker access to multiple gateways like financial and customer records and to other applications with intellectual properties.</p>\n<p><strong>Tips to detect session hijacking</strong></p>\n<ul>\n<li>Unusual frequency in the Received Signal Strength (RSS).</li>\n</ul>\n<h2 id=\"best-business-practices-to-prevent-corporate-account-takeover\" style=\"position:relative;\"><a href=\"#best-business-practices-to-prevent-corporate-account-takeover\" aria-label=\"best business practices to prevent corporate account takeover permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Business Practices to Prevent Corporate Account Takeover</h2>\n<p>Start with building a strong relationship with your employees. Make them understand what security measures they need to implement to safeguard their accounts and prevent unauthorized access to corporate data.</p>\n<p>Here are a few standard practices that you can follow:</p>\n<ul>\n<li>Flag emails that are too similar to your corporate email account.</li>\n<li>Register all domains that resemble your actual corporate domain.</li>\n<li>Add <a href=\"https://www.loginradius.com/multi-factor-authentication/\">MFA/2FA authentication</a> to verify the payment location, if it has been changed.</li>\n<li>Block unauthorized access attempts with authentication factors like biometric identifiers. </li>\n<li>Use phone, email, or any other verification factor to confirm fund transfer requests. </li>\n<li>Install spam filters in all systems across your organization.</li>\n<li>Install security updates as and when available.</li>\n<li>Perform security scans every month and note unexpected changes and unusual pop-ups.</li>\n<li>Educate employees not to use publicly available access points. </li>\n<li>Educate employees not to open unidentified attachments and emails. </li>\n<li>Train employees on how to identify suspicious emails.</li>\n</ul>\n<h2 id=\"how-loginradius-eliminates-account-takeover-attacks-for-enterprise-customers\" style=\"position:relative;\"><a href=\"#how-loginradius-eliminates-account-takeover-attacks-for-enterprise-customers\" aria-label=\"how loginradius eliminates account takeover attacks for enterprise customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Eliminates Account Takeover Attacks for Enterprise Customers?</h2>\n<p>Customer-facing enterprises deal with large volumes of data every day. And it is their responsibility to protect them.</p>\n<p>LoginRadius is a cloud-based <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) platform that gets the much needed extra layer of protection for enterprises to protect customer data. The CIAM solution detects malicious activity before it can cause any harm to organizational reputation.</p>\n<p>Check out how LoginRadius prevents corporate account takeover attacks for enterprises:</p>\n<h3 id=\"passwordless-authentication-or-instant-login\" style=\"position:relative;\"><a href=\"#passwordless-authentication-or-instant-login\" aria-label=\"passwordless authentication or instant login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Authentication or Instant Login</h3>\n<p>To remove the risk of passwords altogether, LoginRadius offers <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> or instant login.</p>\n<p>Customers can either login using a magic link or via an OTP delivered to their registered email address or phone number. The best part, this method does not require registration or any preassigned credentials to log in.</p>\n<h3 id=\"multi-factor-authentication\" style=\"position:relative;\"><a href=\"#multi-factor-authentication\" aria-label=\"multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication</h3>\n<p>The secure identity and access management provider also offers two-factor or <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a> (2FA/MFA). This feature provides an extra layer of security to ensure that the right customer gets access to the correct account.</p>\n<p>For example, the customer is required to enter an OTP or answer a security question, even after filling in the login credentials.</p>\n<h3 id=\"risk-based-authentication\" style=\"position:relative;\"><a href=\"#risk-based-authentication\" aria-label=\"risk based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risk-based Authentication</h3>\n<p>This standard CIAM system also offers risk-based authentication (RBA).  This feature verifies a customer's identity by adding a new layer of protection in real-time if any unusual login pattern is identified.</p>\n<p>For example, an access attempt with a different login device, or from a suspicious geographic location to prevent the risk of a corporate account takeover.</p>\n<h3 id=\"security-and-compliance\" style=\"position:relative;\"><a href=\"#security-and-compliance\" aria-label=\"security and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security and Compliance</h3>\n<p>Both the <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">EU's GDPR and California's CCPA</a> are examples of global standards that rule the flow of customer data and keep them safe. Most western countries follow similar regulations, and others are catching up.</p>\n<p>LoginRadius is compliant with the majority of the global standards and you can even tailor it to meet the regulatory requirements depending on the industry and country of business.</p>\n<h3 id=\"consent-management\" style=\"position:relative;\"><a href=\"#consent-management\" aria-label=\"consent management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consent Management</h3>\n<p>At LoginRadius, consent management is another feature that is offered along <a href=\"https://www.loginradius.com/gdpr-and-privacy/\">with privacy compliance</a>. It manages customer's consent about data collection, storage, and communication. Customers can alter existing permissions and apply new ones according to their will.</p>\n<h3 id=\"data-management\" style=\"position:relative;\"><a href=\"#data-management\" aria-label=\"data management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data Management</h3>\n<p>LoginRadius also prevents corporate account takeover attacks with <a href=\"https://www.loginradius.com/data-governance/\">customer data management</a>. It provides an overview of individual profiles from its admin console and tracks their activities.</p>\n<p>Enterprises can manage millions of customers and perform manual actions on behalf of customers, like provisioning new accounts and triggering verification emails.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Corporate account takeover can translate into millions of dollars in losses, damaged brand image, and customer trust. As an enterprise, you and your employees are responsible for keeping finances and data safe.</p>\n<p>Stay informed about evolving threats, understand the warning signs, and practice responses to suspected takeovers.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Corporate Account Takeover Attacks: Detecting and Preventing it","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"April 16, 2020","updated_date":null,"tags":["data security","ciam solution","compliance"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/5014dee26b7967351c23a21431677c80/33aa5/corporate-accnt-takeover.jpg","srcSet":"/static/5014dee26b7967351c23a21431677c80/f836f/corporate-accnt-takeover.jpg 200w,\n/static/5014dee26b7967351c23a21431677c80/2244e/corporate-accnt-takeover.jpg 400w,\n/static/5014dee26b7967351c23a21431677c80/33aa5/corporate-accnt-takeover.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/identity/corporate-account-takeover-attacks/"}}},{"node":{"id":"f2d29722-972e-5285-a97e-63c6734c92a7","html":"<p>Which character do you consider as the end of line or newline? Most developers will answer \\n (except for front-end developers, they would say: \"&#x3C;/br>tag\" 😊 ). But this is not true, let's understand why.</p>\n<p><strong>What is an End of Line character:</strong></p>\n<p>It is a character in a string which represents a line break, which means that after this character, a new line will start. There are two basic new line characters:</p>\n<p><strong>LF</strong> (character : \\n, Unicode : U+000A, ASCII : 10, hex : 0x0a): This is simply the '\\n' character which we all know from our early programming days. This character is commonly known as the ‘Line Feed’ or ‘Newline Character’.</p>\n<p><strong>CR</strong> (character : \\r, Unicode : U+000D, ASCII : 13, hex : 0x0d) : This is simply the 'r' character. This character is commonly known as ‘Carriage Return’.</p>\n<p>As matter of fact, \\r has also has a different meaning. In older printers, \\r meant moving the print head back to the start of line and \\n meant starting a new line.</p>\n<p><strong>OS support</strong></p>\n<p>Unix: Unix systems consider '\\n' as a line terminator. Unix considers \\r as going back to the start of the same line.</p>\n<p>Mac (up to 9): Older Mac OSs consider '\\r' as a newline terminator but newer OS versions have been made to be more compliant with Unix systems to use '\\n' as the newline.</p>\n<p>Windows: Windows has a different style of newline, Windows supports the combination of both CR and LF as the newline character - '\\r\\n'.</p>\n<p><strong>How to check</strong><br>\nThere are lots ways to check this. I use Notepad++ as my text editor for this because it is easy to use and is widely used by developers.<br>\nNPP show all characters</p>\n<p>Open any text file and click on the pilcrow (¶) button. Notepad++ will show all of the characters with newline characters in either the CR and LF format. If it is a Windows EOL encoded file, the newline characters of CR LF will appear (\\r\\n). If the file is UNIX or Mac EOL encoded, then it will only show LF (\\n).</p>\n<p><strong>NPP Extended search</strong></p>\n<p>Press the key combination of Ctrl + Shift + F and select 'Extended' under the search mode. Now search '\\r\\n' - if you find this at end of every line, it means this is a Windows EOL encoded file. However, if it is '\\n' at the end of every line, then it is a Unix or Mac EOL encoded file.</p>\n<p><strong>How to convert</strong></p>\n<p>Let's stick with notepad++ for this, too. Open any file that you would like to convert, click on the Edit menu, scroll down to the EOL conversion option, and select the format that you would like to convert the file to.</p>\n<p><strong>Reference</strong></p>\n<ul>\n<li><a href=\"https://www.compart.com/en/unicode/U+000A\">Unicode Character (U+000A)</a></li>\n<li><a href=\"https://www.compart.com/en/unicode/U+000D\">Unicode Character (U+000D)</a></li>\n</ul>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"EOL or End of Line or newline ascii character","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"September 06, 2017","updated_date":null,"tags":["Engineering","EOL","LF","Linux","Mac","Windows"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/4f4e5464d0975f41f5388d63c602e499/ee604/eol.png","srcSet":"/static/4f4e5464d0975f41f5388d63c602e499/69585/eol.png 200w,\n/static/4f4e5464d0975f41f5388d63c602e499/497c6/eol.png 400w,\n/static/4f4e5464d0975f41f5388d63c602e499/ee604/eol.png 800w,\n/static/4f4e5464d0975f41f5388d63c602e499/f3583/eol.png 1200w,\n/static/4f4e5464d0975f41f5388d63c602e499/e4d72/eol.png 1280w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/eol-end-of-line-or-newline-characters/"}}},{"node":{"id":"483befa5-d4be-59e1-ab02-5f311cfc9f94","html":"<p>These days SSL is a must-have element for websites, but SSL certificates are costly and range from $30 to $500 per year for a single website. Don’t fret! You can get a FREE SSL certificate! Through “<a href=\"https://letsencrypt.org/\">Let's Encrypt</a>\", a free, automated, and open certificate authority, you will be able to acquire the necessary certificate to enable SSL on your website. Check out the below steps you can follow to get an SSL certificate for your site today.</p>\n<p>To obtain this certificate, you will first need to prove ownership of the domain. There are two requirements that you need to meet in order to generate a certificate from “Let's Encrypt”:</p>\n<p><strong>Http-01</strong>:<br>\nYou will need to setup a directory on your web server's root, and the name of this directory should be “.well-know” and with a “acme-validation” directory included within this. Inside these directories, create a file containing the random string that was provided by the ACME server and this file should serve content which is the random string included in the doc.</p>\n<p><strong>Sample Structure</strong></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">/.well-known/acme-validation/&amp;amp;lt;random file name provided by ACME&amp;amp;gt;</span></code></pre>\n<p><strong>Dns-01:</strong></p>\n<p>You will need to create a .TXT record on the subdomain _acme-challenge. For instance, if you would like to obtain an SSL for the domain “example.com”, then you will need to setup a subdomain on this domain - _acme-challenge.example.com - and the content of the .TXT record will be a random string provided by the ACME server.</p>\n<p>Now that you have everything setup, how do you get your FREE SSL? Below, we will go over the various ways to enable SSL for free on your website:</p>\n<p><strong>1. Certbot</strong> : <a href=\"https://certbot.eff.org/\">certbot</a> is a Linux utility that is simple yet powerful. This tool doesn't share private keys with any servers, and it keeps your private key on the client that is being used to generate the cert.  You can install certbot with the following command on ubuntu:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">$ sudo add-apt-repository ppa:certbot/certbot</span>\n<span class=\"grvsc-line\">$ sudo apt-get update</span>\n<span class=\"grvsc-line\">$ sudo apt-get install certbot</span></code></pre>\n<p>The <a href=\"https://certbot.eff.org/\">certbot site</a> has even more details and information for installing this on other systems.</p>\n<p>Once installed, open the DNS Manager (must do!) and call the following command to get the SSL certificate for your domain.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">sudo certbot --text --agree-tos --email &amp;amp;lt;YOUR EMAIL ID&amp;amp;gt; -d &amp;amp;lt;YOUR DOMAIN&amp;amp;gt; --manual --preferred-challenges dns --expand --renew-by-default  --manual public-ip-logging-ok certonly</span></code></pre>\n<p>This command will request that you add the .TXT record on the subdomain _acme-challenge. Once this is added, simply press any key to generate the SSL certificate. It will show the locations of the certified file.</p>\n<p><strong>2. Online using</strong> <a href=\"https://www.sslforfree.com/\"><strong>https://www.sslforfree.com/</strong></a> : This is also a non-profit site and you can get SSL without any installation; just follow the steps to set up the ACME compliant site structure. They provide an easy step-by-step guide for generating the SSL certificate. Once you work through the guide, you will be able to download a copy of your certificate and include on your webserver.</p>\n<p><strong>3. Other ways</strong> : There are lots of other ways to get the “Let's Encrypt” SSL. <a href=\"https://letsencrypt.org/docs/client-options/\">This page</a> contains a list of ACME clients and libraries, so you can choose to work with whichever one that best suits your needs.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"title":"Get your FREE SSL Certificate!","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"July 13, 2017","updated_date":null,"tags":["Engineering","SSL"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/44e96863451de6352d54342c2dd11bf3/bc59e/letsencrypt.png","srcSet":"/static/44e96863451de6352d54342c2dd11bf3/69585/letsencrypt.png 200w,\n/static/44e96863451de6352d54342c2dd11bf3/497c6/letsencrypt.png 400w,\n/static/44e96863451de6352d54342c2dd11bf3/bc59e/letsencrypt.png 512w","sizes":"(max-width: 512px) 100vw, 512px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/get-your-free-ssl-certificate/"}}},{"node":{"id":"6bb79586-2643-5191-a87e-a735ff6e0963","html":"<p>Almost every active website worldwide uses jQuery, you can check stats <a href=\"http://trends.builtwith.com/javascript/jQuery\">here</a> , but using it without optimization might make the DOM very slow. The same goes for other javascript libraries, such as SizzleJS. To ensure the performance of your DOM, you have to follow some best practices for it.</p>\n<p>In this article I am going to list down some of the most critical factors that you need to watch out. Even though this not a complete list; taking care of these will help you optimize those jQuery Selector.</p>\n<h3 id=\"lets-start\" style=\"position:relative;\"><a href=\"#lets-start\" aria-label=\"lets start permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Let's start!</strong></h3>\n<h4 id=\"always-cache-your-selector\" style=\"position:relative;\"><a href=\"#always-cache-your-selector\" aria-label=\"always cache your selector permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Always cache your selector</h4>\n<p>Whenever you apply any selector in jQuery or <a href=\"http://sizzlejs.com/\">SizzleJS</a>,  the selector engine goes through the whole DOM to find the specified element.</p>\n<p>For example, if you use the code below, it will go through the whole DOM twice in order to find \".myClass\" selector.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.myClass&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">show</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.myClass&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">addClass</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;anotherClass&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>But instead of that, if you make all the methods in a chained format like this. It will only try to find that class once.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.myClass&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">show</span><span class=\"mtk1\">().</span><span class=\"mtk11\">addClass</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;anotherClass&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>Or if you want to use this element in other places; you can do so by doing it in this way.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">myElem</span><span class=\"mtk1\"> = </span><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.myClass&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">myElem</span><span class=\"mtk1\">.</span><span class=\"mtk11\">show</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">myElem</span><span class=\"mtk1\">.</span><span class=\"mtk11\">addClass</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;anotherCLass&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>In both of these cases, the selector will be executed only once. Some selectors are very slow to traverse and passing them again and again will make your DOM very slow.</p>\n<p>Read on the next point to understand,  how the type of selector affects performance.</p>\n<h4 id=\"prioritizing-selectors-based-on-their-performance\" style=\"position:relative;\"><a href=\"#prioritizing-selectors-based-on-their-performance\" aria-label=\"prioritizing selectors based on their performance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prioritizing selectors based on their performance</h4>\n<p>Selector's type affects the performance of your site. SizzleJS is a smart selector engine that also uses native js APIs for finding specific element. This is the main reason why ID selector and tag selector perform faster than others. But, if you prefer using jQuery, it’s pretty much the same. Modern browsers also have an API to find an element by class name but, let’s just focus on jQuery and SizzleJS.</p>\n<ul>\n<li>The order of selector's performance (fast -> slow) is</li>\n<li>ID selector ($(\"#ID\")) = Fastest</li>\n<li>Tag ($(\"Tag\")) = Fast</li>\n<li>Class ($(\".Class\")) = Average</li>\n<li>Attribute ($(\"[Attribute='Value']\")) = Slow</li>\n<li>Pseudo ($(\":pseudo\")) = Slower</li>\n</ul>\n<p>You can verify performance. In some exceptional cases, the selection of those tags does not matter; It’s all in the combination of the selectors. Because, it affects the performance of your site, let's discuss this on next point.</p>\n<h4 id=\"selecting-id-selector-first-and-then-other-ones\" style=\"position:relative;\"><a href=\"#selecting-id-selector-first-and-then-other-ones\" aria-label=\"selecting id selector first and then other ones permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Selecting ID selector first and then other ones</h4>\n<p>If you have the combination of selectors, then the sequence of selectors matter for optimization. For example:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;#someId div .someClass&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>The same code can be written as:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;#someId&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">find</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;div .someClass&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>Both of these variant represent the same thing but in the term of performance, second one is better. The reason for that is because in the first code, Sizzle will go through the DOM 3 times to find #someId, div, and .someClass.</p>\n<p>In the second one, the selector engine will go through the DOM again but, this time, it’ll only look for #someId and then find the rest inside that element without going through the DOM again.</p>\n<p>See how this will affect performance.</p>\n<h4 id=\"being-more-specific-in-right-hand-side-instead-of-left-hand-side\" style=\"position:relative;\"><a href=\"#being-more-specific-in-right-hand-side-instead-of-left-hand-side\" aria-label=\"being more specific in right hand side instead of left hand side permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Being more specific in right hand side instead of left hand side</h4>\n<p>Sizzle executes selector from right to left so it will definitely  improve performance if applied in right except left.</p>\n<p><strong>Unoptimized code:</strong></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">( </span><span class=\"mtk8\">&quot;div.myclass .myChildClass&quot;</span><span class=\"mtk1\"> );</span></span></code></pre>\n<p><strong>Optimized code:</strong></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">( </span><span class=\"mtk8\">&quot;.myclass td.myChildClass&quot;</span><span class=\"mtk1\"> );</span></span></code></pre>\n<p>If you don’t see the difference, find the div and td.</p>\n<h4 id=\"selection-inside-a-parent-always-improves-performance\" style=\"position:relative;\"><a href=\"#selection-inside-a-parent-always-improves-performance\" aria-label=\"selection inside a parent always improves performance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Selection inside a parent always improves performance</h4>\n<p>When you have a context, or any level of parent, then you can select an element inside that parent. It will perform better this way than selecting it directly. Because, in this case, the selector engine goes through the DOM once to find the parent.</p>\n<p>For example, assuming you are trying to find “.child” class:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"7\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.child&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>Is slower than</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"8\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">parent</span><span class=\"mtk1\"> = </span><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;#parent&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">parent</span><span class=\"mtk1\">.</span><span class=\"mtk11\">find</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.child&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">show</span><span class=\"mtk1\">();</span></span></code></pre>\n<p>You can also specify context by following syntax</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"9\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.child&quot;</span><span class=\"mtk1\">, </span><span class=\"mtk12\">parent</span><span class=\"mtk1\">).</span><span class=\"mtk11\">show</span><span class=\"mtk1\">();</span></span></code></pre>\n<h4 id=\"excessive-selector-slows-down-your-query\" style=\"position:relative;\"><a href=\"#excessive-selector-slows-down-your-query\" aria-label=\"excessive selector slows down your query permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Excessive selector slows down your query</h4>\n<p>The selector engine always checks every selector you have specified and it might traverse slowly. That being said, always make sure to specify minimum selectors in order to maintain the performance.</p>\n<p>For example, you are  trying to find “.myClass” using both of these code variants,</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"10\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;#div div span.myClass&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>Is slower than</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"11\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;#div&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">find</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.myClass&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<h4 id=\"\" style=\"position:relative;\"><a href=\"#\" aria-label=\" permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a></h4>\n<p><strong>The .children() tag is quicker than .find()</strong></p>\n<p>In case, you are trying to find a children element, it is recommended to use .children() instead of .find(). Using .find() will tell jQuery to look on every level of children, while .children() will find only the first level children. Therefore .children() is faster than .find().</p>\n<p>For example, you are trying to find “.child” inside $parent and it is the first level children of the $parent.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"12\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk12\">parent</span><span class=\"mtk1\">.</span><span class=\"mtk11\">find</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.child&quot;</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>Is slower than</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"13\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk12\">parent</span><span class=\"mtk1\">.</span><span class=\"mtk11\">children</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.child&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">show</span><span class=\"mtk1\">();</span></span></code></pre>\n<h4 id=\"-1\" style=\"position:relative;\"><a href=\"#-1\" aria-label=\" 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a></h4>\n<p>Use minimum DOM append</p>\n<p>DOM manipulation is very heavy so always try to ignore or minimize using it.</p>\n<p>For example, by using the code below, it will make the process sluggish because you didn’t apply any selector caching. Resulting in going through  the DOM ten times and appending an element.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"14\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk15\">for</span><span class=\"mtk1\">( </span><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">i</span><span class=\"mtk1\"> = </span><span class=\"mtk7\">0</span><span class=\"mtk1\">; </span><span class=\"mtk12\">i</span><span class=\"mtk1\"> &lt; </span><span class=\"mtk7\">10</span><span class=\"mtk1\">; </span><span class=\"mtk12\">i</span><span class=\"mtk1\">++) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.myClass&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">append</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>But instead of using the above code, using the code below will solve the whole issue of appending and traversal. Not only that, it will merge the 10 times manipulation of DOM into a single call.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"js\" data-index=\"15\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">myClassInnerHtml</span><span class=\"mtk1\"> = </span><span class=\"mtk8\">&quot;&quot;</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">for</span><span class=\"mtk1\">( </span><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">i</span><span class=\"mtk1\"> = </span><span class=\"mtk7\">0</span><span class=\"mtk1\">; </span><span class=\"mtk12\">i</span><span class=\"mtk1\"> &lt; </span><span class=\"mtk7\">10</span><span class=\"mtk1\">; </span><span class=\"mtk12\">i</span><span class=\"mtk1\">++ ){</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">myClassInnerHtml</span><span class=\"mtk1\"> += </span><span class=\"mtk8\">&quot;&quot;</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk11\">$</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;.myClass&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">append</span><span class=\"mtk1\">(</span><span class=\"mtk12\">myClassInnerHtml</span><span class=\"mtk1\">);</span></span></code></pre>\n<p>All the tips I have mentioned above is highly dependant on your requirement but one thing is for sure; Optimization will definitely improve your process.  ‘SizzleJS’ is most the powerful and quick element selector. But, without writing optimized code you can’t prevent the DOM from freezing. With that being said,  jQuery is awesome but without optimized code it can get more DOM freezes and frustrate your users.</p>\n<p>I hope this help you optimize your element selecting. Thank you and have a great coding.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n</style>","frontmatter":{"title":"Optimize jQuery & Sizzle Element Selector","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"November 05, 2015","updated_date":null,"tags":["Engineering","JQuery"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/792265a42f42bb24e4108f2d9f5488be/6d161/jquery-sizzle-element-selector-150x150.png","srcSet":"/static/792265a42f42bb24e4108f2d9f5488be/6d161/jquery-sizzle-element-selector-150x150.png 150w","sizes":"(max-width: 150px) 100vw, 150px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/optimize-jquery-sizzle-element-selector/"}}},{"node":{"id":"164e3e30-f61c-5289-990a-b727008e6b86","html":"<p>QQ is the most popular ID provider for Chinese people since the 90s, it is always the first choice for websites who want to provide social login functionality for their Chinese users. But similar to other ID providers from China, the app you created needs to be reviewed before actually launching it. Reading Chinese and using Google translate for each line is not that much of fun, and in this tutorial we will go through step by step to figure out how to submit a QQ app for review. Do note: You can always download a Google translate extension for your browser to translate each page to English, it would probably be the easiest way for you, but here I decide to keep it Chinese, Let's go.</p>\n<ol>\n<li>\n<h3 id=\"navigatetoqq-connect\" style=\"position:relative;\"><a href=\"#navigatetoqq-connect\" aria-label=\"navigatetoqq connect permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Navigate to <a href=\"http://connect.qq.com/\">QQ Connect</a></h3>\n<p>And click the 4th tab (in orange box)  </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 6.923076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAABCAIAAABR8BlyAAAACXBIWXMAAAsTAAALEwEAmpwYAAAASElEQVQI1wE9AML/AOre2Mu8s9PW2NDQ0O/v7/////z8/Pf39/T09PPz8/Py8pzQ7rHW7vj08vb3+Pr6+vn5+f39/fn5+f///2uxN0VcL5Y7AAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"homepage\"\n        title=\"homepage\"\n        src=\"/static/d2c40003bfa59e2135ccfcfc4fd01ee7/e5715/Homepage.png\"\n        srcset=\"/static/d2c40003bfa59e2135ccfcfc4fd01ee7/a6d36/Homepage.png 650w,\n/static/d2c40003bfa59e2135ccfcfc4fd01ee7/e5715/Homepage.png 768w,\n/static/d2c40003bfa59e2135ccfcfc4fd01ee7/c27e7/Homepage.png 2144w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n</li>\n<li>\n<h3 id=\"registration\" style=\"position:relative;\"><a href=\"#registration\" aria-label=\"registration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Registration</h3>\n<p>After being redirected to <a href=\"http://connect.qq.com/manage/login\">QQ connect login page</a>, it asks you to fill in your credentials, since I do not have one, I will register for one and feel free to skip this step if you have already got one.</p>\n<p>Click \"register a new account\", like shown:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 61.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAAAsTAAALEwEAmpwYAAAChUlEQVQoz2OIj4v3dHb0CQj08gsIiYhMy8iMT07X9433iUxMTEqOTUiOSwSilPikFCAjITk1AcyIByMGefswI5dgQ5cQfecQbccgdVt/LXt/DVt/dVs/TTs/LTs/HQd/bXt/IAlC9v4GLiEmHhEmHuGmHhEMIpahXmEJ3lGpHhGJSdnFda09VU2dNS1dtS1dda1dje3dTW1dDS3tTa3tza3trR1dOfmFQeHRIdGJAZHxDAqOUT7hcWEB/u6W9ouWr/7////fv3//YwMQ8XXr1nn7BUbEpQRFJTA4hCRHxCb6WGvoKGvPXbLq/79/N2/duv/g4bu3b4FKf/z88e79uy9fv3z9+vXHz59AkdVr1gBDB6g5Ki6JQc8r0Tc83jkoWMvJf9GKde/evWtqqJ/Y233y1GmQbX/+/vz298uX75+/fIZoXrV6tZuPX1hscjDQZg23BKDmkJgUN9/QZavWvXn7tqO1oaW+4vDRo0ClH76/ePjp9Pc/H4HsP3/+AMn58+dZ2diFRseDNIs7xOi4R+p7Rsta+fXPW/7zx7eDhw/vO7D/0eOHQKUPPpzeeq/h2eerQPbvvyDNE+culbf0MvCKBupiYDAJ57CK5LSJZtDzq5+xAmQD1gD79+/Prx9AunHOGgYdP1bLaKBGBk2vWH2fOD2fOEWnsLq+GU8fP7p589ZtMLhz587t27du3b557dq1C0cPHd207s61K7V9M4AqDf0Stb3jGHIz01OSEpIT4vKy0jPSUpPBICUlOTUlGQ5SgPyUlKRkEJmRlpaXlZGTmQ5EDCmpaUkpqbGJKSExyYlgaSAAxkRwTApYTypQT1x8UkIiyBCgbGJyamRsdFxiIpABALv+g1MrHZQzAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"qq-register-1024x630\"\n        title=\"qq-register-1024x630\"\n        src=\"/static/52e1d77254054ed5be6de222675042b2/e5715/qq-register-1024x630.png\"\n        srcset=\"/static/52e1d77254054ed5be6de222675042b2/a6d36/qq-register-1024x630.png 650w,\n/static/52e1d77254054ed5be6de222675042b2/e5715/qq-register-1024x630.png 768w,\n/static/52e1d77254054ed5be6de222675042b2/2bef9/qq-register-1024x630.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>It will link you to <a href=\"http://zc.qq.com/en/index.html?from=pt\">this page</a>, it is written in English, sweet! I am pretty sure you can register an account by yourself. After filling in the information, it will send a confirmation email to your email box. After your email is verified go back to the <a href=\"http://connect.qq.com/manage/login\">login page</a>, and use the QQ number you just got to log in with.</p>\n</li>\n<li>\n<h3 id=\"creating-the-app\" style=\"position:relative;\"><a href=\"#creating-the-app\" aria-label=\"creating the app permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Creating the app</h3>\n<p>Click the big green button on the right side of your screen to create an app, and here we will create a website type app.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 47.69230769230769%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"create_app_button\"\n        title=\"create_app_button\"\n        src=\"/static/ad1c174a28bc545fb5ca17cc0aac5629/e5715/create_app_button.png\"\n        srcset=\"/static/ad1c174a28bc545fb5ca17cc0aac5629/a6d36/create_app_button.png 650w,\n/static/ad1c174a28bc545fb5ca17cc0aac5629/e5715/create_app_button.png 768w,\n/static/ad1c174a28bc545fb5ca17cc0aac5629/f238d/create_app_button.png 2078w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 58.46153846153847%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"app_for_website\"\n        title=\"app_for_website\"\n        src=\"/static/bc9023962ef111fd723baa7ff9d86905/e5715/app_for_website.png\"\n        srcset=\"/static/bc9023962ef111fd723baa7ff9d86905/a6d36/app_for_website.png 650w,\n/static/bc9023962ef111fd723baa7ff9d86905/e5715/app_for_website.png 768w,\n/static/bc9023962ef111fd723baa7ff9d86905/0ff19/app_for_website.png 2084w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>After choosing the type, you need to fill in some basic information for your website, in case if you do not use Google translate to translate the page, I did a little translations for you, there you go.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 58.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"form_with_english_translations\"\n        title=\"form_with_english_translations\"\n        src=\"/static/172606c234c6775b86bb3f66d13bdfba/e5715/form_with_english_translations.png\"\n        srcset=\"/static/172606c234c6775b86bb3f66d13bdfba/a6d36/form_with_english_translations.png 650w,\n/static/172606c234c6775b86bb3f66d13bdfba/e5715/form_with_english_translations.png 768w,\n/static/172606c234c6775b86bb3f66d13bdfba/9e7e4/form_with_english_translations.png 2056w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Here is what I have filled in  </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.15384615384616%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAAAsTAAALEwEAmpwYAAABiklEQVQoz4WRy07DMBBF85EsWLPnV1gA34DYwgKJgtgAQgIWlDcKojxapUnaOI4d24lf3CRqQVURV2k00fjeOeMGN73du9PD/uVF//JckMSWVGRJmSUkHuXxKBsPd66/zp4+RTpik1hkKZ/Gik75NKkLEhzdPu7dvT+Gg6eXsKyN9l5oZ503tlFt7OFAPE+U99ZY55x3vn3w8z5YudKrF/z+dZAmKWFS1IaKytq2+Z+Cg0ifxEZqZNpKKSGE1tq5HzNy3B9RgWLZ8CMM30LKC855FEUwd8xumcxMOBDs9be3jtc3emv7/U2EGa2LoiCEVFWFo3amOUtd10opdOEPmCAvbw8TGpWKdr2yLEWrqtVS4A4rwM1KWVnT3iMmG4Ng8MM85+6KuRM1zjSTFyI7VDRmrh9svPWvhZvJC2YpRJ7ntChQU2VKCWyXS/wBHheJXbGXlDKnFPWimbOCMwY/IVmUpEgBh9JWSInZ8CIZYpwvmTxMSZqzxk8pAprNQdiSo4vP8XgMp1QKIN9+HbGVtuCDKwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"lucius_fillin_info\"\n        title=\"lucius_fillin_info\"\n        src=\"/static/3f366e572e6becffefbe1cdb08ecaee1/e5715/lucius_fillin_info.png\"\n        srcset=\"/static/3f366e572e6becffefbe1cdb08ecaee1/a6d36/lucius_fillin_info.png 650w,\n/static/3f366e572e6becffefbe1cdb08ecaee1/e5715/lucius_fillin_info.png 768w,\n/static/3f366e572e6becffefbe1cdb08ecaee1/38116/lucius_fillin_info.png 2086w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Please note, when you fill in your website address, it will ask you to verify your website, so you need to copy and paste the javascript code under your website page, and then click the button beside to verify it.<br>\n<span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"verify_successfully\"\n        title=\"verify_successfully\"\n        src=\"/static/443daae7eb0473185304a49e29295c47/e5715/verify_successfully.png\"\n        srcset=\"/static/443daae7eb0473185304a49e29295c47/a6d36/verify_successfully.png 650w,\n/static/443daae7eb0473185304a49e29295c47/e5715/verify_successfully.png 768w,\n/static/443daae7eb0473185304a49e29295c47/b75f8/verify_successfully.png 2124w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Once all the information is filled, then move on to next step, click the blue text link, it asks you to upload different sizes of the images about your company.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.769230769230774%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAANCAIAAAAmMtkJAAAACXBIWXMAAAsTAAALEwEAmpwYAAABiklEQVQoz41S20rEMBDt1/sLvgo++iwogoqg4Iqi4t3VdZVu2jTbNGmSprnVSbsqyooe0iGdzMmcmUlysLN5en5xPBpRSruu8963WjdNw+vaqHo0rVb2EKa8UVJrba01xjjnwEJwMp6+vszw49NzhgvtOmm80BaOIS44S6S5zhttrHfOfyCEADaS95/Ea4poSZiQyvjGOGVd9z8kl9M5KUtKS8YqAaiFafXncejXD4Cotm0hfzL8a+VcuwgL4Y+EvOY5xnBFcouOzt92rtD+OD8rY35WVRU0j/WoenDOwX55WNXoJsree1jfulndfVg7mWzmOCNkDsjzvCgKQkiGUJZlGGOE0OCBTZqmcEMkg3TFLSzBNTCLAgMTgqCqOBcf/DLloUckCwFDBWlRFHy0h+whYErOh1+QEPHGlJDaeu8G19Iky8ln0+37dDLDTCkplYK39Z25vOELsqrbGWGU1VKIqBNq4HywSqnfprUgH443rid3KJtjnENjodVDV6HDsOnLj6MCD9gf5Hc4t+l+RX194wAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"add_assets\"\n        title=\"add_assets\"\n        src=\"/static/1c6abeed43cc1b132fcf8716aba885a0/e5715/add_assets.png\"\n        srcset=\"/static/1c6abeed43cc1b132fcf8716aba885a0/a6d36/add_assets.png 650w,\n/static/1c6abeed43cc1b132fcf8716aba885a0/e5715/add_assets.png 768w,\n/static/1c6abeed43cc1b132fcf8716aba885a0/f238d/add_assets.png 2078w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 59.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAAAsTAAALEwEAmpwYAAABS0lEQVQoz4WRS0vDQBSF86/8R67c6N6l+4JuXHSlK/eCiOATrViUQomtiNS+qG1qkpnk3nmPY5JCSkr7Mcxi7pw5d871ns5PH2+v7+4fOp13a60SkgEklJA4iqOo9hxcdgKRxAjIEQVjbknOrdYM0Tvw4agd9r77g9E4Qkm5okzZBSCN1LaMccu4zSIyb6clDrtAot80TQEZcs6FsGspxIx5NMHJzzwMiVI6CAJCSF5eiV5QiOfh7OOrO5oO3W+ca0LphKJUumqolJJSioxCfOEfnzT2643dz1nTHQlXZWiUrLaqSxTiBMgkGFGMpXbPShf0APRLqECZPJ4c50YpBYAsk4XzUmPZ3e1X3Loi7fg/c23WBlY+za/Wu3HNJ0M0G8RuztUaAjC+YVoO171Xnn7OXoud9cWcL/25ijZmhfPNOHmbpr0INoi1/gNOQ7ToqskKJgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"upload_different_assets\"\n        title=\"upload_different_assets\"\n        src=\"/static/5f8cf9267cdfee8e942f194c3fe06b17/e5715/upload_different_assets.png\"\n        srcset=\"/static/5f8cf9267cdfee8e942f194c3fe06b17/a6d36/upload_different_assets.png 650w,\n/static/5f8cf9267cdfee8e942f194c3fe06b17/e5715/upload_different_assets.png 768w,\n/static/5f8cf9267cdfee8e942f194c3fe06b17/d50e7/upload_different_assets.png 2280w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span><br>\nThen, it is time to submit by clicking that big green button in the middle.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 58.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"app_submit\"\n        title=\"app_submit\"\n        src=\"/static/3920bf6485419cf07bd9184e670c0969/e5715/app_submit.png\"\n        srcset=\"/static/3920bf6485419cf07bd9184e670c0969/a6d36/app_submit.png 650w,\n/static/3920bf6485419cf07bd9184e670c0969/e5715/app_submit.png 768w,\n/static/3920bf6485419cf07bd9184e670c0969/1ffbd/app_submit.png 2108w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Confirm it by clicking the right button again.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAALCAIAAADwazoUAAAACXBIWXMAAAsTAAALEwEAmpwYAAAB4klEQVQoz2WSQYvTQBTH83UEQfAqIgpeXLbJbtJ0kpnJZDKTSerRi19A2EO2vSzsxZMHF2ytvXgR2i609BO4oJYVD7UVZClIy9KlZOvr1ByKPx7hzeP937y8N0aZlB6U7jw07z4+vP/Iugf+nvsEY4I8z8fY8/2KB54PBhGMMQTBAeOcGzIWjFPKcMAIC2nASchZFEVCCKWJlUoK4CjjeGuAkagEMgMahGHouhXLOjBNs1Tat0zLdmzbcZzy5m4AIcQY29ZIdF0DCmzOaSqEzLLjZqP5QdNqtd4XNDXtdrtWq0FT2xY24lDQQ2+PBNx2yv3B+Xq9zvPb9X/keQ7ffr9PCEnTtBBH9MB7FnIJY+n2Pv1Z/BqPx9PpZLGYr1arpeZaA+Jut7sjZhHed58Syh3H7vXOr65mFxefR99Go68/Li+/T6Y/ASg3m81A3Ol0dsRcsDIxYWZuxR0Oh5Bxs7y5Xs6/TD5Of48W8+Wm6dt/bQ8Ggx0x/H21+rxahYGJer0Oc2pojk5eHJ28PD599frNaeNd8+zsLcwsy7KdgUkQiUjFsE7FAubrrcBTIJgiVHGRg5CLfR8MXopelYoLDEyZTyjjIuSwrDiMpIxVwMGFpETIJFYJBIVUEbwnIWEvquAv1QlU6soQK5cAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"confirm_submit\"\n        title=\"confirm_submit\"\n        src=\"/static/4910e773cf01becfee8b5ffd4741a081/e5715/confirm_submit.png\"\n        srcset=\"/static/4910e773cf01becfee8b5ffd4741a081/a6d36/confirm_submit.png 650w,\n/static/4910e773cf01becfee8b5ffd4741a081/e5715/confirm_submit.png 768w,\n/static/4910e773cf01becfee8b5ffd4741a081/d8d63/confirm_submit.png 2026w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n</li>\n</ol>\n<p>If everything works well, you will get you app approved in a week, just remember to check it back periodically, good luck!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Best practice for reviewing QQ app","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"August 04, 2015","updated_date":null,"tags":["SocialLogin","QQ"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/d2af27cda772fc4638659b578c92beb0/7d145/qq-app-review-best-practices.png","srcSet":"/static/d2af27cda772fc4638659b578c92beb0/69585/qq-app-review-best-practices.png 200w,\n/static/d2af27cda772fc4638659b578c92beb0/497c6/qq-app-review-best-practices.png 400w,\n/static/d2af27cda772fc4638659b578c92beb0/7d145/qq-app-review-best-practices.png 610w","sizes":"(max-width: 610px) 100vw, 610px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/best-practice-reviewing-qq-app/"}}},{"node":{"id":"51477864-42e4-51b1-8aa8-15c0cd74431c","html":"<p>When we start thinking about authentication in any kind of software (it can be web, mobile, desktop, or even console), the first thing that comes to mind is username/password, this is an older but still effective technique to protect and identify users. Securing these passwords is not an easy task we require better techniques to secure these passwords from attackers. Generally, passwords stored in databases, so we can secure passwords by traditional techniques to prevent access to databases like firewalls, role definitions, etc. but just to prevent database intrusions is not a fully secured way, we require further password protections by converting them into non-readable (encrypted) formats. To understand encrypting passwords we have to understand plain text passwords and how these kinds of passwords are insecure.</p>\n<p><strong>Let's start our journey</strong></p>\n<h1 id=\"plain-text-passwords-never-store-plain-text-passwords\" style=\"position:relative;\"><a href=\"#plain-text-passwords-never-store-plain-text-passwords\" aria-label=\"plain text passwords never store plain text passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Plain text passwords [Never Store Plain text Passwords]</h1>\n<p>Plain text passwords are stored directly in a database without any encryption. These passwords are very insecure because:\n- If someone hacks your database he can access any account and do anything possible after login.\n- Developers or employees who are working on a project commonly misuse the password and spread these passwords to other people for misuse.</p>\n<p>  As a hard and fast rule plain text passwords should NOT be accepted in any case or used for any project or product.</p>\n<h1 id=\"encrypted-passwords-not-recommended\" style=\"position:relative;\"><a href=\"#encrypted-passwords-not-recommended\" aria-label=\"encrypted passwords not recommended permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Encrypted passwords [Not recommended]:</h1>\n<p>Encryption helps us by protecting data from hackers. In network communication, the same techniques can be used in saving passwords. Any encryption algorithm can be used to protect passwords. So on registration plain text passwords are encrypted and saved to your database.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">```</span>\n<span class=\"grvsc-line\">EncryptedPassword = Encrypt ( Password, Key);</span>\n<span class=\"grvsc-line\">```</span></code></pre>\n<p>Get this encrypted password from database then de-crypt and match\n<code>Password = Decrypt ( EncryptedPasword, Key);</code></p>\n<p>Match with user entered password.</p>\n<p>But passwords will still not be fully secured because encrypted data can be always be de-crypted with the encryption key if someone get the key then they can de-crypt your password.</p>\n<h1 id=\"hashed-passwords-recommended\" style=\"position:relative;\"><a href=\"#hashed-passwords-recommended\" aria-label=\"hashed passwords recommended permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hashed passwords [Recommended]</h1>\n<p>Hashing is a method of encryption to get original data from hash. Hashing algorithms are used in network data communications. The encryption encrypts the data but hashing protects tampering with the encrypted data. Hashing algorithms are widely used in securing passwords.</p>\n<p>In case of hashing validation of password performed refer to the following pseudo-code:</p>\n<p>On registration</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">PasswordHash = HASH(Password);</span></code></pre>\n<p>Some of the hashing algorithms support salts(a set of characters that is appended to your hash) like HMAC</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">PasswordHash = HASH(Password, salt);</span></code></pre>\n<p>On login the same process happens, get hash from users entered password</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  inputPasswordHash = HASH(inputPassword);</span></code></pre>\n<p>And compare with the saved password</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  If(SavedPassworHash == inputPasswordHash){</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">  //user get login</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">  }</span></code></pre>\n<p>For making a strong hash from non-salted hash algorithms, salt is appended or prepended to your password string. Appending and prepending also has two kinds of implementations one is a universal salt and the second is per password random salt, let us understand one by one.</p>\n<p><strong>Universal salt :</strong> in this implementation every password has one salt.</p>\n<ul>\n<li>\n<p>Universal salt prepend</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">PasswordHash = Hash(Salt+Password);</span></code></pre>\n</li>\n<li>\n<p>Universal salt append</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">PasswordHash = Hash(Password+Salt);</span></code></pre>\n<p><strong>Per password salt :</strong></p>\n</li>\n</ul>\n<p>In this implementation every password has it's own random salt, but the question is how we preserve salt for a password? Answer is the salt is appended with password by a separator. And on login split that saved string by separator and get hashed password and salt.</p>\n<p>On registration when we save password</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"7\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  Salt = RandomString();</span>\n<span class=\"grvsc-line\">  PasswordHashWithSalt = Hash(Password+Salt) + &quot;:&quot; + Salt;</span></code></pre>\n<p>On login when compare password : first split salt and password hash</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"8\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">  StringArray = Split(PasswordHashWithSalt , &quot;:&quot; );</span>\n<span class=\"grvsc-line\">  Salt = StringArray\\[1\\];</span>\n<span class=\"grvsc-line\">  PasswordHash = StringArray\\[0\\];</span></code></pre>\n<p>Than get hash of user entered password by salt</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"9\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">inputPasswordHash = Hash(inputPassword + Salt);</span></code></pre>\n<p>Then compare both password hash</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"10\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">If(PasswordHash == inputPasswordHash){</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">//user get login</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<p><strong>Some popular encryption methods :</strong> Most of people use following algorithms for hashing passwords, explaining all algorithms is out of scope of this blog. I am adding reference URLs for more reading. I am adding only strong hashing algorithms </p>\n<ol>\n<li><a href=\"http://en.wikipedia.org/wiki/PBKDF2\">PBKDF2</a></li>\n<li><a href=\"http://en.wikipedia.org/wiki/Bcrypt\">bcrypt</a></li>\n<li><a href=\"http://www.tarsnap.com/scrypt.html\">scrypt</a></li>\n<li><a href=\"https://en.wikipedia.org/wiki/Argon2\">Argon2</a></li>\n</ol>\n<h2 id=\"hash-cracking-techniques\" style=\"position:relative;\"><a href=\"#hash-cracking-techniques\" aria-label=\"hash cracking techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hash cracking techniques</h2>\n<p><strong>Brute force:</strong> It is the most popular password cracking technique, in this loop every combination of numbers and alphabets are tried. Suppose one system have password minimum length is 6 digits then</p>\n<p>000000, 000001,000002……………….111111,111112……..AAAAAA etc.</p>\n<p>In any case user have set simple password like 123123, it will be cracked simply. How to prevent this kind of scenarios</p>\n<ol>\n<li>Enforce to user to use at-least one number, one symbols, one capital letter and one small letter in password.</li>\n<li>On login form if someone entered more than three time wrong password for one username then ask for human verification by captcha, it will be prevented by automatic brute force password generator.</li>\n</ol>\n<p><strong>Dictionary attacks:</strong></p>\n<p>In crypt-analysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or pass-phrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary. (<a href=\"http://en.wikipedia.org/wiki/Dictionary_attack\">Wikipedia</a>)</p>\n<p>it is just extended version of brute force attack, in this attacker attack by dictionary words, most of time people set their password as meaningful name to keep easily in mind. And in this attack.</p>\n<p><strong>Rainbow tables</strong></p>\n<p>A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plain text password up to a certain length consisting of a limited set of characters. It is a practical example of a space/time trade-off, using less computer processing time and more storage than a brute-force attack which calculates a hash on every attempt, but more processing time and less storage than a simple look-up table with one entry per hash. Use of a key derivation function that employs a salt makes this attack unfeasible. (<a href=\"http://en.wikipedia.org/wiki/Rainbow_table\">Wikipedia</a>)</p>\n<h2 id=\"migrating-hashing-algorithm\" style=\"position:relative;\"><a href=\"#migrating-hashing-algorithm\" aria-label=\"migrating hashing algorithm permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Migrating Hashing algorithm</h2>\n<p>Sometimes people realize that their Hashing algorithm is weak so they think to migrate system to one algorithm to another but hashing algorithms are one way so getting original password is not possible so the question becomes how to make this possible. There are two ways to do this.</p>\n<p><strong>Reset all passwords:</strong> In this approach just migrate your algorithm from one to another but keep password hash same, but password will not be matched because hash of one algorithm doesn't match with hash of another algorithm, so email to user about it that our system has improved security system and send link with this email for resetting password, so user will reset password.</p>\n<p><strong>Migrate on login:</strong> this approach is tricky in this case maintain one parameter for checking is password upgraded to new algorithm, set false for all user by default and when use come for login check this check if it is false then compare password with old algorithm and if password get matched then start user's session and get newer hash from plain text password and saved to database and update is password upgraded check to true. Now from next time user's password will be checked by newer algorithm.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"title":"Password Security","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"May 14, 2015","updated_date":null,"tags":["Security","Password"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/e7bb89604f85c7699b36ea7c43eab30e/7d145/password-security.png","srcSet":"/static/e7bb89604f85c7699b36ea7c43eab30e/69585/password-security.png 200w,\n/static/e7bb89604f85c7699b36ea7c43eab30e/497c6/password-security.png 400w,\n/static/e7bb89604f85c7699b36ea7c43eab30e/7d145/password-security.png 610w","sizes":"(max-width: 610px) 100vw, 610px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/password-secure/"}}},{"node":{"id":"3340ca88-bb18-5f1c-bc38-4c541128b221","html":"<p>With Information Technology becoming more and more Cloud based nowadays (due to industry demanding reliability and scalability in their infrastructure), the Cloud storage system has become a very feasible solution. Various organizations are migrating their data to cloud storage, due to a few simple reasons. They want data to be easily accessible, cost effective and reliable.</p>\n<p>*<strong>*How is Cloud storage better than any traditional  data storage**</strong></p>\n<ul>\n<li>Performance: We are using NoSQL for Identity storage, NoSQL storage brings powerful read/write performance. We are maintaining low latency SSD for storage, this is why performance of NoSQL storage is continually progressing ahead of traditional HDD storage.</li>\n<li>Maintenance: Doing everything in-house is not ideal for businesses especially when you are a start-up or small to mid-sized business. Maintaining in-house traditional databases is very painful, you lose focus from you main application/feature, this is why SaaS(Software as a Service) solutions are more feasible. They allow you to outsource this nasty upkeep to those who know best and allow you to focus on your strengths.</li>\n<li>Support: Probably the most important thing that every single customer wants from providers. This is also one of biggest reasons to go for paid solution instead of Open source or free. Cloud storage has an advantage in this regard, support for these paid cloud storage solutions is very quick, accurate and efficient when compared with non-existent support for in-house solutions.</li>\n<li>Reliability: If you have any doubt on cloud storage's reliability then I can  assure you that the cloud is built for reliability and up time. The architecture of cloud storage makes it reliable, no miracle or magic behind this. Organizations from start-ups to established institutions, everyone requires up-time because the less up-time the less reliable your application is, and will impact your business.</li>\n<li>Security: Security is more subjective and anyone can argue both sides when you store data on the cloud, but if you find a vendor that is trusted then I don't think data on the cloud is any more or less secure than traditional storage. It is becoming more and more secure everyday and Cloud storage solutions have already captured a large market share of storage solutions.</li>\n</ul>\n<p>*<strong>*Use Case**</strong></p>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius identity storage</a> provides the above solution, LoginRadius is managing its infrastructure on the cloud and has never experienced data breaches or down-times. Infrastructure that makes sure you retain certain vital attributes in the storage is critical, this necessitates your user's identities being stored in an extremely reliable system such as is implemented with LoginRadius identity storage. Utilizing some extremely robust cloud storage providers(<a href=\"http://azure.microsoft.com/en-us/\">Microsoft Azure</a>) LoginRadius offers top of the line availability and reliability of user data.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Cloud storage vs Traditional storage","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"April 21, 2015","updated_date":null,"tags":["Cloud","Storage"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/1af61cfd21d04083f6850cef32d95d7f/7d145/cloud-vs-traditional-storage-1.png","srcSet":"/static/1af61cfd21d04083f6850cef32d95d7f/69585/cloud-vs-traditional-storage-1.png 200w,\n/static/1af61cfd21d04083f6850cef32d95d7f/497c6/cloud-vs-traditional-storage-1.png 400w,\n/static/1af61cfd21d04083f6850cef32d95d7f/7d145/cloud-vs-traditional-storage-1.png 610w","sizes":"(max-width: 610px) 100vw, 610px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/cloud-storage-vs-traditional-storage/"}}},{"node":{"id":"41ab7dc9-7483-57b9-9198-9e45be3ac8f9","html":"<p>If you have stored a GUID through the C# driver to mongoDB and now you want to run a query by GUID, you can't query directly because mongoDB doesn't recognize GUID so when we query through mongo shell no result will be returned. To use the power of mongo shell for querying data on mongo by GUID, you should follow these steps.</p>\n<p><strong>1. Convert GUID data to Base64</strong></p>\n<p>Convert you GUID data to base64 , you can use any online tool for this. </p>\n<p>So suppose your GUID is: 00112233-4455-6677-8899-aabbccddeeff</p>\n<p>Then the base 64 version will be: MyIRAFVEd2aImaq7zN3u/w==</p>\n<p><strong>2. Query by BinData object in mongo shell</strong></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">db.Users.find({&quot;useUniqueId&quot;: new BinData(3,&quot;MyIRAFVEd2aImaq7zN3u/w==&quot;)}).limit(1)</span></code></pre>\n<p>Actually BinData constructor takes 2 parameters:</p>\n<p>New BinData(subtype,data)</p>\n<ul>\n<li>Subtype: represent subdata type like we pass 3 for UUID or GUID</li>\n<li>Data: base64 encoded string data</li>\n</ul>\n<p>mongoDB's C# driver stores data to mongo by converting it into binary data rather than string.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"title":"GUID Query Through Mongo Shell","author":{"id":"Kundan Singh","github":null,"avatar":null},"date":"February 23, 2015","updated_date":null,"tags":["Engineering","GUID","Mongo"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/ea7595df20b2f7c29ed276dc27b05c9b/630fb/mongo-db-guid.png","srcSet":"/static/ea7595df20b2f7c29ed276dc27b05c9b/69585/mongo-db-guid.png 200w,\n/static/ea7595df20b2f7c29ed276dc27b05c9b/630fb/mongo-db-guid.png 300w","sizes":"(max-width: 300px) 100vw, 300px"}}}},"fields":{"authorId":"Kundan Singh","slug":"/engineering/guid-query-mongo-shell/"}}}]},"authorYaml":{"id":"Kundan Singh","bio":"Director of Product Development @ LoginRadius.","github":null,"stackoverflow":null,"linkedin":null,"medium":null,"twitter":null,"avatar":null}},"pageContext":{"id":"Kundan Singh","__params":{"id":"kundan-singh"}}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}