{"componentChunkName":"component---src-pages-author-author-yaml-id-js","path":"/author/saikiran-babladi/","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"id":"970fb1f8-9ea4-58ab-b579-8356e726390b","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Electronic Theatre Controls (ETC) is a global leader in the manufacture of lighting and rigging technology for venues large and small. As a premium marketplace innovator, the business' products are utilized in theaters, churches, hotels, schools, opera houses, and more across the globe.</p>\n<p>As business is thriving for the pioneering North American firm, it realized that maintaining it, however, is only possible by identifying and delivering opportunities that are of greater value for customers. </p>\n<p>So, when ETC's management turned its attention to customer web services (for example), ETC spotted a chance to leverage value by extending and improving its customer web offerings.</p>\n<h2 id=\"simplifying-complex-identity-management-challenges\" style=\"position:relative;\"><a href=\"#simplifying-complex-identity-management-challenges\" aria-label=\"simplifying complex identity management challenges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Simplifying complex identity management challenges</h2>\n<p>When ETC Controls began looking for a vendor, they were looking for someone experienced in meeting the needs of businesses like theirs. They wanted to find a partner who could help them achieve their goals and make the company more efficient.</p>\n<p>ETC web services, for example, are utilized by multiple user types (e.g., dealers, consumers). While these user groups have very different needs, ETC needed a partner capable of managing profiles throughout the business' digital ecosystem.</p>\n<p>While ETC identified an opportunity to simplify its customer experiences across multiple platforms, its leaders also wanted to streamline data management: making it easier than ever before to gain insights into the business' online operations.</p>\n<p>ETC was impressed by LoginRadius' modular identity solution platform and its team's deep understanding of the complexities of managing and integrating identities with backend technologies.</p>\n<h2 id=\"streamlining-login-access-and-management\" style=\"position:relative;\"><a href=\"#streamlining-login-access-and-management\" aria-label=\"streamlining login access and management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Streamlining login, access and management</h2>\n<p>Complying to the customer's needs, LoginRadius delivered a backend implementation of its reliable, secure services to ETC in an organized, methodical, and seamless way.</p>\n<p>It needed to be in order to ensure the system's successful integration with a number of platforms - including <a href=\"https://www.loginradius.com/cloud-integrations/\">BigCommerce and HubSpot</a>.</p>\n<p>A plug-and-play solution, LoginRadius offers the industry's fastest average implementation. This help businesses work against tight deadlines while ensuring a best-in-class digital presence without overextending the company's budget.</p>\n<h2 id=\"uniting-identity-management-in-digital-ecosystems\" style=\"position:relative;\"><a href=\"#uniting-identity-management-in-digital-ecosystems\" aria-label=\"uniting identity management in digital ecosystems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Uniting identity management in digital ecosystems</h2>\n<p>By introducing <a href=\"https://www.loginradius.com/\">LoginRadius CIAM</a> means that ETC now manages user identity centrally. LoginRadius allows ETC's team to create and manage unified consumer profiles that can be used throughout the business' entire digital ecosystem.</p>\n<p>Working with LoginRadius ensures there are no identity silos - enabling ETC to see consumers as a whole.</p>\n<h2 id=\"simplifying-how-consumers-connect-to-multiple-web-properties\" style=\"position:relative;\"><a href=\"#simplifying-how-consumers-connect-to-multiple-web-properties\" aria-label=\"simplifying how consumers connect to multiple web properties permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Simplifying how consumers connect to multiple web properties</h2>\n<p>LoginRadius SSO supports a new identity management feature: single-sign on. Its introduction means users need just one login to access content across ETC's various web platforms.</p>\n<p>With support from LoginRadius, ETC successfully unified its multiple products within a single ecosystem - allowing the business - to gain a unified view of its consumers (and their behaviors).</p>\n<p>The centralized login system enables users to seamlessly navigate third-party sites without needing to log back whenever they return.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-SSO\"\n        title=\"DS-SSO\"\n        src=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png\"\n        srcset=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/a6d36/DS-SSO.png 650w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png 768w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/81501/DS-SSO.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"identifying-actionable-behavioral-insights\" style=\"position:relative;\"><a href=\"#identifying-actionable-behavioral-insights\" aria-label=\"identifying actionable behavioral insights permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identifying actionable behavioral insights</h2>\n<p>To stay relevant to customers' changing needs, ETC needed to gain a greater understanding of their customer's online behavior.</p>\n<p>LoginRadius' advanced user segmentation and analytics tools deepen the team's understanding of its customers - creating opportunities to enhance targeting and personalization. Leveraging data from its reports allows the team to get the actionable insights they need to continue meeting customer expectations.</p>\n<p>LoginRadius' Consumer Insights tool provides ETC with crucial information, such as viewing preferences, recent interactions, and purchase history. When combined, details like these help the business target customers more efficiently in a variety of ways, including personalized offers and content.</p>\n<h2 id=\"the-show-must-go-on\" style=\"position:relative;\"><a href=\"#the-show-must-go-on\" aria-label=\"the show must go on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The show must go on…</h2>\n<p>To guarantee ETC's success at every level, LoginRadius introduced dedicated account management and support from the outset…</p>\n<p>… and that continues to this day. Since completing their first project together, LoginRadius continues to work closely with the team as part of its larger, continuing activities.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Electronic Theatre Controls: A LoginRadius Customer Success Story","author":{"id":"Saikiran Babladi","github":null,"avatar":null},"date":"December 08, 2022","updated_date":null,"tags":["customer success","identity management","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/c7f4e034a0a95518a9ba31aea7b49112/33aa5/etc-connect.jpg","srcSet":"/static/c7f4e034a0a95518a9ba31aea7b49112/f836f/etc-connect.jpg 200w,\n/static/c7f4e034a0a95518a9ba31aea7b49112/2244e/etc-connect.jpg 400w,\n/static/c7f4e034a0a95518a9ba31aea7b49112/33aa5/etc-connect.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Saikiran Babladi","slug":"/identity/etc-loginradius-customer-success-story/"}}},{"node":{"id":"6ca8971e-2b14-5ac9-8b16-74e9a1451420","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>One of the leading municipalities known for biking and trekking in British Columbia is set to take off on its journey to digitize its citizenship services. </p>\n<p>The moment of truth came when the City decided to digitize its citizen services; it could never have predicted how valuable this modernization project would become. The City provides a wide range of services to its citizens, including recreational facilities, community building, etc. They join the dots to meet the needs of their residents to ensure a safe and livable community. Other services include taxes and utilities, garbage and waste diversion, and transportation. </p>\n<h2 id=\"managing-the-identities\" style=\"position:relative;\"><a href=\"#managing-the-identities\" aria-label=\"managing the identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Managing the Identities</h2>\n<p>The City’s IT team started looking for a CIAM solution to help secure the identities and streamline the <a href=\"https://www.loginradius.com/blog/identity/what-is-login-authentication/\">authentication process</a> for all their citizens across applications. After exploring multiple providers, they decided to try LoginRadius for managing the identities. </p>\n<p>After a detailed discussion which included platform demonstrations and requirement gathering sessions, the client gained confidence and awarded the project to LoginRadius.</p>\n<p>Being the preferred choice by many other municipalities and with the experience LoginRadius brings to the table in similar projects, the choice was relatively easy for the City’s management team. </p>\n<h2 id=\"easy-roll-out\" style=\"position:relative;\"><a href=\"#easy-roll-out\" aria-label=\"easy roll out permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Easy Roll-Out</h2>\n<p>It was a straightforward implementation for the City as there were no legacy applications that needed to be replaced, which meant no data migration. It took less than four weeks for the City’s IT team to implement the solution on their end. With all the resources and pre-built SDKs, it was a smooth implementation for them. </p>\n<p>The City went on to implement the <a href=\"https://www.loginradius.com/identity-experience-framework/\">LoginRadius Identity Experience Framework</a> (IDX) - an out-of-the-box solution with pre-built user account flows. This solution had all major customer flows, including registration, login, forgotten password, account verification, and profile management. </p>\n<p>LoginRadius Identity Experience Framework pages are JavaScript, HTML, and CSS driven, meaning most of the logic is implemented using JavaScript. Hence, the city developer had to modify the design and script per their UI/UX requirements.</p>\n<p>Even though it is hosted on LoginRadius, the solution is also entirely white label, which means that the City could customize the URL of the portal as well as all the UI elements of it. </p>\n<h2 id=\"perfectmind-integration\" style=\"position:relative;\"><a href=\"#perfectmind-integration\" aria-label=\"perfectmind integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>PerfectMind Integration</h2>\n<p>One of the key integrations the City has is with the PerfectMind application, a membership management software that uses cloud-based technology to help cities connect with their communities. </p>\n<p>The LoginRadius PerfectMind SSO connector is an out-of-the-box solution that provides a seamless single sign-on experience between LoginRadius and the PerfectMind platform by creating contacts on-the-fly during SSO workflow. </p>\n<p>Whenever any citizen logs into the City’s website, they will be automatically logged into the PerfectMind site. The LoginRadius SSO connector will check if a corresponding contact exists on the PerfectMind site or not. If there is no contact in the PerfectMind application, LoginRadius will create the corresponding contact in the PerfectmInd application and let the customer log in to the PerfectMind application. </p>\n<p>With this integration, citizens are able to access recreational services to search and register for programs with a single account giving them the best experience while surfing the City’s website.</p>\n<p><a href=\"https://www.loginradius.com/resource/perfectmind-integration\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-perfectmindint\"\n        title=\"DS-perfectmindint\"\n        src=\"/static/9dfd5053b2cf5348ba48bca7ef31cb14/e5715/DS-perfectmindint.png\"\n        srcset=\"/static/9dfd5053b2cf5348ba48bca7ef31cb14/a6d36/DS-perfectmindint.png 650w,\n/static/9dfd5053b2cf5348ba48bca7ef31cb14/e5715/DS-perfectmindint.png 768w,\n/static/9dfd5053b2cf5348ba48bca7ef31cb14/81501/DS-perfectmindint.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"support\" style=\"position:relative;\"><a href=\"#support\" aria-label=\"support permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Support</h2>\n<p>Right from the <a href=\"https://www.loginradius.com/blog/identity/loginradius-streamlines-user-onboarding-harry-rosen/\">customer onboarding</a>, the City had access to a customer success manager and multiple support channels to ensure the success of the project every step of the way. The LoginRadius team continues to work closely with the city to ensure project success.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"BC Municipality Digitizes its Citizen Services. LoginRadius Brings Identity to the Table.","author":{"id":"Saikiran Babladi","github":null,"avatar":null},"date":"September 06, 2022","updated_date":null,"tags":["digital identity","authentication","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4492753623188406,"src":"/static/cc6812ad48dd362d4162d1727acc181a/33aa5/bc-municipal.jpg","srcSet":"/static/cc6812ad48dd362d4162d1727acc181a/f836f/bc-municipal.jpg 200w,\n/static/cc6812ad48dd362d4162d1727acc181a/2244e/bc-municipal.jpg 400w,\n/static/cc6812ad48dd362d4162d1727acc181a/33aa5/bc-municipal.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Saikiran Babladi","slug":"/identity/loginradius-secures-identity-management-bc-municpality/"}}},{"node":{"id":"33b4ff06-b2e7-56f7-a8b3-f02296699c4f","html":"<p>The modern digital landscape demands robust security, which significantly relies on access tokens that securely authenticate users. </p>\n<p>A token plays a crucial role in enhancing the overall security mechanism of an organization that helps to deliver flawless and secure authentication and authorization on their website or application.</p>\n<p>For years, businesses have been using <a href=\"https://www.loginradius.com/blog/identity/pros-cons-token-authentication/\">token-based authentication</a> that allows users to access resources. These tokens have a minimal lifetime, ensuring that cybercriminals have minimum time to exploit a user’s identity. </p>\n<p>With token security, users have to re-authenticate themselves for obvious security reasons by offering credentials to sign in if the access token is expired. </p>\n<p>However, this can be tedious and hampers user experience. To overcome this, the concept of refresh tokens was introduced.</p>\n<p>A refresh token ensures that a user can regain the access token without providing login credentials. </p>\n<p>Let’s dig deeper about refresh tokens, their use, and how they interact with JWTs (JSON Web Token). </p>\n<h2 id=\"what-is-a-token\" style=\"position:relative;\"><a href=\"#what-is-a-token\" aria-label=\"what is a token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Token?</h2>\n<p>A token can be defined as a digitally encoded signature used to authenticate and authorize a user to access specific resources on a network.</p>\n<p>A token is always generated in the form of an OTP (One-Time Password), which depicts that it could only be used once and is generated randomly for every transaction.</p>\n<p>The token-based authentication allows users to verify their unique identity, and in return, they receive a special token that provides access to specific resources for a particular time frame.</p>\n<p>Apart from this, users can easily access the website or network for which the token is issued and need not enter the credentials again and again until the token expires.</p>\n<p>Tokens are widely used for regular online transactions for enhancing overall security and accuracy.</p>\n<h2 id=\"what-is-a-refresh-token\" style=\"position:relative;\"><a href=\"#what-is-a-refresh-token\" aria-label=\"what is a refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Refresh Token?</h2>\n<p>Since access tokens aren’t valid for an extended period because of security reasons, a refresh token helps re-authenticate a user without the need for login credentials. </p>\n<p>The primary purpose of a refresh token is to get long-term access to an application on behalf of a particular user. </p>\n<p>In a nutshell, a refresh token allows any website or application to regrant the access token without bothering the user. Here are its benefits:</p>\n<ul>\n<li>Balances security with usability</li>\n<li>Reinforces authentication</li>\n<li>Improves user experience </li>\n</ul>\n<h2 id=\"what-is-a-jwt-json-web-token\" style=\"position:relative;\"><a href=\"#what-is-a-jwt-json-web-token\" aria-label=\"what is a jwt json web token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a JWT (JSON Web Token)?</h2>\n<p>JWT (JSON Web Token) is used to provide a standard way for two parties to communicate securely. JWT is commonly used for managing authorization.</p>\n<p>There is an open industry standard called RFC-7519, which defines how JWT should be structured and how to use it to exchange information (called “claims”) in the form of JSON objects. This information can be verified and trusted as it is digitally signed.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/jwt/\">JWT (JSON Web Token)</a> is a popular method of SSO, which is widely used by B2C applications, and through this system, you can allow your consumers to log in to an application that supports JWT.</p>\n<h2 id=\"when-to-use-a-refresh-token\" style=\"position:relative;\"><a href=\"#when-to-use-a-refresh-token\" aria-label=\"when to use a refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>When to Use a Refresh Token?</h2>\n<p>Before inching towards refresh tokens, one should understand that <a href=\"https://www.loginradius.com/blog/engineering/oauth2/\">OAuth 2.0</a> specifications define both access tokens and refresh tokens. </p>\n<p>Enterprises can leverage a refresh token in scenarios where the API needs authentication through an access token but users aren’t always available to provide credentials again and again. </p>\n<p>Hence, to enhance usability and improve user experience, refresh tokens can be used. </p>\n<p><strong>Also read:</strong> <strong><a href=\"https://www.loginradius.com/blog/identity/oauth2-0-guide/\">Working With Industry Authorization: A Beginner's Guide to OAuth 2.0</a></strong></p>\n<h2 id=\"best-practices-to-secure-refresh-tokens\" style=\"position:relative;\"><a href=\"#best-practices-to-secure-refresh-tokens\" aria-label=\"best practices to secure refresh tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices to Secure Refresh Tokens</h2>\n<p>Since browser-based web applications cannot start using a refresh token, refresh tokens always require additional security. </p>\n<p>Whenever a refresh token is being utilized, the security token service quickly issues another access token and a new refresh token. The user can now make API calls through a refresh token. </p>\n<p>Whenever the overall security token service suspects that any refresh token is being used more than once, it automatically assumes something isn’t right. As a result, the refresh token gets immediately revoked and hence ensures adequate security. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">RBA (Risk-based Authentication) </a>can be the finest way to enhance the security of a refresh token since it helps to analyze a vulnerability and automatically adds another stringent security layer in the mechanism. </p>\n<p>RBA works seamlessly with token-based authentication and can help improve overall security in high-risk scenarios where businesses need a stringent mechanism to prevent a security breach. </p>\n<h2 id=\"authentication-using-jwt-token-and-refresh-token\" style=\"position:relative;\"><a href=\"#authentication-using-jwt-token-and-refresh-token\" aria-label=\"authentication using jwt token and refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication Using JWT Token and Refresh Token</h2>\n<p>JWTs represent a set of claims as JSON objects encoded in a JWS and JWE structure. This JSON object is called “JWT Claims Set.” The JSON object consists of zero or more name/value pairs (or members), where the names are strings, and the values are arbitrary JSON values. These members are the claims represented by the JWT.</p>\n<p>Your JWTs can contain any information you want; the user's name, birth date, email, etc. You do this with claims-based authorization. You then just tell your provider to make a JWT with these claims from the claims principle.</p>\n<p>Authentication is implemented through JWT access tokens along with refresh tokens. The API returns a short-lived token (JWT), which expires in 15 minutes, and in HTTP cookies, the refresh token expires in 7 days. </p>\n<p>JWT is currently used for accessing secure ways on API, whereas a refresh token generates another new JWT access token when it expires or even before. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Refresh tokens can be the ideal way to enhance security and improve user experience since users need not enter login credentials again and again. </p>\n<p>LoginRadius helps enterprises get maximum benefits in terms of security, scalability, and usability when implementing token-based authentication on web and mobile devices. </p>\n<p>Businesses can leverage LoginRadius’ authentication and authorization services for a seamless experience that fosters business growth. <a href=\"https://www.loginradius.com/contact-sales\">Schedule a call today</a>! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Refresh Tokens: When to Use Them and How They Interact with JWTs","author":{"id":"Saikiran Babladi","github":null,"avatar":null},"date":"August 24, 2021","updated_date":null,"tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6129032258064515,"src":"/static/3e53bf0d14b0304e647258612eee7deb/14b42/refresh-tokens-jwt-interaction-cover.jpg","srcSet":"/static/3e53bf0d14b0304e647258612eee7deb/f836f/refresh-tokens-jwt-interaction-cover.jpg 200w,\n/static/3e53bf0d14b0304e647258612eee7deb/2244e/refresh-tokens-jwt-interaction-cover.jpg 400w,\n/static/3e53bf0d14b0304e647258612eee7deb/14b42/refresh-tokens-jwt-interaction-cover.jpg 800w,\n/static/3e53bf0d14b0304e647258612eee7deb/16310/refresh-tokens-jwt-interaction-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Saikiran Babladi","slug":"/identity/refresh-tokens-jwt-interaction/"}}},{"node":{"id":"61b8cb85-af31-5b7c-96fc-3f5cfce206c8","html":"<p>When was the last time you signed up to a website by filling out the entire registration form? Gone are the days where you had to fill out lengthy registration forms, create different usernames and passwords, and remember them every time you tried to login - awesome, right!</p>\n<p>Consumers demand a smarter experience today. They don't like to create a new ID every time they want to utilize a service. Instead, they are open to leveraging their existing digital identity securely and easily, with the opportunity to reuse it in multiple domains. </p>\n<p>And as a response to this demand, businesses have come-up with a concept called Bring Your Own Identity (BYOI).</p>\n<h2 id=\"what-is-byoi\" style=\"position:relative;\"><a href=\"#what-is-byoi\" aria-label=\"what is byoi permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is BYOI</h2>\n<p>The \"Bring your own\" trend started when organizations allowed their employees to bring their device - BYOD. Later, it gained popularity and paved the way for many such concepts like Bring your own apps (BYOA), Bring your own technology (BYOT), Bring your own cloud (BYOC), Bring your own encryption (BYOE), etc.</p>\n<p><strong>Bring your own identity, or BYOI is also one such trend where consumers bring in their own digital ID, which is either managed by self or by any third-party.</strong></p>\n<p>Instead of asking consumers to fill in long forms as part of the registration process, you can allow them to choose their existing <a href=\"https://www.loginradius.com/blog/identity/digital-identity-management/\">digital identity</a>. These could be any of their social media accounts such as Facebook, Twitter, Google, or LinkedIn. </p>\n<p>Moreso, with features  like simplified registration (which is both quick and secure), the BYOI trend can address the problems of organizations that are losing consumers.  </p>\n<h2 id=\"the-big-picture\" style=\"position:relative;\"><a href=\"#the-big-picture\" aria-label=\"the big picture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Big Picture</h2>\n<p>With the pandemic forcing organizations to rethink their digital transformation, BYOI is a key part of securing user identities in 2021. BYOI (Bring Your Own Identity) will unlock the value in digital identities and is going to disrupt traditional methods of access in the future.</p>\n<p>Many of your consumers have an existing digital identity, and BYOI lets them use an account they already have rather than creating a new one. By allowing your consumers to log in with an existing set of credentials, you make it simple for consumers to sign up for an account with you, increasing your overall conversion rate.</p>\n<h2 id=\"identity-brokering\" style=\"position:relative;\"><a href=\"#identity-brokering\" aria-label=\"identity brokering permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Brokering</h2>\n<p><a href=\"https://www.loginradius.com/identity-providers/\">Identity Brokering</a> is an approach where organizations/businesses do not require consumers to provide their credentials to authenticate. Instead, an identity broker service acts as a bridge between the Identity and Service Providers and enables the authentication process between the two.</p>\n<h3 id=\"span-stylecolor-ff4500-identity-broker-service-facilitates-byoi-by-implementing-industry-standard-protocol-oauth2-oauth-open-authentication-2-is-a-framework-that-authorizes-and-enables-applications-to-obtain-limited-access-to-a-consumers-accounts-on-an-http-service-such-as-facebook-github-or-digitalocean-span\" style=\"position:relative;\"><a href=\"#span-stylecolor-ff4500-identity-broker-service-facilitates-byoi-by-implementing-industry-standard-protocol-oauth2-oauth-open-authentication-2-is-a-framework-that-authorizes-and-enables-applications-to-obtain-limited-access-to-a-consumers-accounts-on-an-http-service-such-as-facebook-github-or-digitalocean-span\" aria-label=\"span stylecolor ff4500 identity broker service facilitates byoi by implementing industry standard protocol oauth2 oauth open authentication 2 is a framework that authorizes and enables applications to obtain limited access to a consumers accounts on an http service such as facebook github or digitalocean span permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><span style=\"color: #FF4500\"> Identity broker service facilitates BYOI by implementing industry-standard protocol OAUTH2. OAuth (Open Authentication) 2 is a framework that authorizes and enables applications to obtain limited access to a consumer's accounts on an HTTP service such as Facebook, GitHub, or DigitalOcean. </span></h3>\n<h2 id=\"the-loginradius-advantage\" style=\"position:relative;\"><a href=\"#the-loginradius-advantage\" aria-label=\"the loginradius advantage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The LoginRadius Advantage</h2>\n<p>If you are the CSO or CIO of your company looking for a platform that acts as an identity broker, the <a href=\"https://www.loginradius.com/\">LoginRadius CIAM platform</a> is the perfect solution that can act as a bridge between multiple identity service providers. </p>\n<p>The possibilities are endless with the LoginRadius platform in how you can set up your login flows to best serve your consumer's needs and meet your business goals. LoginRadius can integrate with any provider, so you can give your consumers the convenience and choice while having an optimized back-end infrastructure to ensure an automated and streamlined experience for your consumers.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"The Rise of BYOI (Bring your own Identity)","author":{"id":"Saikiran Babladi","github":null,"avatar":null},"date":"July 09, 2021","updated_date":null,"tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/21da72bd0fe638c759ad35eb963a1557/14b42/bring-your-own-identity-cover.jpg","srcSet":"/static/21da72bd0fe638c759ad35eb963a1557/f836f/bring-your-own-identity-cover.jpg 200w,\n/static/21da72bd0fe638c759ad35eb963a1557/2244e/bring-your-own-identity-cover.jpg 400w,\n/static/21da72bd0fe638c759ad35eb963a1557/14b42/bring-your-own-identity-cover.jpg 800w,\n/static/21da72bd0fe638c759ad35eb963a1557/16310/bring-your-own-identity-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Saikiran Babladi","slug":"/identity/bring-your-own-identity/"}}},{"node":{"id":"9cadc1dd-70b0-5f22-bce4-fae7d339c9c1","html":"<p><strong>Do you have a WordPress site?</strong></p>\n<p><strong>Do you run a business with hundreds or thousands of users?</strong></p>\n<p>Then, you might want your consumers to seamlessly move between your multiple sites without them having to re-enter their credentials, right?\nAsking them to re-authenticate is a cumbersome process. This is where SSO helps you!</p>\n<p>Businesses thrive by providing a seamless experience to their consumers. So, yes! Whether you are running an ecommerce business, travel, hospitality, or even blogging, you can only attract consumers to provide them with frictionless experiences. </p>\n<h2 id=\"what-is-sso\" style=\"position:relative;\"><a href=\"#what-is-sso\" aria-label=\"what is sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is SSO</h2>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\"><b>Single Sign-On (SSO)</b></a> refers to the authentication process that allows your customers to access multiple applications with a single set of login credentials and an active login session.</p>\n<h3 id=\"sso---for-a-seamless-user-experience\" style=\"position:relative;\"><a href=\"#sso---for-a-seamless-user-experience\" aria-label=\"sso   for a seamless user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO - For a seamless user experience</h3>\n<p>Having SSO for your WordPress sites will boost the experience of the consumer spending time on your site. It is relatively effortless nowadays to build a fancy-looking site that will attract consumers at first.\nBut, for a site to gain traction and make those consumers return to your site will be a challenge.\nFor example, by offering a frictionless experience and having no barriers like complicated registration forms, asking not to sign in repeatedly will make your site stand out over your competitors.\nSSO helps your consumers navigate across your multiple web properties. Once the user is logged in, they don't have repeated demands for sign-ins. The experience is frictionless.</p>\n<h2 id=\"sso-with-loginradius\" style=\"position:relative;\"><a href=\"#sso-with-loginradius\" aria-label=\"sso with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO with LoginRadius</h2>\n<p>Adding SSO to your existing web properties can be a challenge. LoginRadius WordPress Plugin is an out-of-box solution that replaces the WordPress default login form with the LoginRadius JS forms.</p>\n<p>With minimal time and effort, you can add SSO to your existing sites leveraging LoginRadius WordPress Plugin and gain access to login data via our dashboard. This will help you to boost conversion and also reduce the time to onboard consumers. </p>\n<p>We have detailed <a href=\"https://www.loginradius.com/developers/\">documentation</a>.</p>\n<h3 id=\"its-here-to-help-developers\" style=\"position:relative;\"><a href=\"#its-here-to-help-developers\" aria-label=\"its here to help developers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>It's Here to Help Developers</h3>\n<p>LoginRadius aims to help developers, web development agencies, and businesses to add SSO in the simplest way possible.\nLoginRadius allows you to store your consumer profiles securely and add our customizable login interfaces into your applications in minutes. By enabling our SSO, you can create a frictionless user experience, thus boosting your conversion rate.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-SSO\"\n        title=\"DS-SSO\"\n        src=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png\"\n        srcset=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/a6d36/DS-SSO.png 650w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png 768w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/81501/DS-SSO.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"benefits\" style=\"position:relative;\"><a href=\"#benefits\" aria-label=\"benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits</h2>\n<p><a href=\"https://laura-nutt088.medium.com/loginradius-launches-wordpress-authentication-sso-plugin-to-streamline-login-experiences-fa5b00b4fbf2\" rel=\"nofollow\"><b>LoginRadius SSO plugin</b></a> for WordPress improves your consumers' experience by taking away password fatigue and the need to create new profiles or re-enter an email/password. Apart from configuring SSO, the LoginRadius WordPress plugin offers other benefits such as:</p>\n<ul>\n<li>Centralised registration/login</li>\n<li><a href=\"https://www.loginradius.com/standard-login/\"><b>Standard login</b></a> (email login)</li>\n<li><a href=\"https://www.loginradius.com/social-login/\"><b>Social login</b></a> (Facebook, Google, Twitter)</li>\n<li><a href=\"https://www.loginradius.com/user-management/\"><b>User management</b></a></li>\n<li>Customizable interfaces for login, registration, and forgot password pages</li>\n</ul>\n<h2 id=\"your-take\" style=\"position:relative;\"><a href=\"#your-take\" aria-label=\"your take permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Your Take?</h2>\n<p>We always want to hear from our customers. Like many others in the market, we want developers to install it and offer feedback. This feedback will help us enhance the plugin and make it more user-friendly.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"How to add SSO for your WordPress Site!","author":{"id":"Saikiran Babladi","github":null,"avatar":null},"date":"March 26, 2021","updated_date":null,"tags":["WordPress","SSO","Single Sign On"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5151515151515151,"src":"/static/b9dbf4785b8c5c64f26df5ea43566dbb/33aa5/sso-wp.jpg","srcSet":"/static/b9dbf4785b8c5c64f26df5ea43566dbb/f836f/sso-wp.jpg 200w,\n/static/b9dbf4785b8c5c64f26df5ea43566dbb/2244e/sso-wp.jpg 400w,\n/static/b9dbf4785b8c5c64f26df5ea43566dbb/33aa5/sso-wp.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}}},"fields":{"authorId":"Saikiran Babladi","slug":"/engineering/sso-for-wordpress-site/"}}}]},"authorYaml":{"id":"Saikiran Babladi","bio":"Saikiran is the Senior Solutions Engineer at LoginRadius Inc. He interacts with prospective customers to understand their use-case/pain areas and provides a fit-for-purpose solution by delivering product demos and POC's.","github":null,"stackoverflow":null,"linkedin":"saikiran-babladi-5287b665","medium":null,"twitter":null,"avatar":null}},"pageContext":{"id":"Saikiran Babladi","__params":{"id":"saikiran-babladi"}}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}