{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/28","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction We are thrilled to announce the release of our annual industry report, Consumer Digital Identity Trend Report 2022. We surveyed…","fields":{"slug":"/identity/loginradius-consumer-identity-trend-report-2022/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>We are thrilled to announce the release of our annual industry report, <strong>Consumer Digital Identity Trend Report 2022</strong>.</p>\n<p>We surveyed over 500 brands and 1.17 billion users worldwide from the LoginRadius Identity Platform to provide an in-depth analysis of the consumer data market, including changes in consumer behavior over time and their projected impact on business practices and IT requirements.</p>\n<h2 id=\"evolution-is-essential-for-a-great-consumer-experience\" style=\"position:relative;\"><a href=\"#evolution-is-essential-for-a-great-consumer-experience\" aria-label=\"evolution is essential for a great consumer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Evolution is Essential for a Great Consumer Experience</h2>\n<p>The next few years will be a pivotal time for the digital consumer identity space. One critical aspect covered in this report is that consumers are evolving from the traditional registration model to a more personalized, easy to authenticate model that's secure. Keeping up is a challenge – and it requires businesses to adjust their identity management systems.</p>\n<p>The report findings highlight that if your business wants to stand out in a highly competitive world, you’ll need to make a huge improvement in your interactions with your customers. This means not just your interactions with them but also theirs with your brand, starting from registration to checkout.</p>\n<p>Businesses can achieve this by tailoring authentication and login methods to their customers' preferences, such as passwordless login or multi-factor authentication via email or SMS, or social sign-on.</p>\n<p><a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"RP-2022\"\n        title=\"RP-2022\"\n        src=\"/static/2aedf875a3ea8b97f40ee3f8ea9dbea9/e5715/RP-2022.png\"\n        srcset=\"/static/2aedf875a3ea8b97f40ee3f8ea9dbea9/a6d36/RP-2022.png 650w,\n/static/2aedf875a3ea8b97f40ee3f8ea9dbea9/e5715/RP-2022.png 768w,\n/static/2aedf875a3ea8b97f40ee3f8ea9dbea9/63ff0/RP-2022.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"key-highlights-of-the-consumer-identity-report-2022\" style=\"position:relative;\"><a href=\"#key-highlights-of-the-consumer-identity-report-2022\" aria-label=\"key highlights of the consumer identity report 2022 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Highlights of the Consumer Identity Report 2022</h2>\n<p>As a company strongly focused on CIAM, we analyzed our global customers over the past year, and discovered the following:</p>\n<ul>\n<li>95.06% of companies offer standard login using an email ID.</li>\n<li>59.11% of companies use MFA via SMS messaging and 40.89% via an authenticator app.</li>\n<li>The phone login has the highest return rate of 31.11%. Next is passwordless login with 29.41%. </li>\n</ul>\n<p>Some more findings of the report have been outlined in the infographic below. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 750.3076923076924%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"infographic-report-22\"\n        title=\"infographic-report-22\"\n        src=\"/static/04f61098fe05316b53b3af02624796b0/e5715/infographic-report-22.png\"\n        srcset=\"/static/04f61098fe05316b53b3af02624796b0/a6d36/infographic-report-22.png 650w,\n/static/04f61098fe05316b53b3af02624796b0/e5715/infographic-report-22.png 768w,\n/static/04f61098fe05316b53b3af02624796b0/7a4b2/infographic-report-22.png 1240w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Overall, the CIAM trend report highlights: </p>\n<ul>\n<li>The preferable login methods by end-users.</li>\n<li>The preferable verification process.</li>\n<li>The performance benchmarks for identity management platforms.</li>\n</ul>\n<h2 id=\"looking-ahead\" style=\"position:relative;\"><a href=\"#looking-ahead\" aria-label=\"looking ahead permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Looking Ahead</h2>\n<p>Companies that treat customer identity management as a strategic business process instead of an operational activity will have the advantage in today’s marketplace. These companies will be able to operate more efficiently through lower customer acquisition, onboarding, and support costs and higher customer retention rates.</p>\n<p>If you are trying to improve your customer experience, the finding of this report will definitely impact your bottom line. </p>\n<p>Download a complimentary copy of the LoginRadius <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">Consumer Identity Trend Report</a> here.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 27, 2022","updated_date":null,"description":"As a company strongly focused on CIAM, LoginRadius analyzed its global customers over the past year and compiled over 40 unique trends in its annual Consumer Identity Trend report 2022.","title":"LoginRadius Releases Consumer Identity Trend Report 2022, Key Login Methods Highlighted","tags":["industry-news","consumer-identity","identity-trends","digital-identity"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5873015873015872,"src":"/static/44fb04b4054e590d655a41c4a378ffe8/33aa5/report-cover.jpg","srcSet":"/static/44fb04b4054e590d655a41c4a378ffe8/f836f/report-cover.jpg 200w,\n/static/44fb04b4054e590d655a41c4a378ffe8/2244e/report-cover.jpg 400w,\n/static/44fb04b4054e590d655a41c4a378ffe8/33aa5/report-cover.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Phishing attacks aren’t uncommon, and we’ve all witnessed fake emails and messages that demand urgent attention at least once…","fields":{"slug":"/identity/what-is-browser-in-browser-attack/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Phishing attacks aren’t uncommon, and we’ve all witnessed fake emails and messages that demand urgent attention at least once. However, there’s much more in the cybersecurity landscape than just conventional email practices when it comes to phishing. </p>\n<p>A <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing attack</a> can be a death blow for enterprises that don't take the necessary precautions. The top line is affected, but the brand's image and trust can be obliterated if news of a data breach reaches the public.</p>\n<p>The browser in the browser attack (BITB) is the latest form of phishing scam that simulates a browser window within a web browser and steals sensitive user information. </p>\n<p>The user is catered with a fraudulent pop-up window that asks for their credentials for signing into the website in the previous web browser window and thus leads to identity theft. </p>\n<p>Let’s understand the aspects of Browser in-browser attacks and how businesses can ensure stringent security for their consumers and employees to protect against these attacks. </p>\n<h2 id=\"what-is-browser-in-the-browser-attacks-who-all-are-at-a-higher-risk\" style=\"position:relative;\"><a href=\"#what-is-browser-in-the-browser-attacks-who-all-are-at-a-higher-risk\" aria-label=\"what is browser in the browser attacks who all are at a higher risk permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Browser in the Browser Attacks? Who all are at a Higher Risk?</h2>\n<p>Whenever a user chooses a <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">single sign-on (SSO)</a> option in a website or web application for signing in to their account for multiple interconnected applications, the fraudulent pop-up will be displayed to collect sensitive information about the user, including login credentials. </p>\n<p>Moreover, the significant difference between a phishing scam and a BIBT attack is that the pop-up window during the sign-in process would show any URL that matches the authentic one.</p>\n<p>In a nutshell, cybercriminals simulate a web browser window within a web browser for spoofing a legitimate domain. This attack majorly exploits the single sign-on (SSO) option, which users always prefer to stay logged in to different interconnected websites or applications.</p>\n<p>Users don’t wish to remember long credentials. They are hesitant to provide their credentials again and again, which gives an advantage to cybercriminals as they exploit the single sign-on login preference since users can’t differentiate between a fake domain or a legitimate one once a pop-up window appears. </p>\n<p>Various businesses offering single sign-on to their consumers for a seamless user experience across their multiple applications are always at a higher risk of compromising sensitive consumer information by falling prey to these browsers in the browser attacks. </p>\n<p>However, the businesses offering SSO capabilities must understand the risks associated with SSO and incorporate stringent security mechanisms to protect their consumer information. </p>\n<h2 id=\"how-businesses-can-avoid-browser-in-the-browser-attacks\" style=\"position:relative;\"><a href=\"#how-businesses-can-avoid-browser-in-the-browser-attacks\" aria-label=\"how businesses can avoid browser in the browser attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Businesses Can Avoid Browser in the Browser Attacks</h2>\n<p>Since SSO has provided endless opportunities to businesses and consumers, avoiding the use of SSO isn’t a great option at all. </p>\n<p>Adding multiple layers of security while implementing single sign-on (SSO) could help businesses prevent browser in the browser attacks and help mitigate other associated risks. </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-SSO\"\n        title=\"DS-SSO\"\n        src=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png\"\n        srcset=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/a6d36/DS-SSO.png 650w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png 768w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/81501/DS-SSO.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Let’s understand how businesses can reinforce security against BITB attacks. </p>\n<h3 id=\"incorporating-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#incorporating-multi-factor-authentication-mfa\" aria-label=\"incorporating multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Incorporating multi-factor authentication (MFA)</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">Multi-factor authentication</a> (or MFA)  is a multi-layered security system that verifies the identity of users for login or other transactions.</p>\n<p>By leveraging multiple authentication layers, the user account will remain secure even if one element is damaged or disabled. </p>\n<p>Codes generated by smartphone apps, answers to personal security questions, codes sent to an email address, fingerprints, etc., are a few examples of multi-factor authentication implemented in day-to-day scenarios.</p>\n<p>Adding MFA to your security policy could prevent your users from compromising their identities during a browser in the browser attack but also helps ensure robust safety for your sensitive business information. </p>\n<p>The use of software and even hardware tokens for dual identity verification is a highly-efficient way of reinforcing security against BITB attacks. </p>\n<h3 id=\"choosing-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#choosing-risk-based-authentication-rba\" aria-label=\"choosing risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Choosing risk-based authentication (RBA)</h3>\n<p>Risk-based authentication or <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">adaptive authentication</a> is the one-stop solution for preventing browser in the browser attacks. </p>\n<p>RBA is a method of applying various levels of stringency to authentication processes based on the likelihood that access to a given system could be compromised. As the level of risk increases, authentication becomes more restrictive.</p>\n<p>Hence, RBA automatically incorporates another layer of authentication in a high-risk situation like a BITB attack, and the user’s identity remains protected. </p>\n<p>Risk-based authentication can be incorporated through a cloud-based consumer identity and access management (CIAM) platform that restricts unauthorized access even if the users leverage single sign-on capabilities. </p>\n<h2 id=\"zero-trust-architecture\" style=\"position:relative;\"><a href=\"#zero-trust-architecture\" aria-label=\"zero trust architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Zero trust architecture</h2>\n<p>Zero trust is the security concept based on a belief that enterprises shouldn’t automatically trust any device or individual, whether inside or outside its perimeters and strictly verify everything before granting access.</p>\n<p>In a nutshell, <a href=\"https://www.loginradius.com/resource/zero-trust-security/\">zero trust</a> relies on the principle of “don’t trust anyone.” This architecture cuts all the access points until proper verification is done and trust is established.</p>\n<p>No access is provided until the system verifies the individual or device demanding access to the IP address, device, or storage. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Since global businesses face enormous challenges when it comes to ensuring robust security for their consumers, relying on MFA, RBA, and zero trust architecture can provide the highest level of security when it comes to preventing browser in the browser attacks. </p>\n<p>Businesses can choose a reliable <a href=\"https://www.loginradius.com/\">CIAM solution</a> like LoginRadius that helps brands secure their consumer identities by leveraging the true potential of multi-factor authentication, risk-based authentication, and zero trust architecture. </p>\n<p>If you wish to see the future of CIAM in action and understand how it works for your brand, reach us to schedule a personalized demo. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 22, 2022","updated_date":null,"description":"The browser in the browser attack (BITB) is the latest form of phishing scam that simulates a browser window within a web browser and steals sensitive user information. Let’s understand the aspects of Browser in-browser attacks and how businesses can ensure stringent security for their consumers and employees to protect against these attacks.","title":"BITB Attacks: The New Destructive Phishing Technique","tags":["phishing","sso","identity-theft","mfa"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5267175572519085,"src":"/static/df699d9c774bdf54a0ad20d698475912/14b42/bib-attacks.jpg","srcSet":"/static/df699d9c774bdf54a0ad20d698475912/f836f/bib-attacks.jpg 200w,\n/static/df699d9c774bdf54a0ad20d698475912/2244e/bib-attacks.jpg 400w,\n/static/df699d9c774bdf54a0ad20d698475912/14b42/bib-attacks.jpg 800w,\n/static/df699d9c774bdf54a0ad20d698475912/47498/bib-attacks.jpg 1200w,\n/static/df699d9c774bdf54a0ad20d698475912/99213/bib-attacks.jpg 1542w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Gurjyot Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Identity authentication is crucial for online businesses in the era when almost 60% of the world’s population is online…","fields":{"slug":"/identity/why-business-needs-robust-identity-authentication/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Identity authentication is crucial for online businesses in the era when almost <a href=\"https://www.statista.com/statistics/617136/digital-population-worldwide/\">60% of the world’s population</a> is online. </p>\n<p>However, the stats mentioned above don’t mean that everyone browsing the internet is safe and cannot be on the radar of cybercriminals since we witness massive data breaches compromising millions of identities every day. </p>\n<p>As per global stats, the total number of <a href=\"https://www.statista.com/statistics/1175657/increase-identity-theft-coronavirus-outbreak/\">identity thefts has increased</a> substantially amid the worldwide pandemic and is expected to inflate further.</p>\n<p>A weak line of defense and poor authentication mechanism at the service providers’ could tarnish a brand's reputation in the global markets and eventually entitle the organization to pay hefty fines. </p>\n<p>So what does it imply? We need a stringent mechanism to <a href=\"https://www.loginradius.com/blog/identity/assess-improve-your-authentication-system/\">secure identity authentication</a> (as conventional systems cannot handle massive user signups and logins).</p>\n<p>Yes, secure authentication is the need of the hour for every business striving to excel in growth and ensure adequate security. </p>\n<p>Let’s look at some aspects that portray why businesses need to quickly put their best foot forward in strengthening their identity authentication. </p>\n<h2 id=\"5-reasons-why-your-business-needs-identity-authentication\" style=\"position:relative;\"><a href=\"#5-reasons-why-your-business-needs-identity-authentication\" aria-label=\"5 reasons why your business needs identity authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Reasons Why Your Business Needs Identity Authentication</h2>\n<h3 id=\"1-securing-consumer-identity-is-crucial-now-more-than-ever-before\" style=\"position:relative;\"><a href=\"#1-securing-consumer-identity-is-crucial-now-more-than-ever-before\" aria-label=\"1 securing consumer identity is crucial now more than ever before permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Securing consumer identity is crucial now more than ever before</h3>\n<p>Businesses have compromised consumer identities in the past couple of years, leading to financial losses and tarnished reputations. Even the most robust security system can’t ensure identity security without stringent <a href=\"https://www.loginradius.com/blog/identity/authentication-vs-authorization-infographic/\">authentication and authorization</a> mechanisms in place.</p>\n<p>Apart from this, the sudden paradigm shift towards online platforms has also increased the number of signups and registrations on diverse platforms leading to an increased risk of data breaches since most users aren’t aware of online security best practices.</p>\n<p>Hence there’s an immediate need to deploy a reliable consumer identity and access management solution (CIAM) to reinforce identity authentication security without hampering user experience.</p>\n<h3 id=\"2-privacy-regulations-like-gdpr-and-ccpa-are-becoming-more-stringent\" style=\"position:relative;\"><a href=\"#2-privacy-regulations-like-gdpr-and-ccpa-are-becoming-more-stringent\" aria-label=\"2 privacy regulations like gdpr and ccpa are becoming more stringent permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Privacy regulations like GDPR and CCPA are becoming more stringent.</h3>\n<p>Due to increased worldwide regulations, including the EU’s GDPR and the United States’ CCPA, protecting consumer data is crucial for every business targeting citizens of a specific region.</p>\n<p>Since it protects consumers’ privacy and eventually improves brand value, and offers a competitive advantage, businesses must partner with a reputed CIAM service provider to ensure they’re compliant with government privacy regulations.</p>\n<p>Businesses that don’t implement the privacy regulations could be fined up to millions of dollars and face penalties for years.</p>\n<p><a href=\"https://www.loginradius.com/resource/privacy-policy-management-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-privacy\"\n        title=\"DS-privacy\"\n        src=\"/static/a515b77e107a163ca5f81996f1ef7bb9/e5715/DS-privacy.png\"\n        srcset=\"/static/a515b77e107a163ca5f81996f1ef7bb9/a6d36/DS-privacy.png 650w,\n/static/a515b77e107a163ca5f81996f1ef7bb9/e5715/DS-privacy.png 768w,\n/static/a515b77e107a163ca5f81996f1ef7bb9/81501/DS-privacy.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-developers-face-identity-authentication-related-issues-while-collecting-user-information\" style=\"position:relative;\"><a href=\"#3-developers-face-identity-authentication-related-issues-while-collecting-user-information\" aria-label=\"3 developers face identity authentication related issues while collecting user information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Developers face identity authentication-related issues while collecting user information</h3>\n<p>According to Forrester's study, <a href=\"https://www.whitesourcesoftware.com/forrester-state-of-application-security-report/\">42% of external attacks</a> happen due to software exploitation, and 35% result from web application vulnerability. As applications become more complex, different laws have been enacted to ensure their security. </p>\n<p>As a creator of front-end or back-end applications, developers will eventually experience the need to collect and store consumer information like their identities and other profile details. </p>\n<p>At the same time, they'll also need to design a new user registration workflow, enable omnichannel experience, configure authentication methods like <a href=\"https://www.loginradius.com/social-login/\">social login</a>, provision or de-provision consumers, partner to a third-party application, or secure the API of their web services.</p>\n<p>Hence, developers need to incorporate robust identity authentication mechanisms to ensure the highest level of application security. </p>\n<h3 id=\"4-consumers-demand-rich-user-experience-from-the-moment-they-interact-with-your-platform\" style=\"position:relative;\"><a href=\"#4-consumers-demand-rich-user-experience-from-the-moment-they-interact-with-your-platform\" aria-label=\"4 consumers demand rich user experience from the moment they interact with your platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Consumers demand rich user experience from the moment they interact with your platform</h3>\n<p>Admit it, a little friction in the overall registration process could lead to your website visitors being forced to switch to your competitors. </p>\n<p>Hence, no business could afford to lose a potential client just because its platform lacks a rich consumer experience that begins from the moment a user first interacts with their brand. </p>\n<p>Businesses must leverage cutting-edge identity authentication methods like <a href=\"https://www.loginradius.com/passwordless-login/\">passwordless authentication</a> that swap the use of a traditional password with more secure factors. </p>\n<p>These extra-security methods may include a magic link, fingerprint, PIN, or a secret token delivered via email or text message.</p>\n<h3 id=\"5-businesses-can-create-a-personalized-consumer-journey-and-build-trust\" style=\"position:relative;\"><a href=\"#5-businesses-can-create-a-personalized-consumer-journey-and-build-trust\" aria-label=\"5 businesses can create a personalized consumer journey and build trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Businesses can create a personalized consumer journey and build trust</h3>\n<p>Every consumer that lands on a website or downloads a mobile app has to go through a sign-up process, which decides whether a company is getting a loyal consumer or just another random user.</p>\n<p>Hence, businesses must leverage user data's true potential to deliver the experience that users demand.</p>\n<p>Whether it’s personalized suggestions based on previous search history or recommendations of products based on their interests, brands can build credibility and further enhance user engagement for more conversions.</p>\n<p>Hence, businesses need to ensure their <a href=\"https://www.loginradius.com/blog/identity/sso-business-strategy/\">sso business strategy</a> is up to the mark since consumers already interact with brands like Google, Amazon, Apple, etc. They know what a great user experience is. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Today’s businesses are already hurrying to jump on the technology bandwagon for their digital transformation. However, they aren’t paying attention to identity management's most crucial aspect. </p>\n<p>Through a robust CIAM solution, identity management has endless business advantages, including robust security, seamless user experience, compliance management, and more. </p>\n<p>Therefore, enterprises shouldn’t delay their identity management decisions and put their best efforts into incorporating a reliable CIAM to strengthen their identity authentication. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 20, 2022","updated_date":null,"description":"A weak line of defense and poor authentication mechanism at the service providers’ could tarnish a brand's reputation in the global markets and eventually entitle the organization to pay hefty fines. Read on to know more about identity authentication and how it paves the path for businesses embarking on a digital transformation journey.","title":"5 Reasons Why You Need to Strengthen Your Identity Authentication","tags":["identity authentication","compliance","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/49b8375b0fbf1ec47f9dac2af4cd63c4/33aa5/identity-authentication.jpg","srcSet":"/static/49b8375b0fbf1ec47f9dac2af4cd63c4/f836f/identity-authentication.jpg 200w,\n/static/49b8375b0fbf1ec47f9dac2af4cd63c4/2244e/identity-authentication.jpg 400w,\n/static/49b8375b0fbf1ec47f9dac2af4cd63c4/33aa5/identity-authentication.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction From passwords to OTPs and fingerprints to facial recognition, we’ve come a long way to make authentication seamless, secure…","fields":{"slug":"/identity/mfa-vs-sso/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>From passwords to OTPs and fingerprints to facial recognition, we’ve come a long way to make authentication seamless, secure, and safe. </p>\n<p>Whether we’re paying online bills or signing up for our favorite OTT platform, we have to utilize any of the authentication mechanisms mentioned above to prove our identity. </p>\n<p>However, most businesses jumping on the technology bandwagon aren’t concerned with the risky number of cybersecurity threats that can breach conventional authentication mechanisms. And the number of such breaches is surging exponentially! </p>\n<p>As per <a href=\"https://www.ibm.com/security/data-breach\">IBM’s latest report</a>, the average total cost of a data breach increased by nearly 10% year over year, the enormous single-year cost surge in the last seven years. </p>\n<p>So, what can be the ideal solution to ensure a stringent line of defense for online platforms and mobile applications, especially when a single authentication isn’t enough? </p>\n<p>Businesses need to understand the importance of multi-factor authentication (MFA) that combines two or more authentication mechanisms and reinforces overall security. But what about user experience? No business would prefer <a href=\"https://www.loginradius.com/blog/identity/benefits-of-reauthentication/\">re-authenticating</a> their users/customers again and again through different authentication mechanisms. </p>\n<p>Here’s where the crucial role of single sign-on (SSO) comes into play. </p>\n<p>Let’s understand the aspects of MFA vs. SSO in detail and learn how businesses can leverage MFA and SSO to scale growth, ensure security, and maintain a rich consumer experience. </p>\n<h2 id=\"what-is-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#what-is-multi-factor-authentication-mfa\" aria-label=\"what is multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Multi-Factor Authentication (MFA)?</h2>\n<p>Multi-Factor Authentication (MFA) is an authentication method that requires users to provide multiple forms of verification to prove their identity. </p>\n<p>Whenever you think <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">what is multi-factor authentication</a> and its aim, you must understand that the aim of implementing MFA is to mitigate the risks associated with relying solely on traditional username and password combinations. By combining at least two out of three factors - something the user knows (e.g., a password), something they have (e.g., a token or smartphone), or something they are (e.g., biometrics) - MFA adds an extra layer of security to online accounts. </p>\n<p>This significantly reduces the likelihood of unauthorized access, protecting against threats such as password breaches or social engineering attacks.</p>\n<h2 id=\"what-is-an-sso-single-sign-on\" style=\"position:relative;\"><a href=\"#what-is-an-sso-single-sign-on\" aria-label=\"what is an sso single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is an SSO (Single Sign-On)?</h2>\n<p>One of the most common question that people search online is that what is an sso. <a href=\"https://www.loginradius.com/blog/identity/benefits-single-sign-on-sso/\">Single Sign-On</a> (SSO) streamlines the login process by allowing users to authenticate themselves once and gain access to multiple applications or systems. </p>\n<p>Rather than requiring users to remember and enter credentials for each service, SSO enables them to log in once through a central authentication system known as the Identity Provider (IdP). </p>\n<p>The IdP then authenticates the user's identity and provides access to the various applications within the SSO ecosystem. This simplifies user experience, enhances productivity, and reduces the burden of managing multiple sets of login credentials.</p>\n<h2 id=\"mfa-vs-sso-what-business-advantages-do-they-offer\" style=\"position:relative;\"><a href=\"#mfa-vs-sso-what-business-advantages-do-they-offer\" aria-label=\"mfa vs sso what business advantages do they offer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>MFA vs. SSO: What Business Advantages Do They Offer?</h2>\n<p><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-factor authentication</a> (or MFA)  is a multi-layered security system that verifies the identity of users for login or other transactions.</p>\n<p>The user account will remain secure by leveraging multiple authentication layers even if one element is damaged or disabled. And that's the catch!</p>\n<p>Codes generated by smartphone apps, answers to personal security questions, codes sent to an email address, fingerprints, etc., are a few examples of multi-factor authentication implemented in day-to-day scenarios. </p>\n<p>Since we’ve understood what MFA is and its crucial role in enhancing the platform and user security, let’s know what SSO is and how it helps businesses grow. </p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">Single Sign-On</a> (SSO)  is a method of authentication that allows websites/mobile applications to use other trustworthy sites/apps to verify users. Single sign-on enables users to log in to any independent application with a single ID and password.</p>\n<p>SSO is an essential feature of an <a href=\"https://www.loginradius.com/blog/identity/what-is-iam/\">Identity and Access Management</a> (IAM) platform for controlling access. Verifying user identity is vital for knowing which permissions a user will have. The LoginRadius Identity platform is one example of managing access that combines user identity management solutions with SSO solutions.</p>\n<h2 id=\"mfa-vs-sso-real-life-use-case\" style=\"position:relative;\"><a href=\"#mfa-vs-sso-real-life-use-case\" aria-label=\"mfa vs sso real life use case permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>MFA vs. SSO: Real-Life Use Case</h2>\n<p><strong>MFA:</strong> Multi-factor authentication is used in scenarios where stringent security measures are required, and a single layer of security isn’t sufficient. Let’s understand this with a real-life example. </p>\n<p>For instance, when you shop online and process the payment through internet banking, your bank website asks you to enter your credentials or PIN. Once the credentials/PIN are verified, an OTP (one-time-password) is sent to your registered mobile number, which you must enter to process the transaction. This is multi-factor authentication. </p>\n<p><strong>SSO:</strong> Single sign-on authentication helps users stay authenticated on multiple interconnected yet independent platforms using a single identity. Let’s understand this with a real-life example. </p>\n<p>For instance, when you’re signed in to Gmail on your web browser in one tab and open YouTube on another tab, you’re already signed in with your Gmail account. The same goes for other services offered by Google, including Google Photos, Drive, and more. </p>\n<h2 id=\"reasons-to-choose-mfa-for-your-business\" style=\"position:relative;\"><a href=\"#reasons-to-choose-mfa-for-your-business\" aria-label=\"reasons to choose mfa for your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reasons to Choose MFA for Your Business</h2>\n<p>The <a href=\"https://www.loginradius.com/blog/identity/benefits-of-mfa/\">benefits of multi-factor authentication</a> form part of the experience that modern consumers expect from any well-managed organization today. MFA is rapidly becoming a standard offering from the biggest tech companies we deal with today.</p>\n<p>Failing to meet these consumer expectations leaves you at risk of losing clientele to companies using CIAM and MFA to keep their data from harm.</p>\n<p>Here’s what MFA gives you and your consumers:</p>\n<ul>\n<li><strong>Better security</strong> provides additional protection for consumers and employees in multiple security layers. </li>\n<li><strong>Boosted conversion:</strong> A streamlined authentication process keeps productivity high, leading to increased conversions. </li>\n<li><strong>Improved customer trust:</strong> Due to extra security checks, consumers and employees are rest assured about the data. </li>\n<li><strong>Reduced operating costs:</strong> The more layers, the more the risk of intruders from data breaches is reduced, leading to reduced investment. </li>\n<li><strong>Achieve compliance:</strong> Specific to your organization to mitigate audit findings and avoid potential fines.</li>\n<li><strong>Increase flexibility and productivity:</strong> The ability to remove the burden of passwords leads to better productivity.</li>\n</ul>\n<h2 id=\"reasons-to-choose-sso-for-your-business\" style=\"position:relative;\"><a href=\"#reasons-to-choose-sso-for-your-business\" aria-label=\"reasons to choose sso for your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reasons to Choose SSO for Your Business</h2>\n<p>Single Sign-On clearly minimizes the risk of poor password habits. Also, removing login credentials from servers or network storage can help prevent a cyber-attack. Here’s what SSO gives you and your consumers:</p>\n<ul>\n<li><strong>Seamless user experience:</strong> Customers can use a single identity to navigate multiple web and mobile domains or service applications.</li>\n<li><strong>More robust password protection:</strong> Because users only need to use one password, SSO makes generating, remembering, and using stronger passwords simpler.</li>\n<li><strong>Reduces customer time:</strong> Less time spent re-entering passwords for the same identity. Users will spend less time logging into various apps to do their work. Ultimately it enhances the productivity of businesses.</li>\n<li><strong>Improves conversions and revenue:</strong> Customers can access all domains and services with a single active session.</li>\n<li><strong>Mitigates risk:</strong> Accessing third-party sites (user passwords are not stored or managed externally) becomes risk-free.</li>\n<li><strong>Unifies customer profiles:</strong> Creating a single instance of the customer data provides a <a href=\"https://www.loginradius.com/profile-management/\">centralized view of the customer</a> across all channels.</li>\n<li><strong>Reduces IT costs:</strong> Due to fewer help desk calls about passwords, IT can spend less time helping users remember or reset their passwords for hundreds of applications. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABkUlEQVQY002Qv0tbURiGL6LmemOLoCipMdVofmiutSTRm2gSbRKMQS0oqCRpQboZuTilHWpdJIP+IzqVthSKUhDSpU5OLg5dsmRTSCIO1cdzb0Lp8Jxz4Dvf+77fJ3W4IxhYPRE6vVFBrHF7DCIozbqBPDKN4kvQE1qheyJBh5pE9s4iu2aQm38k41BE85AawOVxMzg8gtPtxeefQg1o9KpRLK6mqGi0jidxxDOMJTdQtFXkFylhOtMwFHVT0CIeajBMej5BLBYl4H/J+voamWyGntFp2l2NpM8m0zhCS/QHF7AJ7AKHtsiAtsRT31xT0IgrGsKvUuSyG+TzW3x4X6BYLKLrOn3j/yUU9PrnsQuR5+Fl7ELcFkzzZKwx9r+R25whvpyccXdbp1wuU6lUTG7rdZLZbVoGp5D6/WzvHnJ59YfPP844+nrC8bdTSucXnJZ+06XGaRc7lhRTMMz3n7+AB65vbqhWq9RqNe7v/5J6qyMNBGkVptrrTfIfD8jtfCKr75q8K+zzZmePztGYubpHveXjbvKsd6kAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-SSO\"\n        title=\"DS-SSO\"\n        src=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png\"\n        srcset=\"/static/93476b7d6cd257f74ac39f36e32ef1b5/a6d36/DS-SSO.png 650w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/e5715/DS-SSO.png 768w,\n/static/93476b7d6cd257f74ac39f36e32ef1b5/81501/DS-SSO.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"best-practices-for-implementing-mfa-and-sso\" style=\"position:relative;\"><a href=\"#best-practices-for-implementing-mfa-and-sso\" aria-label=\"best practices for implementing mfa and sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices for Implementing MFA and SSO:</h2>\n<h3 id=\"mfa-best-practices\" style=\"position:relative;\"><a href=\"#mfa-best-practices\" aria-label=\"mfa best practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>MFA Best Practices</h3>\n<ul>\n<li>Enforce MFA for all users, particularly for privileged accounts and sensitive systems.</li>\n<li>Utilize a combination of diverse factors for authentication, such as passwords, tokens, and biometrics.</li>\n<li>Educate users about the <a href=\"https://www.loginradius.com/blog/engineering/why-mfa-important/\">importance of MFA</a> and provide clear instructions for setup and management.</li>\n<li>Regularly review and update MFA policies based on emerging security threats to maintain robust protection.</li>\n</ul>\n<h3 id=\"sso-best-practices\" style=\"position:relative;\"><a href=\"#sso-best-practices\" aria-label=\"sso best practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO Best Practices</h3>\n<ul>\n<li>Implement a secure and reliable Identity Provider (IdP) that supports industry-standard authentication protocols.</li>\n<li>Perform comprehensive testing and monitoring of the SSO system to identify and address vulnerabilities.</li>\n<li>Implement strong access controls and authorization mechanisms to ensure users have appropriate application access.</li>\n<li>Regularly review and update SSO configurations to align with evolving organizational requirements and security best practices.</li>\n</ul>\n<h2 id=\"common-mistakes-to-avoid-when-implementing-mfa-and-sso\" style=\"position:relative;\"><a href=\"#common-mistakes-to-avoid-when-implementing-mfa-and-sso\" aria-label=\"common mistakes to avoid when implementing mfa and sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common Mistakes to Avoid when Implementing MFA and SSO</h2>\n<h3 id=\"mfa-mistakes-to-avoid\" style=\"position:relative;\"><a href=\"#mfa-mistakes-to-avoid\" aria-label=\"mfa mistakes to avoid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>MFA Mistakes To Avoid</h3>\n<ul>\n<li>Overreliance on SMS-based one-time passwords (OTPs), which can be susceptible to SIM swapping or social engineering attacks.</li>\n<li>Neglecting user education on securing MFA factors or lacking clear instructions for recovery or reset processes.</li>\n<li>Failing to monitor MFA logs for potential security breaches or anomalies.</li>\n</ul>\n<h3 id=\"sso-mistakes-to-avoid\" style=\"position:relative;\"><a href=\"#sso-mistakes-to-avoid\" aria-label=\"sso mistakes to avoid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO Mistakes To Avoid</h3>\n<ul>\n<li>Implementing an outdated or insecure Identity Provider (IdP) that may have known vulnerabilities.</li>\n<li>Neglecting regular security assessments and audits of the SSO infrastructure.</li>\n<li>Failing to keep the SSO system and associated applications updated with the latest patches and security fixes.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>With the increasing cybersecurity threats and consumers demanding a seamless experience, every business must put its best foot forward in incorporating MFA and SSO into their platforms. </p>\n<p>However, a robust <a href=\"https://www.loginradius.com/blog/identity/loginradius-private-cloud-ciam-benefits/\">cloud-based CIAM</a> (consumer identity and access management) platform like LoginRadius solves the purpose for businesses planning to leverage both MFA and SSO.</p>\n<p>If you wish to see the future of SSO and MFA in action and how it works for your business, reach us to schedule a free personal demo of the LoginRadius CIAM. </p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What are the disadvantages of using MFA?</strong></p>\n<p>Some of the most common disadvantages of MFA include increased complexity for users, potential additional costs, and usability challenges.</p>\n<p><strong>2. What are the disadvantages of using SSO?</strong></p>\n<p>Some of the most common disadvantages of SSO include increased risk of a single point of failure, potential security breaches affecting multiple applications, and technical integration efforts.</p>\n<p><strong>3. Can MFA and SSO be used together?</strong></p>\n<p>Yes, combining MFA and SSO provides enhanced security and user experience.</p>\n<p><strong>4. How do MFA and SSO improve overall security?</strong></p>\n<p>MFA adds layers of verification, making unauthorized access harder, while SSO reduces password vulnerabilities and enhances convenience.</p>\n<p><strong>5. How can businesses determine the best solution for their needs?</strong></p>\n<p>By evaluating security requirements, assessing complexities and usability, and also by considering specific organizational needs.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 12, 2022","updated_date":null,"description":"Security and user experience are all that a modern online platform demands. And businesses need to create a perfect harmony between security and usability to witness growth. Let’s understand the aspects of MFA vs. SSO in detail and learn how businesses can leverage MFA and SSO to scale growth, ensure security, and maintain a rich consumer experience.","title":"What is the Difference Between MFA vs. SSO?","tags":["authentication","mfa","sso","ciam"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/509d1c16604397dccc4aa4e2c417bf3b/33aa5/sso-vs-mfa.jpg","srcSet":"/static/509d1c16604397dccc4aa4e2c417bf3b/f836f/sso-vs-mfa.jpg 200w,\n/static/509d1c16604397dccc4aa4e2c417bf3b/2244e/sso-vs-mfa.jpg 400w,\n/static/509d1c16604397dccc4aa4e2c417bf3b/33aa5/sso-vs-mfa.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction In this technology-driven modern world, authentication plays a crucial role, and login authentication is perhaps the most…","fields":{"slug":"/identity/what-is-login-authentication/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In this technology-driven modern world, authentication plays a crucial role, and login authentication is perhaps the most common scenario when we’re asked to authenticate ourselves.</p>\n<p>Login authentication, in the most simple words, is the way of confirming the identity of a user while they access their profile on a particular platform.</p>\n<p>We all have been using passwords for years to prove our identity on various platforms to access specific resources or information. However, things have been rapidly transposing since the introduction of hassle-free authentication mechanisms.</p>\n<p>For instance, can you relate to a situation where you were too lazy to sign in using your password and id and used your <a href=\"https://www.loginradius.com/blog/identity/what-is-social-login/\">social login</a> instead while purchasing from an e-commerce store? Or you preferred to set your fingerprint on your smartphone to authenticate payments and purchases instead of re-entering 4-digit passwords?</p>\n<p>Undoubtedly, the answer to these questions is yes! So what’s the biggest lesson that we’ve learned so far?</p>\n<p>We all prefer more convenient ways to authenticate ourselves, and the conventional authentication modes won’t work in this era! And for businesses to ensure they deliver the most pleasing experience to their customers, they have to incorporate the best login mechanism.</p>\n<p>Let’s look at some aspects and challenges of implementing a seamless authentication mechanism and learn how businesses can deliver a seamless user experience.</p>\n<h2 id=\"what-is-the-difference-between-authentication-and-login\" style=\"position:relative;\"><a href=\"#what-is-the-difference-between-authentication-and-login\" aria-label=\"what is the difference between authentication and login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is the Difference Between Authentication and Login?</h2>\n<p>Authentication and login are often used interchangeably, but they serve distinct purposes in the realm of digital security.</p>\n<h3 id=\"authentication\" style=\"position:relative;\"><a href=\"#authentication\" aria-label=\"authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication</h3>\n<p>Authentication is the broader process of verifying a user's identity before granting access to a system or platform. It involves confirming that the user is who they claim to be. This verification can occur through various methods, such as passwords, biometrics, security tokens, or multifactor authentication (MFA).</p>\n<h3 id=\"login\" style=\"position:relative;\"><a href=\"#login\" aria-label=\"login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Login</h3>\n<p>Login, on the other hand, is the specific act of gaining access to a system or application using verified credentials. It is a subset of authentication, representing the moment when a user enters their credentials (username and password, for example) to access their account.</p>\n<p>In essence, authentication is the overall process of confirming identity, while login is the specific action taken to enter a system using authenticated credentials.</p>\n<h2 id=\"why-login-authentication-is-important\" style=\"position:relative;\"><a href=\"#why-login-authentication-is-important\" aria-label=\"why login authentication is important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Login Authentication is Important?</h2>\n<p>In today's digitally interconnected world, where countless online platforms and services hold our personal information, user login authentication has emerged as a critical aspect of safeguarding user data and maintaining secure online experiences.  </p>\n<p>The primary purpose of login authentication is to verify the identity of a user attempting to access a particular application or website. By requiring users to provide unique credentials, such as usernames and passwords, login authentication acts as a vital gatekeeper, preventing unauthorized access to sensitive information. </p>\n<p>Without <a href=\"https://www.loginradius.com/authentication/\">proper authentication</a> measures, malicious actors can exploit vulnerabilities and gain access to private data, leading to various cybersecurity risks, including identity theft, data breaches, and financial fraud.</p>\n<p>Furthermore, login authentication plays a crucial role in building trust and credibility among users. When individuals know their data is protected through robust authentication processes, they are more likely to feel confident in engaging with online platforms, creating accounts, and sharing personal information.</p>\n<h2 id=\"how-does-login-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-login-authentication-work\" aria-label=\"how does login authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Login Authentication Work?</h2>\n<p>When we talk about login authentication, it’s divided into two major categories:</p>\n<ol>\n<li>Human to machine login authentication</li>\n<li>Machine to machine login authentication</li>\n</ol>\n<p>There is a requirement for specific credentials in any of the above types of authentication. In human verification, we have a user ID and password set by the consumer, while for machines, we have certificates and IP addresses, along with other information.</p>\n<p>Generally, a consumer has to select or create a User ID and corresponding password for that unique ID that the system will use to verify user credibility. </p>\n<p>Many businesses use authentication to verify the users who try to log in to their digital platforms. But if consumers' data falls into cybercriminals' hands, it can cause severe problems. Hence, businesses must use high-level security measures, which involve using another advanced authentication level such as <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multi-factor authentication</a>.</p>\n<h2 id=\"types-of-login-authentication\" style=\"position:relative;\"><a href=\"#types-of-login-authentication\" aria-label=\"types of login authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Login Authentication</h2>\n<h3 id=\"single-sign-on-sso\" style=\"position:relative;\"><a href=\"#single-sign-on-sso\" aria-label=\"single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Single Sign-On (SSO)</h3>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">Single Sign-On</a> (SSO) is a login authentication method that allows users to access multiple applications or services using a single set of credentials. With SSO, users log in only once, and their authentication token is then shared across various affiliated platforms. </p>\n<p>This streamlines the login process, eliminating the need for users to remember multiple login credentials, thus enhancing convenience and user experience. Additionally, SSO centralizes user access management, making it easier for businesses to maintain and revoke access privileges efficiently.</p>\n<h3 id=\"multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#multi-factor-authentication-mfa\" aria-label=\"multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication (MFA)</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">Multi-Factor Authentication</a> (MFA) is an advanced login authentication method that combines two or more independent verification factors to confirm a user's identity. </p>\n<p>These factors typically fall into three categories: \"Something You Know\" (e.g., passwords or PINs), \"Something You Have\" (e.g., mobile devices or smart cards), and \"Something You Are\" (e.g., biometric traits like fingerprints or facial recognition). By requiring multiple forms of authentication, MFA significantly strengthens security, as an attacker would need to compromise multiple factors to gain unauthorized access.</p>\n<h3 id=\"biometric-authentication\" style=\"position:relative;\"><a href=\"#biometric-authentication\" aria-label=\"biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Authentication</h3>\n<p>Biometric Authentication leverages unique biological characteristics, such as fingerprints, iris patterns, or facial features, to verify a user's identity. </p>\n<p>This technology offers a high level of security, as biometric traits are difficult to replicate, providing a robust defense against impersonation and identity fraud. <a href=\"https://www.loginradius.com/blog/identity/biometric-authentication-mobile-apps/\">Biometric authentication</a> is increasingly popular in mobile devices and other technologies, providing a seamless and convenient way for users to access their accounts securely.</p>\n<h3 id=\"social-login\" style=\"position:relative;\"><a href=\"#social-login\" aria-label=\"social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social Login</h3>\n<p>Social Login enables users to sign in to websites or applications using their existing social media credentials, such as Facebook, Google, or Twitter accounts. </p>\n<p>This authentication method simplifies the login process for users, as they don't need to create new accounts or remember additional passwords. However, businesses <a href=\"https://www.loginradius.com/social-login/\">implementing Social Login</a> must ensure the secure handling of user data and maintain user privacy in accordance with relevant data protection regulations.</p>\n<h3 id=\"passwordless-authentication\" style=\"position:relative;\"><a href=\"#passwordless-authentication\" aria-label=\"passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Authentication</h3>\n<p><a href=\"https://www.loginradius.com/passwordless-login/\">Passwordless authentication</a> eliminates the need for traditional passwords, relying on alternative methods for identity verification. Some common passwordless authentication approaches include sending one-time codes to registered mobile devices or email addresses, using biometric data, or utilizing hardware tokens for authentication. </p>\n<p>By removing passwords from the equation, businesses can mitigate the risks associated with weak passwords or password reuse, leading to a more secure authentication process.</p>\n<p>Incorporating these various user login authentication methods allows businesses to tailor their security measures to suit their specific needs while providing users with a seamless and secure login experience.</p>\n<h2 id=\"common-threats-to-login-authentication\" style=\"position:relative;\"><a href=\"#common-threats-to-login-authentication\" aria-label=\"common threats to login authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common Threats to Login Authentication</h2>\n<p>Login authentication, while crucial for security, faces several threats that can compromise user accounts and sensitive data. Here are some common threats to be aware of:</p>\n<h3 id=\"1-phishing-attacks\" style=\"position:relative;\"><a href=\"#1-phishing-attacks\" aria-label=\"1 phishing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Phishing Attacks</h3>\n<p>Phishing involves tricking users into revealing their login credentials by impersonating legitimate entities through deceptive emails or websites. Users may unknowingly provide their usernames and passwords, leading to unauthorized access.</p>\n<h3 id=\"2-brute-force-attacks\" style=\"position:relative;\"><a href=\"#2-brute-force-attacks\" aria-label=\"2 brute force attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Brute Force Attacks</h3>\n<p>In a brute force attack, hackers attempt to guess a user's password by systematically trying various combinations until they find the correct one. This method exploits weak or commonly used passwords.</p>\n<h3 id=\"3-credential-stuffing\" style=\"position:relative;\"><a href=\"#3-credential-stuffing\" aria-label=\"3 credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Credential Stuffing</h3>\n<p>Credential stuffing occurs when attackers use previously leaked username and password combinations from one breach to gain unauthorized access to other accounts. Users who reuse passwords across multiple platforms are particularly vulnerable to this threat.</p>\n<h3 id=\"4-man-in-the-middle-mitm-attacks\" style=\"position:relative;\"><a href=\"#4-man-in-the-middle-mitm-attacks\" aria-label=\"4 man in the middle mitm attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Man-in-the-Middle (MITM) Attacks</h3>\n<p>In MITM attacks, hackers intercept communication between a user and a website to steal login credentials. This can occur on unsecured Wi-Fi networks or compromised systems.</p>\n<h3 id=\"5-session-hijacking\" style=\"position:relative;\"><a href=\"#5-session-hijacking\" aria-label=\"5 session hijacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Session Hijacking</h3>\n<p>Session hijacking involves an attacker stealing a user's session token after a successful login. With this token, the attacker can impersonate the user and access their account without needing their password.</p>\n<h3 id=\"6-insider-threats\" style=\"position:relative;\"><a href=\"#6-insider-threats\" aria-label=\"6 insider threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Insider Threats</h3>\n<p>Insider threats involve employees or trusted individuals within an organization misusing their access privileges. This could include unauthorized access to sensitive data or sharing login credentials with malicious intent.</p>\n<h2 id=\"how-does-poor-authentication-experience-affect-overall-business-growth\" style=\"position:relative;\"><a href=\"#how-does-poor-authentication-experience-affect-overall-business-growth\" aria-label=\"how does poor authentication experience affect overall business growth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Poor Authentication Experience Affect Overall Business Growth?</h2>\n<p>When a user lands on your website or web application for the first time, they aren’t ready to fill out lengthy registration forms while you’re registering them on your platform. They’re already leveraging quick authentication on their smartphones, and they expect the same level of usability. </p>\n<p>The same goes for your registered users. They want frictionless authentication when they revisit your platform and are strictly against entering usernames and passwords again and again. </p>\n<p>Hence, businesses that aren’t using seamless user authentication mechanisms are behind their competitors since a bit of friction in the aforementioned processes may force a user to switch. </p>\n<p>So, what can be the ideal solution for businesses to improve conversions and sales? </p>\n<p>Well, a consumer identity and access management (CIAM) solution could be the best solution to help businesses overcome the challenges of poor authentication.</p>\n<h2 id=\"ciam--the-one-stop-solution-for-seamless-login-authentication-security-and-compliance\" style=\"position:relative;\"><a href=\"#ciam--the-one-stop-solution-for-seamless-login-authentication-security-and-compliance\" aria-label=\"ciam  the one stop solution for seamless login authentication security and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CIAM — The One-Stop Solution for Seamless Login Authentication, Security, and Compliance</h2>\n<p>The <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) solution takes over the customer login experience. There’s more at stake than just registration and authentication.</p>\n<p>CIAM simplifies every business task that deals with your customers individually, including those that haven’t registered on your site yet. CIAM seamlessly links authentication, customer management, sales, marketing, business intelligence, and services with a single data hub for all identities.</p>\n<p>In the most simple terms, customer identity and access management is a digital identity management software solution for businesses that combines login verification with customer data storage. CIAM aims to improve the customer's sign-up and login experience while securely managing customer identities.</p>\n<p>CIAM offers the luxury of a centralized customer database that links all other apps and services to provide a secure and seamless customer experience.</p>\n<h2 id=\"how-loginradius-ciam-paves-the-path-for-business-growth\" style=\"position:relative;\"><a href=\"#how-loginradius-ciam-paves-the-path-for-business-growth\" aria-label=\"how loginradius ciam paves the path for business growth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius CIAM Paves the Path for Business Growth?</h2>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius’ cutting-edge CIAM</a> helps businesses scale and stay ahead of their curve. Let’s understand why you need to leverage LoginRadius’ world-class cloud-based CIAM for your business. </p>\n<h3 id=\"simplified-and-seamless-registration-with-social-login\" style=\"position:relative;\"><a href=\"#simplified-and-seamless-registration-with-social-login\" aria-label=\"simplified and seamless registration with social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Simplified and seamless registration with social login</h3>\n<p>Let your users register and authenticate in seconds with LoginRadius’ social login. LoginRadius has combined the APIs of over 40 social networks to create a unified social API fully equipped to handle the features of these providers.</p>\n<h3 id=\"frictionless-authentication-with-passwordless-login\" style=\"position:relative;\"><a href=\"#frictionless-authentication-with-passwordless-login\" aria-label=\"frictionless authentication with passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Frictionless authentication with passwordless login</h3>\n<p>With LoginRadius’ Passwordless Login, you can create a completely frictionless registration and authentication process for your customers, freeing them from the hassle of remembering yet another password.</p>\n<p><a href=\"https://www.loginradius.com/resource/passwordless-login-magic-link-otp-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-passwordless-magic\"\n        title=\"DS-passwordless-magic\"\n        src=\"/static/080d729534ed7c510139db40ae1aefa4/e5715/DS-passwordless-magic.png\"\n        srcset=\"/static/080d729534ed7c510139db40ae1aefa4/a6d36/DS-passwordless-magic.png 650w,\n/static/080d729534ed7c510139db40ae1aefa4/e5715/DS-passwordless-magic.png 768w,\n/static/080d729534ed7c510139db40ae1aefa4/81501/DS-passwordless-magic.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"phone-authentication-and-registration\" style=\"position:relative;\"><a href=\"#phone-authentication-and-registration\" aria-label=\"phone authentication and registration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Phone authentication and registration</h3>\n<p>With LoginRadius, your customers can use their phone numbers to log in to your websites and apps. <a href=\"https://www.loginradius.com/resource/loginradius-ciam-phone-authentication/\">LoginRadius Phone Login</a> works seamlessly with mobile apps and automatically detects and fills in the verification SMS code to deliver a frictionless experience for your customers.</p>\n<h3 id=\"valuable-customer-insights\" style=\"position:relative;\"><a href=\"#valuable-customer-insights\" aria-label=\"valuable customer insights permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Valuable customer insights</h3>\n<p>With LoginRadius CIAM, you can successfully target your customer base with data collected and organized in the Admin Console. The LoginRadius Identity Platform makes complex customer analytics easy to understand via detailed graphs and customer insights.</p>\n<h2 id=\"why-do-developers-love-loginradius-for-login-authentication\" style=\"position:relative;\"><a href=\"#why-do-developers-love-loginradius-for-login-authentication\" aria-label=\"why do developers love loginradius for login authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Do Developers Love LoginRadius for Login Authentication?</h2>\n<h3 id=\"80-faster-time-to-value\" style=\"position:relative;\"><a href=\"#80-faster-time-to-value\" aria-label=\"80 faster time to value permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>80% Faster time-to-value</h3>\n<p>The LoginRadius Identity Platform can be deployed in weeks, providing value 80% faster than our closest competitor. </p>\n<h3 id=\"flexible-and-customizable\" style=\"position:relative;\"><a href=\"#flexible-and-customizable\" aria-label=\"flexible and customizable permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Flexible and customizable</h3>\n<p>From JavaScripts to SDKs and hosted solutions to turnkey plugins, LoginRadius provides various deployment methodologies. These methods can be used interchangeably depending on your desired login and registration workflow. </p>\n<h3 id=\"saves-on-resources-and-time\" style=\"position:relative;\"><a href=\"#saves-on-resources-and-time\" aria-label=\"saves on resources and time permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Saves on resources and time</h3>\n<p>Cut down the lines of code required with one of the LoginRadius SDKs. LoginRadius takes care of the error and exception handling and security updates and patches, so you don’t have to. Build your login and registration forms with LoginRadius JS widgets and UI/UX tools—simply copy the customized code from the LoginRadius Admin Console and paste it to your website. </p>\n<h3 id=\"api-driven-with-out-of-the-box-solutions\" style=\"position:relative;\"><a href=\"#api-driven-with-out-of-the-box-solutions\" aria-label=\"api driven with out of the box solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>API driven with out-of-the-box solutions</h3>\n<p>LoginRadius is a fully API-driven platform that can be deployed on any system. With hosted solutions such as the Identity Experience Framework, extensive SDK and JS libraries, and several CMS plugins, LoginRadius offers a range of out-of-the-box deployments for an easy, efficient, and fully customizable implementation.</p>\n<h2 id=\"ready-to-deliver-the-next-level-of-frictionless-login-authentication-to-your-users\" style=\"position:relative;\"><a href=\"#ready-to-deliver-the-next-level-of-frictionless-login-authentication-to-your-users\" aria-label=\"ready to deliver the next level of frictionless login authentication to your users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Ready to Deliver the Next Level of Frictionless Login Authentication to Your Users?</h2>\n<p>Delivering a rich login authentication experience to your consumers is paramount for your business success, and a new-age CIAM is undoubtedly the key to delivering a flawless user experience. </p>\n<p>LoginRadius CIAM platform is designed to help businesses reach their targeted goals by enhancing the consumer experience, improving overall data security, and meeting regulatory compliances. </p>\n<p>If you wish to experience how LoginRadius works for your business, reach us today to schedule a free personalized demo. </p>\n<p>Our product experts will show you the power of the LoginRadius Identity Platform, discuss your use cases, and explain how our cloud-based identity management solution drives <a href=\"https://www.loginradius.com/blog/identity/loginradius-roi-enterprises-infographic/\">ROI for your business</a>.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<h4 id=\"1-how-do-i-make-an-authentication-login\" style=\"position:relative;\"><a href=\"#1-how-do-i-make-an-authentication-login\" aria-label=\"1 how do i make an authentication login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>1. How do I make an authentication login?</strong></h4>\n<p>Implement authentication logic in your application to verify user identity before granting access.</p>\n<h4 id=\"2-what-is-authentication-with-an-example\" style=\"position:relative;\"><a href=\"#2-what-is-authentication-with-an-example\" aria-label=\"2 what is authentication with an example permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>2. What is authentication with an example?</strong></h4>\n<p>Authenticating with a username and password to access an email account is an example of authentication.</p>\n<h4 id=\"3-what-is-authentication-and-verification\" style=\"position:relative;\"><a href=\"#3-what-is-authentication-and-verification\" aria-label=\"3 what is authentication and verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>3. What is authentication and verification?</strong></h4>\n<p>Authentication confirms a user's identity, while verification checks the accuracy of this process.</p>\n<h4 id=\"4-is-a-password-an-authentication\" style=\"position:relative;\"><a href=\"#4-is-a-password-an-authentication\" aria-label=\"4 is a password an authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>4. Is a password an authentication?</strong></h4>\n<p>Yes, a password is a common form of authentication credential.</p>\n<h4 id=\"5-what-is-the-best-authentication-method\" style=\"position:relative;\"><a href=\"#5-what-is-the-best-authentication-method\" aria-label=\"5 what is the best authentication method permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>5. What is the best authentication method?</strong></h4>\n<p>The best authentication method depends on the security needs of the system. Multi-factor authentication (MFA) is often considered one of the most secure methods.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 07, 2022","updated_date":null,"description":"Login authentication is the most common scenario where we’re asked to authenticate ourselves. Let’s look at some aspects and challenges of implementing a seamless authentication mechanism and learn how businesses can deliver a seamless user experience through a CIAM.","title":"What is Login Authentication?","tags":["login authentication","identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/25f482319c5c4fcb1749a8c424a007b0/33aa5/login-authentication.jpg","srcSet":"/static/25f482319c5c4fcb1749a8c424a007b0/f836f/login-authentication.jpg 200w,\n/static/25f482319c5c4fcb1749a8c424a007b0/2244e/login-authentication.jpg 400w,\n/static/25f482319c5c4fcb1749a8c424a007b0/33aa5/login-authentication.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Customer verification is the process of authenticating a customer's identity. It can come in many forms, including email…","fields":{"slug":"/identity/how-to-improve-customer-verification-process/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Customer verification is the process of authenticating a customer's identity. It can come in many forms, including email verification, address verification, and phone verification, but it always involves confirming that a person is who they say they are.</p>\n<p>The primary reason customer verification is needed is to prevent fraud. It's especially important to verify customers in industries with high risk for fraud like banking and finance or retail.</p>\n<p>In the wake of recent data breaches, many companies are realizing that they need to improve their customer verification process. It's no longer enough to simply check a customer's name against a list of approved names at the time of purchase. </p>\n<p>Today, you need to <a href=\"https://www.loginradius.com/blog/identity/what-is-identity-verification/\">verify your customers' identities</a> in more creative ways if you want to keep your business safe from hackers and thieves.</p>\n<p>In this post, you’ll learn some top ways to improve your customer verification process. But first, let’s quickly understand the types of customer verification.</p>\n<h2 id=\"types-of-customer-verification\" style=\"position:relative;\"><a href=\"#types-of-customer-verification\" aria-label=\"types of customer verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Customer Verification</h2>\n<p>Here are the primary forms of verification businesses incorporate today:</p>\n<ul>\n<li><strong>Two-factor or multi-factor authentication:</strong> It requires your customers to add extra layers of protection to the sign-in process. For example, the need to enter a code sent to their email or mobile phone number. </li>\n<li><strong>Knowledge-based authentication:</strong> It is used to verify a person’s identity by requiring an answer to security questions. The question should be simple for the user to answer but difficult for others to guess.</li>\n<li><strong>Age verification:</strong> It helps online businesses verify a customer’s age before allowing them to purchase a product online. </li>\n<li><strong>A credit bureau-based authentication:</strong> It relies on data from one or more credit bureaus. These companies store extensive credit info of consumers, including names, add, and social security numbers. </li>\n<li><strong>Online document verification:</strong> It involves verifying the authenticity of identity documents, including a passport, driving license, or identity card issued by the government. </li>\n<li><strong>One-time password:</strong> It is an automatically generated numeric or alphanumeric series of characters that verifies users for a single login session or transaction.</li>\n</ul>\n<p>With the right <a href=\"https://www.wix.com/ecommerce/website\">eCommerce website builder</a>, the process is made easy, saving you time and money.</p>\n<p>Now, check out these top ways to improve and streamline your customer verification process.</p>\n<h3 id=\"1-explain-the-what-and-why-behind-the-process-to-your-customers\" style=\"position:relative;\"><a href=\"#1-explain-the-what-and-why-behind-the-process-to-your-customers\" aria-label=\"1 explain the what and why behind the process to your customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Explain the 'what' and 'why' behind the process to your customers.</h3>\n<p>For instance, if you are doing email validation integration for Shopify with ZeroBounce, after a few initial steps, you will be asked to click the verification link to begin the verification process.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 48.2421875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ss-1\"\n        title=\"ss-1\"\n        src=\"/static/2279809c7dc6f1d95e8f09ea112a35bb/01e7c/ss-1.png\"\n        srcset=\"/static/2279809c7dc6f1d95e8f09ea112a35bb/01e7c/ss-1.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><a href=\"https://www.zerobounce.net/docs/api-integrations/shopify\">Source</a></p>\n<p>Notice how they explain that verifying their Shopify list will consume 500 credits from their accounts to their customers. But 500 credits are needed for the verification process. </p>\n<p>Have a look at some best practices and examples to <a href=\"https://www.loginradius.com/blog/fuel/best-practices-verification-emails-effective/\">make verification emails effective</a>. </p>\n<p>At the same time, the more you know about your customers, the more effectively you can weed out potentially fraudulent behavior through patterns of inconsistent information or other red flags. </p>\n<p>For example, if someone places an order using an email address that isn't associated with their shipping address or payment information (or worse yet, if they use a temporary email address), that's a glaring inconsistency you should investigate before approving the purchase.</p>\n<h3 id=\"2-reduce-manual-processes-and-automate\" style=\"position:relative;\"><a href=\"#2-reduce-manual-processes-and-automate\" aria-label=\"2 reduce manual processes and automate permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Reduce manual processes and automate.</h3>\n<p>As per <a href=\"https://baymard.com/lists/cart-abandonment-rate\">The Baymard Institute</a>, 24% of respondents in the US said the reason for cart abandonment during checkout was because the site wanted them to create a new account, while 17% said the checkout process was too long and complicated.</p>\n<p>Automating specific processes like account creation and form fills could considerably increase sales. </p>\n<p>For instance, you can use behavioral biometrics.</p>\n<p>Biometrics is one of the most effective methods of customer verification because physical traits like fingerprints and retina scans cannot be faked. Behavioral biometrics go one step further by considering how a person types or handles their mouse or mobile device as well as their physical characteristics.</p>\n<p><a href=\"https://www.loginradius.com/resource/mobile-biometric-authentication-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-Mob-Biometric\"\n        title=\"DS-Mob-Biometric\"\n        src=\"/static/14db6f55eea842818c721e59969c9e8c/e5715/DS-Mob-Biometric.png\"\n        srcset=\"/static/14db6f55eea842818c721e59969c9e8c/a6d36/DS-Mob-Biometric.png 650w,\n/static/14db6f55eea842818c721e59969c9e8c/e5715/DS-Mob-Biometric.png 768w,\n/static/14db6f55eea842818c721e59969c9e8c/81501/DS-Mob-Biometric.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-speed-things-up-with-sso\" style=\"position:relative;\"><a href=\"#3-speed-things-up-with-sso\" aria-label=\"3 speed things up with sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Speed things up with SSO.</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">Single sign-on</a> (SSO) lets users log in with a single set of credentials like their Facebook account or Google account. Using information from trusted sources allows your customers to get verified faster and with less friction over the process. Some examples are Facebook Connect, Google Sign-In, and Twitter Login.</p>\n<p>SSO can reduce password fatigue, simplify username and password management, increase identity protection, prevent errors, and cut down help desk workloads, among others.</p>\n<p>For instance, if you log in to a Google service like Gmail, you get automatically authenticated to YouTube, Google Analytics, and other Google apps. </p>\n<h3 id=\"4-give-customers-something-to-do-while-they-wait\" style=\"position:relative;\"><a href=\"#4-give-customers-something-to-do-while-they-wait\" aria-label=\"4 give customers something to do while they wait permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Give customers something to do while they wait.</h3>\n<p>Just like in restaurants where customers are made to play games or browse through other menu items while they wait for the order, you can apply the same strategy online.</p>\n<p>When they call, give customers something to do while they wait in the queue.</p>\n<p>You can entertain them with witty illustrations or, better yet, educate them with snippets of information that are relevant to their needs. You’ll make a better first impression by engaging your customers right away instead of putting them on hold.</p>\n<p>Advertising and sharing your latest deals and links to your YouTube channel are also great ideas.</p>\n<p>Another way to minimize frustration and improve the user experience during the verification phase is by providing them with a task such as answering a security question or providing additional demographic details (e.g., driver's license number, email address).</p>\n<h3 id=\"5-use-identity-verification-software\" style=\"position:relative;\"><a href=\"#5-use-identity-verification-software\" aria-label=\"5 use identity verification software permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Use identity verification software.</h3>\n<p>If you're looking for ways to improve your customer verification process, identity verification software could be a smart addition to your business. Using such software can help you reduce the risk of fraud and identity theft, ensure compliance with KYC regulations and other requirements, and verify the identities of customers in real-time.</p>\n<p>While choosing your identity verification software, focus on addressing your business needs. Besides, it should be able to verify customers worldwide, offer real-time verification, provide geolocation services and customization.</p>\n<p>Also, see that your solution is compliant with the global regulations and is secure. You should start looking up <a href=\"https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2022/\">security tips from experts</a> to strengthen your security.</p>\n<h2 id=\"thats-a-wrap\" style=\"position:relative;\"><a href=\"#thats-a-wrap\" aria-label=\"thats a wrap permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>That’s a Wrap!</h2>\n<p>In summary, there are many ways eCommerce retailers can improve the customer verification process. One way is to tailor the process to your business to get the greatest return on investment for your specific needs. </p>\n<p>Whether you choose to <a href=\"https://www.loginradius.com/blog/identity/build-vs-buy-securing-customer-identity/\">develop your own system</a> or purchase a verification solution from a third-party vendor, ensuring this process is seamless for customers, and free of errors will go a long way towards ensuring that both merchants and buyers have a trusted and satisfying shopping experience every time.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 04, 2022","updated_date":null,"description":"In the wake of recent data breaches, many companies are realizing that they need to improve their customer verification process. Learn how to improve the process and make it easy and secure for your customers.","title":"5 Ways to Improve Your Customer Verification Process","tags":["identity verification","customer identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5625,"src":"/static/c33ab82e898a176f32167ddcfbbe1158/33aa5/customer-verifcn.jpg","srcSet":"/static/c33ab82e898a176f32167ddcfbbe1158/f836f/customer-verifcn.jpg 200w,\n/static/c33ab82e898a176f32167ddcfbbe1158/2244e/customer-verifcn.jpg 400w,\n/static/c33ab82e898a176f32167ddcfbbe1158/33aa5/customer-verifcn.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Gaurav Belani","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":162,"currentPage":28,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}