{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/37","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Re-authentication is the process of ensuring the constant presence that has to be authenticated when there is a long period of usage. The…","fields":{"slug":"/identity/benefits-of-reauthentication/"},"html":"<p>Re-authentication is the process of ensuring the constant presence that has to be authenticated when there is a long period of usage. The purpose of re-authentication is to ensure that the person who is currently using the resources is the same person who had initially signed in to use it. This will ensure that there is no breach of identification or exploitation of data.  </p>\n<h2 id=\"benefits-of-re-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-re-authentication\" aria-label=\"benefits of re authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Re-authentication</h2>\n<p>So, what are the benefits of imposing a re-authentication time limit? Let’s find out. </p>\n<h3 id=\"1-it-offers-central-control-on-user-access\" style=\"position:relative;\"><a href=\"#1-it-offers-central-control-on-user-access\" aria-label=\"1 it offers central control on user access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. It offers central control on user access.</h3>\n<p>The re-authentication process offers enterprises or service providers complete control over who has access to a particular system or services. Some systems use control panels to ensure that all the data regarding the user is recorded and has easy access. This also plays an important role in solving any future issue regarding identity breaches.</p>\n<h3 id=\"2-it-dispels-the-concept-of-password-fatigue\" style=\"position:relative;\"><a href=\"#2-it-dispels-the-concept-of-password-fatigue\" aria-label=\"2 it dispels the concept of password fatigue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. It dispels the concept of password fatigue.</h3>\n<p>When a user requires to generate and remember more than one password, password fatigue may arise. While there are solutions like password managers that help solve the issue of remembering multiple passwords, they might not always be a safe choice. Many people still find it difficult to use and maintain a separate list of passwords on the side. There might be chances in which an intruder can gain access to such sensitive data and misuse it.</p>\n<p>Thus, a re-authentication is considered ideal for the elimination of password fatigue. The system will undertake the identity test without the need to type the password and ensure a safe environment for the users.</p>\n<p><a href=\"https://www.loginradius.com/resource/adding-salt-to-hashing-a-step-by-step-guide-to-store-passwords/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-salt-hashing\"\n        title=\"GD-salt-hashing\"\n        src=\"/static/75d07d36528b68501e972fe56628d7f3/e5715/GD-salt-hashing.png\"\n        srcset=\"/static/75d07d36528b68501e972fe56628d7f3/a6d36/GD-salt-hashing.png 650w,\n/static/75d07d36528b68501e972fe56628d7f3/e5715/GD-salt-hashing.png 768w,\n/static/75d07d36528b68501e972fe56628d7f3/81501/GD-salt-hashing.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-it-reduces-the-need-for-it-support-calls\" style=\"position:relative;\"><a href=\"#3-it-reduces-the-need-for-it-support-calls\" aria-label=\"3 it reduces the need for it support calls permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. It reduces the need for IT support calls.</h3>\n<p>There are many instances where users forget their passwords and are locked out of their system due to multiple wrong attempts. This issue is often resolved with the aid of the IT call center. However, the process of resetting the password in high-security systems is very time-consuming and costly.</p>\n<p>The average cost for the IT department to reset a password is $70, and around 50% of the IT department focuses on resetting the password.</p>\n<p>Re-authentication ensures that there is minimal effort to be put on behalf of the IT department. It is both a cost-effective and time-saving mode of usage.</p>\n<h3 id=\"4-it-integrates-enhanced-password-policy\" style=\"position:relative;\"><a href=\"#4-it-integrates-enhanced-password-policy\" aria-label=\"4 it integrates enhanced password policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. It integrates enhanced password policy.</h3>\n<p>Re-authentication helps <a href=\"https://www.loginradius.com/blog/identity/loginradius-password-policy-business-consumer/\">implement better password policies</a> in an enterprise. This can be regarding how an employee uses the password and manages it. For instance, who can change the password, what can be the length of the password, and other similar password settings? Some of the password policies are:</p>\n<ul>\n<li>A password history policy where old passwords cannot be reused</li>\n<li>A maximum age policy for passwords. This will expire the password validity after the stipulated time.</li>\n<li>A minimum password length policy so that the password used is not too short and easy.</li>\n<li>A password audit policy to recognize the identity of who alters the password.</li>\n<li>A minimum password age policy to ensure that passwords are not constantly changed.</li>\n</ul>\n<p>Having such a tight password policy will ensure that the team has only secure and quality passwords being used in their systems.</p>\n<h3 id=\"5-it-alleviates-on-premises-security-danger\" style=\"position:relative;\"><a href=\"#5-it-alleviates-on-premises-security-danger\" aria-label=\"5 it alleviates on premises security danger permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. It alleviates on-premises security danger</h3>\n<p>Apart from forgetting passwords or misplacing them, the other major issue of saving passwords on-premises is cyber theft. There is an increasing rate of hacking in many highly secure office systems, mainly due to the easy storage of passwords. </p>\n<p>On average, there are about <a href=\"https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/?utm_source=xp&#x26;utm_medium=blog&#x26;utm_campaign=content\">1,473 reports of data breaches</a> being reported every year. It has been predicted that, with the growth of technology, the risk of hacking will only increase further in the following years.</p>\n<p>Re-authentication ensures that hackers don’t get easy access to a system’s content and leverage no other loopholes to exploit sensitive consumer credentials. Apart from internal combustion, re-authentication can also save you from external intrusion.  </p>\n<p>All-in-all, you can save a lot of time and password exploitation with re-authentication. Speaking of which, the LoginRadius Re-authentication feature can help businesses securely re-authenticate consumers without taking a toll on user experience. <a href=\"https://www.loginradius.com/contact-sales\">Contact us</a> today to find out more. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 16, 2021","updated_date":null,"description":"Re-authentication ensures that hackers don’t get easy access to a system’s content and leverage no other loopholes to exploit sensitive consumer credentials. Apart from internal combustion, re-authentication can also save you from external intrusion.","title":"Discover the Benefits of Re-Authentication for Enhanced Security","tags":["data security","reauthentication","password management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5748031496062993,"src":"/static/47d7d7930a58d9f2ffee183f79dfe440/14b42/benefits-of-reauthentication-cover.jpg","srcSet":"/static/47d7d7930a58d9f2ffee183f79dfe440/f836f/benefits-of-reauthentication-cover.jpg 200w,\n/static/47d7d7930a58d9f2ffee183f79dfe440/2244e/benefits-of-reauthentication-cover.jpg 400w,\n/static/47d7d7930a58d9f2ffee183f79dfe440/14b42/benefits-of-reauthentication-cover.jpg 800w,\n/static/47d7d7930a58d9f2ffee183f79dfe440/16310/benefits-of-reauthentication-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"Customer support is considered the most critical aspect of business success in a modern, digitally advanced, and competitive world.  Besides…","fields":{"slug":"/identity/ciam-improve-customer-support/"},"html":"<p>Customer support is considered the most critical aspect of business success in a modern, digitally advanced, and competitive world. </p>\n<p>Besides numerous abilities, if an enterprise cannot deliver a flawless user experience to its clients, it will struggle to meet the desired competitive pace.  </p>\n<p>Consumer identity and access management (CIAM) solutions offer new horizons to businesses embarking on a journey to digital transformation with endless possibilities.</p>\n<p>Whether it’s intuitive and <a href=\"https://www.loginradius.com/blog/fuel/consumer-onboarding-strategies-for-saas-businesses/\">personalized user onboarding</a> or a unified view of every consumer, CIAM is becoming the need of the hour for diverse industries. </p>\n<p><a href=\"https://www.statista.com/statistics/1246434/identity-as-a-service-global-market-size/\">As per statista</a>, the identity as a service (IDaaS) market was valued at approx 4B U.S. dollars in 2019, which is expected to inflate to almost 18B U.S. dollars in 2027. </p>\n<p>This means that most businesses are already leveraging a robust CIAM for diverse reasons, including customer support. </p>\n<p>This post reveals the endless possibilities of a CIAM to deliver the highest level of customer support services to customers in the most competitive environment. </p>\n<h2 id=\"what-is-ciam-and-how-does-it-help-businesses\" style=\"position:relative;\"><a href=\"#what-is-ciam-and-how-does-it-help-businesses\" aria-label=\"what is ciam and how does it help businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is CIAM and How Does it Help Businesses?</h2>\n<p>Before we inch towards learning the CIAM aspects that help improve customer support, let’s quickly understand <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">what a CIAM is</a> and how it helps businesses.</p>\n<p>Customer identity and access management (CIAM) is a digital identity management software solution that combines login verification with customer data storage. </p>\n<p>CIAM aims to improve the customer's sign-up and login experience while securely managing customer identities. It offers the luxury of a centralized customer database that links all other apps and services to provide a secure and seamless customer experience.</p>\n<p>Customer identity and access management have historically been a use case for consumers (B2C). Yet, an organization's client may also be a company (B2B). </p>\n<p>The new way of doing business covers many markets and use cases as consumers demand more from companies they do business with. From an enterprise point of view, a CIAM solution has several valuable <a href=\"https://www.loginradius.com/authentication/\">features that can improve security</a>, enhance customer data collation, and provide critical data to the marketing and sales departments.</p>\n<h2 id=\"how-does-ciam-improve-customer-support\" style=\"position:relative;\"><a href=\"#how-does-ciam-improve-customer-support\" aria-label=\"how does ciam improve customer support permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does CIAM Improve Customer Support?</h2>\n<p>Now that we’ve learned the basics about a CIAM and how it helps businesses streamline identity management coupled with robust security, let’s understand how a CIAM also reinforces customer support services. </p>\n<h3 id=\"account-creation-and-management\" style=\"position:relative;\"><a href=\"#account-creation-and-management\" aria-label=\"account creation and management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Account Creation and Management</h3>\n<p>A CIAM solution can handle millions of identities. Each identity has its characteristics, which can be further utilized to help the identity owners to get instant support. </p>\n<p>Users of an enterprise can create, update, or delete records and can seek immediate help for any issue. Since all end-user records are available at a single click, managing them is easy and efficient.</p>\n<p>Users can add, delete, or update information related to their accounts and expect a resolution for their issues in a few minutes since the data can be accessed anywhere, anytime. </p>\n<p>Moreover, those who face verification emails or need to change account passwords can get instant support to fix the problems as everything is available in the system dashboard. </p>\n<h3 id=\"account-maintenance\" style=\"position:relative;\"><a href=\"#account-maintenance\" aria-label=\"account maintenance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Account Maintenance</h3>\n<p>When profile data is hidden away in silos, serving your users is like finishing a puzzle whose pieces are scattered in different rooms.</p>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius</a> brings all of the pieces together.</p>\n<p>Contact info, profile details, purchasing history, preferences, consumer service, and every bit of data and every interaction a person has with your brand is visible in a single location.</p>\n<p>Imagine how easily you could solve issues with user accounts. And how much more intelligent your business decisions could be. The LoginRadius Admin Console is where it all happens.</p>\n<h3 id=\"user-management\" style=\"position:relative;\"><a href=\"#user-management\" aria-label=\"user management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Management</h3>\n<p>You can manage a directory of ten thousand or ten million users straight from the LoginRadius Admin Console, which gives you a highly secure and flexible view of individual profiles.</p>\n<p>LoginRadius User Management includes tools for searching, browsing, and viewing all the data and activity associated with a user account.</p>\n<p>Administrators can also do manual actions on behalf of users, such as triggering verification and password reset emails, provisioning new accounts, and updating user information.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-user-management/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-user-mngmnt\"\n        title=\"DS-user-mngmnt\"\n        src=\"/static/01c0f502c70b5e74254b6a8df86c4088/e5715/DS-user-mngmnt.png\"\n        srcset=\"/static/01c0f502c70b5e74254b6a8df86c4088/a6d36/DS-user-mngmnt.png 650w,\n/static/01c0f502c70b5e74254b6a8df86c4088/e5715/DS-user-mngmnt.png 768w,\n/static/01c0f502c70b5e74254b6a8df86c4088/81501/DS-user-mngmnt.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"unified-view-of-each-customer\" style=\"position:relative;\"><a href=\"#unified-view-of-each-customer\" aria-label=\"unified view of each customer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Unified View of Each Customer</h3>\n<p>With a reliable CIAM like LoginRadius, enterprises can administer user profiles with just a single click. This means admins can easily edit individual customer roles in their database right from the Admin Console without running queries or dealing with complicated coding rules.</p>\n<p>Moreover, one can quickly search for any consumer with a single click and fetch their account details to help them with their concerns directly via CIAM.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Consumer identity and access management (CIAM) solutions are redefining the world of customer support services by offering endless possibilities. </p>\n<p>Many renowned businesses have been leveraging CIAM solutions for years to enhance security and better user experience and deliver the highest quality support services. </p>\n<p>The ones finding ways to enhance support services must consider relying on a CIAM solution that improves consumer support and eventually increases customer satisfaction and retention. <a href=\"https://www.loginradius.com/contact-sales\">Reach us out</a> to know more. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 14, 2021","updated_date":null,"description":"Whether it’s intuitive and personalized user onboarding or a unified view of every consumer, CIAM is becoming the need of the hour for diverse industries. Let’s learn about the endless possibilities of a CIAM that delivers the highest level of customer support services.","title":"Stand Out from the Crowd: Improve Your Customer Support with CIAM","tags":["ciam solution","cx","user management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5873015873015872,"src":"/static/6002c74c214e74245fb5b2c691d6d17e/14b42/ciam-improve-customer-support-cover.jpg","srcSet":"/static/6002c74c214e74245fb5b2c691d6d17e/f836f/ciam-improve-customer-support-cover.jpg 200w,\n/static/6002c74c214e74245fb5b2c691d6d17e/2244e/ciam-improve-customer-support-cover.jpg 400w,\n/static/6002c74c214e74245fb5b2c691d6d17e/14b42/ciam-improve-customer-support-cover.jpg 800w,\n/static/6002c74c214e74245fb5b2c691d6d17e/16310/ciam-improve-customer-support-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rajeev Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"In a world where every user demands a personalized experience, businesses without personalization would surely miss out on business…","fields":{"slug":"/identity/identity-system-customization/"},"html":"<p>In a world where every user demands a personalized experience, businesses without personalization would surely miss out on business opportunities. </p>\n<p>However, customizing a user identity system is a whole different concept and isn’t just limited to adding a personalized greeting for a user with their name. </p>\n<p>Customizing experiences right from the beginning when the user interacts with a brand impacts conversions and overall lead generation. </p>\n<p>Whether collecting user information, displaying the most relevant results, or suggesting products based on their previous preferences, customization is undoubtedly pivotal in improving conversions, sales, and lead generation. </p>\n<p>This post will highlight customized identity systems and learn how it paves the path for increased business advancements. </p>\n<h2 id=\"what-is-an-identity-system\" style=\"position:relative;\"><a href=\"#what-is-an-identity-system\" aria-label=\"what is an identity system permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is an Identity System?</h2>\n<p>Before we inch towards the business benefits of customizing an identity system, let’s first understand what an identity system is. </p>\n<p>An identity system or identity management system is an information system or a group of technologies working together to ensure the right individual has access to the right resources. </p>\n<p>Moreover, an identity system or a <a href=\"https://www.loginradius.com/\">consumer identity and access management</a> (CIAM) system helps businesses secure millions of consumer identities on their platform to offer a robust mechanism that prevents data breach. </p>\n<p>A CIAM solution also offers valuable insights into a consumer’s behavior, which further allows businesses to tailor their marketing and onboarding strategies. </p>\n<p><a href=\"https://www.loginradius.com/resource/an-identity-checklist-to-strategize-ciam-in-the-cloud/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"eb-iam-checklist\"\n        title=\"eb-iam-checklist\"\n        src=\"/static/b4c5a83a6e4a9c64bd00c98d46c12fcf/e5715/eb-iam-checklist.png\"\n        srcset=\"/static/b4c5a83a6e4a9c64bd00c98d46c12fcf/a6d36/eb-iam-checklist.png 650w,\n/static/b4c5a83a6e4a9c64bd00c98d46c12fcf/e5715/eb-iam-checklist.png 768w,\n/static/b4c5a83a6e4a9c64bd00c98d46c12fcf/63ff0/eb-iam-checklist.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"role-of-identity-system-customization\" style=\"position:relative;\"><a href=\"#role-of-identity-system-customization\" aria-label=\"role of identity system customization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Role of Identity System Customization</h2>\n<p>Since we have a fair knowledge of identity systems, let’s understand how customization can be a game-changer for achieving business goals through an identity system. </p>\n<p>We all come across different personalization experiences whenever we purchase goods from online marketplaces. </p>\n<p>Whether it’s Amazon suggesting a pair of running shoes when you purchase sports shorts or Netflix suggesting you a series based on your preferences, personalization is undeniably the key to push consumers to the sales funnel. </p>\n<p>However, the actual game begins in the first couple of seconds whenever an individual interacts with a brand for the first time. </p>\n<p>Yes, enterprises need to understand the importance of the onboarding process, which, if personalized adequately, can do wonders for their brand. </p>\n<p>Let’s understand this thing with an example.</p>\n<p>Imagine a user lands on a website and thinks about signing up. The website asks for a long list of details for the signup procedure. </p>\n<p>The user somehow manages to fill the enormous signup form (although around 80% of users will switch at this moment). </p>\n<p>Now the website, after the signup process, again asks for specific information. This information would be used to deliver a personalized experience but would undoubtedly hamper the user experience. </p>\n<p>The remaining users would now switch platforms. </p>\n<p>Here’s where an identity management solution like LoginRadius comes into play. </p>\n<p>The innovative CIAM solution leverages <a href=\"https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/\">progressive profiling</a> that gradually collects user information and automatically delivers personalized journeys and thus reducing fatigue and improving signup rates and conversions. </p>\n<h2 id=\"how-loginradius-offers-competitive-edge-to-businesses\" style=\"position:relative;\"><a href=\"#how-loginradius-offers-competitive-edge-to-businesses\" aria-label=\"how loginradius offers competitive edge to businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Offers Competitive Edge to Businesses?</h2>\n<p>Let’s learn how LoginRadius helps brands deliver a flawless customized experience that increases conversions and improves lead generation rates. </p>\n<ul>\n<li><strong>Personalized Experiences:</strong> Bring in more revenue through LoginRadius that offers a great personalized experience. When you know people’s preferences, you can offer what they want, when they want it, the way they want it.</li>\n<li><strong>Customer Data Protection (MFA and <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">Adaptive Authentication</a>):</strong> Consumers are infamous for repeating passwords across various online sites. Advanced CIAM solutions like LoginRadius use adaptive multi-factor authentication (MFA), which considers critical parameters such as location, the hour of the day, and gadgets to authenticate users. It promotes even greater <a href=\"https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/\">password security</a> by requiring additional verification for high-risk password resets.</li>\n<li><strong>Digital Consumer Interactions that are Seamless and Trustworthy:</strong> Many businesses have numerous online apps and interfaces. You can create a seamless customer experience by connecting all of your platforms with a single CIAM solution like LoginRadius: A single point of entry for all applications. Its identification database makes it necessary for users to verify multiple times when moving between them. During the login procedure, this adds to the friction.</li>\n<li><strong>Flexible APIs for Customization:</strong> When it comes to safeguarding access to information, developers strive to provide a seamless client experience. LoginRadius’ APIs provide developers with the freedom to define authentication requirements at any point in the planning process.</li>\n<li><strong>Support for Several Channels:</strong> LoginRadius provides various entrance points throughout all devices, making it as simple as possible for clients to get the tools they need to operate their company.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Businesses leveraging personalization are exceptionally ahead of their competitors as consumers are always expecting more personalized journeys. </p>\n<p>The key lies in considering personalization right from the beginning when a user first interacts with the brand, which can be achieved through identity system customization. </p>\n<p>LoginRadius helps brands create personalized journeys for their users that quickly signup and land into the sales funnel. </p>\n<p>Brands that wish to invoke the true potential of personalization must consider relying on the LoginRadius CIAM solution. <a href=\"https://www.loginradius.com/contact-sales/\">Talk to our sales team</a> today! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 07, 2021","updated_date":null,"description":"Customizing a user identity system is a whole different concept and isn’t just limited to adding a personalized greeting for a user with their name. Let’s understand this in detail.","title":"Why Should You be Customizing Your Identity System to Your Needs","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/7d74cce17394a034288bf98bf9ddc260/14b42/identity-system-customization-cover.jpg","srcSet":"/static/7d74cce17394a034288bf98bf9ddc260/f836f/identity-system-customization-cover.jpg 200w,\n/static/7d74cce17394a034288bf98bf9ddc260/2244e/identity-system-customization-cover.jpg 400w,\n/static/7d74cce17394a034288bf98bf9ddc260/14b42/identity-system-customization-cover.jpg 800w,\n/static/7d74cce17394a034288bf98bf9ddc260/16310/identity-system-customization-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Manish Tiwari","github":null,"avatar":null}}}},{"node":{"excerpt":"An Overview With growing numbers of websites and consumers on those websites, authenticating each one of them becomes an arduous task. Also…","fields":{"slug":"/identity/sms-authentication-protect-business/"},"html":"<h2 id=\"an-overview\" style=\"position:relative;\"><a href=\"#an-overview\" aria-label=\"an overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>An Overview</h2>\n<p>With growing numbers of websites and consumers on those websites, authenticating each one of them becomes an arduous task. Also, it becomes an important aspect to protect and secure the consumer's data available on your application.  To protect sensitive consumer data, two-factor authentication became a mandatory requirement in today's digital world.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-two-factor-authentication/+\">Two-factor authentication</a> can be done via multiple channels. One is by using google authenticator codes, and the other is sending OTP on the consumer's email. But the easiest and convenient way is to do it via SMS.</p>\n<p>SMS stands for <strong>Short Messaging Service</strong>, which you guessed right. The text messages that we get on our mobile phones. This SMS holds an One Time Password (OTP), used to validate the consumer login. So basically, it can be used as a backend agent who reaches out to the original consumer and provides him access to any network, system, or web application.</p>\n<h2 id=\"how-does-sms-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-sms-authentication-work\" aria-label=\"how does sms authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does SMS Authentication Work?</h2>\n<p>A short messaging service (SMS) is generally used to carry any information to the end-user. It can be information like promotional messages, notifications, or personal texts, but they also carry authentication codes (OTPs). </p>\n<p>Using SMS authentication is quite simple and easy to understand. When a consumer tries to log in to a website, system, or network, he provides the login credentials. On successfully authenticating the login credentials, the server now does a two-factor authentication. It ensures that the consumer trying to log in is who he says he is. To authenticate the user, a text SMS and an OTP are sent to the consumer's registered mobile number. When that OTP is entered, the consumer gets authenticated, and then only they can access the contents of the system/application.</p>\n<p>SMS authentication is based on one of the three types of <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multifactor authentication</a>, i.e., <strong>Possession based authentication</strong>. In this type of MFA, the consumer is authenticated via something that only he can possess, which is the mobile handset.</p>\n<h2 id=\"merits-and-demerits-of-using-sms-authentication\" style=\"position:relative;\"><a href=\"#merits-and-demerits-of-using-sms-authentication\" aria-label=\"merits and demerits of using sms authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Merits and Demerits of Using SMS Authentication</h2>\n<p>Everything in this world holds both the concepts of merits and demerits, and so does SMS authentication. Let's first discuss the merits that it has.</p>\n<ol>\n<li><strong>Additional Layer of security:</strong> Two-factor authentication is now widely used to protect consumers' account data. SMS authentication provides an extra layer of protection that too without any complexity. At least it is far better than having no additional security check.</li>\n<li><strong>Ease of usage</strong>: It is the human behaviour that we always look for an easy way to get our work done. Now imagine having a complex two factor authentication setup. Users will end up frustrated doing complex authentications. Here SMS authentication rises as an easy and secure option.</li>\n<li><strong>Ease of usage</strong>: It is human behavior that we always look for an easy way to get our work done. Now imagine having a complex two-factor authentication setup. Users will end up frustrated doing complex authentications. Here SMS authentication rises as an easy and secure option.</li>\n<li><strong>Low Cost:</strong> Sending SMS to consumers includes minor charges, which helps a lot for the organization with a large consumer base.</li>\n</ol>\n<p>Even after being so convenient and easy to operate, there are some demerits also. These demerits are capable enough to make the organizations think that it is enough to protect the business. Let's discuss them one by one:</p>\n<ol>\n<li><strong>SIM Highjacking or Device theft:</strong> It looks effortless to send the verification code on a mobile number and authenticate consumers based on that. But the Option of SMS authentication can be harmful if the SIM/device got lost or stolen by someone. As in this case, SIMs can easily be used on other mobile phones, and they will still receive the validation code.</li>\n<li><strong>Hacking:</strong> Earlier, it was complicated to intercept GSM-based SMS, but as the technologies are evolving, hackers have also got more power in their hands. The regular text which is sent and received over mobile phones can easily be intercepted today.</li>\n<li><strong>Social Engineering Attacks:</strong> Compared to earlier days, more devices are now connected to the internet today. Today, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">a simple phishing link</a> via a text msg or any advertisement will do the job. If a consumer clicks on the link by mistake or falls into any such trap, all his data will be gained by hackers, including SMS.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-phone-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"phone-auth-DS\"\n        title=\"phone-auth-DS\"\n        src=\"/static/e803561322c0f2e7a0423cf87d0771b2/e5715/phone-auth-DS.png\"\n        srcset=\"/static/e803561322c0f2e7a0423cf87d0771b2/a6d36/phone-auth-DS.png 650w,\n/static/e803561322c0f2e7a0423cf87d0771b2/e5715/phone-auth-DS.png 768w,\n/static/e803561322c0f2e7a0423cf87d0771b2/63ff0/phone-auth-DS.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"should-businesses-use-sms-authentication\" style=\"position:relative;\"><a href=\"#should-businesses-use-sms-authentication\" aria-label=\"should businesses use sms authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Should Businesses Use SMS Authentication?</h2>\n<p>With all the demerit points discussed above and keeping all the security issues in mind, businesses might want to reconsider their authentication methodology. It is known very clearly that cybercrimes and hackers are overgrowing, especially after the internet revolution. </p>\n<p>Hacking groups and organizations are getting sophisticated daily, and SMS authentication has not evolved with such changes. We are still using a similar old mechanism to send text messages.</p>\n<p>Hence, intercepting a text message is easier as compared to earlier days.</p>\n<p>So to answer the big question, yes, it is better to have some two-factor authentication in the form of SMS authentication, but businesses should not rely entirely on it. They must think of other possible authentication mechanisms if they are collecting sensitive consumer data.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Dropping the idea of SMS authentication might look easy. Still, it is a bit difficult for some organizations because, as we already mentioned, SMS authentication is a very well-established method and has been used for a long time. The convenience provided in authenticating the end-users is also unparalleled. </p>\n<p>But businesses need to find an alternative for this as SMS authentication cannot be heavily relied upon. The key to achieving that is to find any other authentication method which is as easy, convenient, user-friendly, and secure at the same time. Going with the new trends in the technologies, <a href=\"https://www.loginradius.com/blog/identity/what-is-mob-biometric-authentication/\">Biometric Authentication</a> is one feasible solution. Well, we will indeed talk about that some other day :)</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 02, 2021","updated_date":null,"description":"Protecting your business with two-factor/ multi-factor authentication is a great way to keep unauthorized users away from your confidential data. But are SMS secure enough for this purpose? Are there any other security flaws involved in using SMS for authentication? Let’s find out.","title":"SMS Authentication — Can it Really Protect Your Business?","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/1eeb09974e808e86297ec44977490ac5/14b42/sms-authentication-protect-business-cover.jpg","srcSet":"/static/1eeb09974e808e86297ec44977490ac5/f836f/sms-authentication-protect-business-cover.jpg 200w,\n/static/1eeb09974e808e86297ec44977490ac5/2244e/sms-authentication-protect-business-cover.jpg 400w,\n/static/1eeb09974e808e86297ec44977490ac5/14b42/sms-authentication-protect-business-cover.jpg 800w,\n/static/1eeb09974e808e86297ec44977490ac5/16310/sms-authentication-protect-business-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Ashish Kumar Yadav","github":null,"avatar":null}}}},{"node":{"excerpt":"We all have witnessed the sudden paradigm shift where movie theatres have been replaced by OTT (over the top) platforms and books and…","fields":{"slug":"/identity/poor-login-concurrency-impact-ott-platforms/"},"html":"<p>We all have witnessed the sudden paradigm shift where movie theatres have been replaced by OTT (over the top) platforms and books and magazines by e-books amid the global pandemic. </p>\n<p>As social isolation continues to be the new normal amidst remote working and social distancing measures, the popularity of OTT streaming apps – both video and audio has jumped exponentially to meet the surging demand. </p>\n<p>The latest stats reveal that the number of users in the OTT Video segment is expected to reach <a href=\"https://www.statista.com/outlook/amo/media/tv-video/ott-video/india\">462.7 million by 2025.</a></p>\n<p>However, with the increase in subscriptions and the number of audiences online, several underlying threats have severely impacted the OTT businesses. </p>\n<p>One such issue is poor login concurrency, which can lead to severe identity theft issues for individuals and OTT platforms. </p>\n<p>Login concurrency refers to a situation where a user is logged into multiple devices from a single identity. </p>\n<p>Login concurrency can be pretty risky as two or more users using the same credentials have access to resources and critical information, and it becomes difficult for service providers to identify the unauthorized user that may have wrong intentions. </p>\n<p>Let’s understand this in-depth and understand the harmful consequences of poor concurrency management for OTT platforms and how OTT platform providers can leverage identity management. </p>\n<h2 id=\"what-is-a-concurrent-login\" style=\"position:relative;\"><a href=\"#what-is-a-concurrent-login\" aria-label=\"what is a concurrent login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Concurrent Login?</h2>\n<p>Concurrent login is a situation where a user is logged into a network through a single identity from multiple devices and has access to resources and information. </p>\n<p>The user can be a single individual or two or even multiple individuals using the same identity on a platform to access services from different locations or devices. </p>\n<p>There can be multiple reasons for concurrent login: the user’s negligence, poor session management by vendors, or a sneak into a consumer’s identity. </p>\n<h2 id=\"how-concurrent-login-affects-ott-platform\" style=\"position:relative;\"><a href=\"#how-concurrent-login-affects-ott-platform\" aria-label=\"how concurrent login affects ott platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Concurrent Login Affects OTT Platform?</h2>\n<p>Various live streaming cloud OTT providers face challenges where concurrent login issues hamper user experience and eventually become a threat. </p>\n<p>Cybercriminals are exploiting consumer identities of OTT subscribers and are accessing critical consumer information and trying to exploit business data for diverse purposes. </p>\n<p>Moreover, the most subscribed OTT platform globally has reported users sharing access credentials beyond permitted limits with their friends and families, which is the leading cause of revenue loss. </p>\n<p>Thus, to overcome the situation where concurrent login is exploited in OTT services, there needs to be a stringent mechanism that provides real-time insights regarding a user’s login details and adequately manages login sessions for each sign-in and sign-out. </p>\n<p>Here’s where the role of a <a href=\"https://www.loginradius.com/\">robust CIAM</a>  (Consumer Identity and Access Management) comes into play. </p>\n<p><a href=\"https://www.loginradius.com/resource/ciam-101/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABiUlEQVQY002Qy0uiURjGP5pK/YxoMEgz7Z6Wt3BETdPS+Saj6LqqTAjaVVib2TltZlX/SK2KWhQVVDQw0KZlm4FZddk0A0IG2eLX8YwxHXg4nPO+5/m9z1EMXf2UpJbk6MfoiEmp5TvDO+k7IqiuJPXhKUzezxjcGnrnAPrO6L+62BXZLAwsviSNnkFMjggmZxRbYBizT6PONfj/gTA0ejTsiVlc2gxqcBqdZwhV1PVlqPJGt3gT2H0JdFYvVRY3antYqtYZKzdHpbH5UwqLf4gGf4qW0Ci24Ai1AqorQxVJF1Ed0TG88QlcsXF64pP4U3NEJhZo6NVkcyl+dXuEj54kTcLIKozsfWOYRRKdmPwthZywsjXM7tE5L8UiN7d33Nzd8/DnL8/PRb6kV6hoDqJY/SznNrn+9Zudw1O29o7Y3j/m4vKKkx+X1LkTEqio4v8+tIY4OPtJaeXzeQqPjzwVCvI8nMmi2AJUtoUJjS+wlNtgfnWduWyOdPYbi1+/k1lbp6Y7LpO8AkyM3jCYYC4zAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-CIAM\"\n        title=\"DS-CIAM\"\n        src=\"/static/07ffa60c01ac470ddc137679ce2cc238/e5715/DS-CIAM101.png\"\n        srcset=\"/static/07ffa60c01ac470ddc137679ce2cc238/a6d36/DS-CIAM101.png 650w,\n/static/07ffa60c01ac470ddc137679ce2cc238/e5715/DS-CIAM101.png 768w,\n/static/07ffa60c01ac470ddc137679ce2cc238/63ff0/DS-CIAM101.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Let’s dig deeper into this. </p>\n<h2 id=\"poor-session-management-by-ott-platforms\" style=\"position:relative;\"><a href=\"#poor-session-management-by-ott-platforms\" aria-label=\"poor session management by ott platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Poor Session Management by OTT Platforms</h2>\n<p>If a user interacts with a platform and makes several interactions, the web application issues a session ID. This session ID is issued whenever a user logs in and records all their interactions.</p>\n<p>It is through this ID that the application communicates with users and responds to all their requests.</p>\n<p>The <a href=\"https://www.loginradius.com/resource/owasp-top-10-web-application-vulnerabilities-list-for-every-developer/\">OWASP broken authentication</a> recommendations state that this session ID is equivalent to the user’s original login credentials. If hackers steal a user’s session ID, they can sign in by impersonating their identity. This is known as session hijacking.</p>\n<p>The following points list the scenarios that can cause broken authentication.</p>\n<ol>\n<li>Weak usernames and passwords.</li>\n<li>Session fixation attacks.</li>\n<li>URL rewriting.</li>\n<li>Consumer identity details aren't protected when stored.</li>\n<li>Consumer identity details are transferred over unencrypted connections.</li>\n</ol>\n<h2 id=\"impact-of-broken-authentication-and-session-management\" style=\"position:relative;\"><a href=\"#impact-of-broken-authentication-and-session-management\" aria-label=\"impact of broken authentication and session management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Impact of Broken Authentication and Session Management</h2>\n<p>If a hacker successfully logs in by stealing a user’s credentials using any of the above-mentioned broken authentication techniques, they can misuse their privileges and impact the company's sustainability.</p>\n<p>Cybercriminals can have various intentions of <a href=\"https://www.loginradius.com/blog/identity/2021/01/7-web-app-sec-threats/\">hijacking a user’s web application</a>, such as:</p>\n<ul>\n<li>Stealing critical business data</li>\n<li>Identity theft</li>\n<li>Sending fraud calls or emails.</li>\n<li>Creating malicious software programs for disrupting networks.</li>\n<li>Cyber terrorism</li>\n<li>Cyberstalking</li>\n<li>Selling illegal items on the dark web</li>\n<li>Sharing fake news on social media</li>\n</ul>\n<p>In short, hackers can use broken authentication attacks and session hijacking to gain access to the system by forging session data, such as cookies, and stealing login credentials.</p>\n<p>Thus, it would be best to never compromise with your web applications' security.</p>\n<h2 id=\"how-loginradius-protects-against-broken-authentication\" style=\"position:relative;\"><a href=\"#how-loginradius-protects-against-broken-authentication\" aria-label=\"how loginradius protects against broken authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Protects Against Broken Authentication</h2>\n<p>LoginRadius has been at the forefront of offering a multilevel security web app environment. Here is how LoginRadius applications protect against broken authentication:</p>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/engineering/lets-encrypt-with-ssl-certificates/\">End-to-end SSL encryption</a> for data in transit and ensures protection against unauthorized access.</li>\n<li>Multi-factor authentication eliminates the risk of being exposed to attacks.</li>\n<li>One-way hashing of passwords considerably improves consumer security.</li>\n<li>A single sign-on (SSO) solution allows users to use the same profile to log in everywhere.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>With increasing OTT subscriptions and user expectations, OTT platforms need to gear up to deliver a flawless user experience in a way that doesn’t hamper their overall security mechanism quickly.</p>\n<p>Adding stringent layers of security through a robust CIAM solution becomes the immediate need of the hour for OTT platforms facing concurrent login issues that affect their brand reputation and overall business revenues.  </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 31, 2021","updated_date":null,"description":"With the increase in subscriptions and the number of audiences online, several underlying threats have severely impacted the OTT businesses. One such issue is poor login concurrency. Learn how login concurrency is affecting OTT platforms and how they can overcome this dilemma.","title":"How Poor Login Concurrency can Impact OTT Platforms' Business","tags":["data security","ciam solution","broken authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8867924528301887,"src":"/static/67d644bfd92d905d271f935ae6eca665/14b42/poor-login-concurrency-impact-ott-platforms-cover.jpg","srcSet":"/static/67d644bfd92d905d271f935ae6eca665/f836f/poor-login-concurrency-impact-ott-platforms-cover.jpg 200w,\n/static/67d644bfd92d905d271f935ae6eca665/2244e/poor-login-concurrency-impact-ott-platforms-cover.jpg 400w,\n/static/67d644bfd92d905d271f935ae6eca665/14b42/poor-login-concurrency-impact-ott-platforms-cover.jpg 800w,\n/static/67d644bfd92d905d271f935ae6eca665/16310/poor-login-concurrency-impact-ott-platforms-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Privileged Access Management (PAM) includes cyber security strategies and technologies for applying control over the privileged access and…","fields":{"slug":"/identity/what-is-privileged-access-management/"},"html":"<p>Privileged Access Management (PAM) includes cyber security strategies and technologies for applying control over the privileged access and permission for users, accounts, processes, and systems across an environment.</p>\n<p>By appropriately giving privileged access control, PAM can help organizations control and reduce the possibility of the attack from third parties and prevent the internal carelessness of the individual. PAM is not only applicable to a human being, but it also applies to the non-humans such as application and machine identity.</p>\n<p><strong>Example:</strong></p>\n<p>Let's consider an admin account. So what does a PAM do? It will take the privileged account credentials and put them in a secure place or in the vault, which will isolate the use of the privileged account credentials, reducing the risk of any attacks or misleadings.</p>\n<p>Since it was kept inside the repository, the system administrator will need to go to the PAM system to <a href=\"https://www.loginradius.com/authentication/\">access their credentials</a>. When they request access to credentials, they will be authenticated at different levels. </p>\n<p>Once all the authentication is done, they will be provided access to their credentials. Also, once these credentials are put in the repository, all their processes will be reset, and for the subsequent time, all methods need to be repeated to get the credentials.</p>\n<h2 id=\"what-are-the-different-types-of-privileged-access-management-accounts\" style=\"position:relative;\"><a href=\"#what-are-the-different-types-of-privileged-access-management-accounts\" aria-label=\"what are the different types of privileged access management accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Different Types of Privileged Access Management Accounts?</h2>\n<p>The following are the different types of Privilege Access management accounts: </p>\n<h3 id=\"1-local-administrative-accounts\" style=\"position:relative;\"><a href=\"#1-local-administrative-accounts\" aria-label=\"1 local administrative accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Local Administrative Accounts</h3>\n<p>These are the shared accounts that provide admin access to the local host or session only. The IT staff typically uses these accounts to perform maintenance or set up the new workstations.</p>\n<h3 id=\"2-privileged-user-accounts\" style=\"position:relative;\"><a href=\"#2-privileged-user-accounts\" aria-label=\"2 privileged user accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Privileged User Accounts</h3>\n<p>These are the users that are granted administrative privileges to systems. Privileged User Accounts are among the most common types of accounts that have access granted on an enterprise domain. These give administrative rights to one or more systems. </p>\n<p>Generally, these accounts have <a href=\"https://www.loginradius.com/blog/identity/how-to-choose-a-secure-password/\">unique and complex passwords</a>, but most of the time are protected by passwords alone. These are the types of accounts that should be monitored closely. And these are the accounts that sometimes do not belong to the individual user instead of that they are shared among the multiple admins.</p>\n<h3 id=\"3-domain-admin-accounts\" style=\"position:relative;\"><a href=\"#3-domain-admin-accounts\" aria-label=\"3 domain admin accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Domain Admin Accounts</h3>\n<p>These super admin accounts have access to all the organization's workstations, and it provides the most extensive access across the network. They can modify the membership of every administrative account within the domain. These accounts are under the attacker's radar and should be monitored closely, and PAM should be implemented here.</p>\n<h3 id=\"4-service-accounts\" style=\"position:relative;\"><a href=\"#4-service-accounts\" aria-label=\"4 service accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Service Accounts</h3>\n<p> It is the type of accounts that are privileged local or domain accounts that are used by the application or service to interact with the operating system. In some cases, these service accounts have administrative privileges on domains depending on the requirements of the application they are used for.</p>\n<h3 id=\"5-emergency-accounts\" style=\"position:relative;\"><a href=\"#5-emergency-accounts\" aria-label=\"5 emergency accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Emergency Accounts</h3>\n<p>It is the type of account that provides the unprivileged users with admin access in case of emergency to protect the system. They are also called 'firecall' or 'break glass accounts. Access to this account requires the organization's IT management team approval. Most of the time, this is a manual process because of which it rarely lacks any security measures.</p>\n<h2 id=\"what-are-the-features-of-a-pam-software\" style=\"position:relative;\"><a href=\"#what-are-the-features-of-a-pam-software\" aria-label=\"what are the features of a pam software permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Features of a PAM software?</h2>\n<p>We have already discussed why Privileged Access Management (PAM) is useful for organizations that are growing or have an extensive IT system within the organization itself.</p>\n<p>Now, let's discuss the features that the PAM software provides:</p>\n<ul>\n<li>It provides the <a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-Factor Authentication service</a> for the administrators.</li>\n<li>It has an access manager that stores all the information about permissions and privileged user information.</li>\n<li>As we know, in PAM, passwords are stored in secret places or vaults, So this is also provided by the PAM itself.</li>\n<li>It also provides the facility of dynamic authorization, which means access to individual users for a particular period.</li>\n<li>It also has automatic provisioning and deprovisioning, which helps reduce insider threats, and the Audit logs feature that allows the organization to meet the compliance requirements.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GD-to-MFA\"\n        title=\"EB-GD-to-MFA\"\n        src=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png\"\n        srcset=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/a6d36/EB-GD-to-MFA.png 650w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png 768w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/81501/EB-GD-to-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"common-strategies-that-the-organization-should-use-to-ensure-the-proper-implementation-of-pam\" style=\"position:relative;\"><a href=\"#common-strategies-that-the-organization-should-use-to-ensure-the-proper-implementation-of-pam\" aria-label=\"common strategies that the organization should use to ensure the proper implementation of pam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common Strategies that the Organization Should Use to Ensure the Proper Implementation of PAM</h2>\n<p>There are some common strategies that every organization that uses the PAM should follow for the proper implementation of PAM Software, and those strategies are:</p>\n<ul>\n<li>An organization should maintain the proper inventory of all privileged accounts.</li>\n<li>Organizations should not give administrative access for sharing the accounts.</li>\n<li>Every organization should enforce or use the password policy for creating any password.</li>\n<li>Give access to the privileged account to the limited members.</li>\n<li>Use the different types of tools and monitoring systems to gather the proper knowledge of what the privileged users are doing.</li>\n<li>Update employees about changes in privileged access policies and procedures to ensure they understand how to use and manage their privileged credentials correctly.</li>\n<li>All organizations should maintain the proper documentation of account management rules and processes.</li>\n</ul>\n<h2 id=\"whats-the-difference-between-identity-and-access-management-iam-and-privileged-access-management\" style=\"position:relative;\"><a href=\"#whats-the-difference-between-identity-and-access-management-iam-and-privileged-access-management\" aria-label=\"whats the difference between identity and access management iam and privileged access management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What's the Difference Between Identity and Access Management (IAM) and Privileged Access Management?</h2>\n<p>Privileged access management is always considered one of the parts of <a href=\"https://www.loginradius.com/blog/identity/what-is-iam/\">identity and access management</a> (IAM). However, identity and privilege are both interlinked with each other. </p>\n<p>Identity management refers to the people like you, your boss, or the organization's IT management team are examples. These people are responsible for creating, updating, or even deleting attributes. The main reason for IAM is having one digital identity per user, and once this identity is established it must be maintained, modified, and monitored.</p>\n<p>Privileged Access Management is a part of IAM. Here, PAM help's the IAM in helping manage entitlements, not only of individual users but also shared accounts such as super users, administrative, and service accounts. </p>\n<p>A PAM is a tool that manages and protects all privileged accounts. It also provides a unified, robust, and—importantly—transparent platform integrated into an organization's overall identity and access management (IAM) strategy. </p>\n<p>While PAM deals explicitly with privileged accounts, Identity and Access Management deals with all the types of users and identities in an organization. They might be different in what they protect, but in the larger picture, PAM and IAM make for holistic security as they comprise Access Management and Identity Governance and Administration.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we have learnt about Privileged Access Management, which helps organizations protect privileged accounts and credentials. The details mentioned here will help you to understand how to use PAM and what are all things that should be in mind during the use of Privileged Access Management(PAM).</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 26, 2021","updated_date":null,"description":"Privileged access management—finding the right balance between security and convenience. This blog explains why PAM matters, highlights its key features and strategies that the organization should use to ensure the proper implementation of PAM.","title":"A Comprehensive Guide to Privileged Access Management (PAM)","tags":["data security","Privileged Access Management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6,"src":"/static/e9d8c753fde4fa2986799d250605b6fe/14b42/what-is-privileged-access-management-cover.jpg","srcSet":"/static/e9d8c753fde4fa2986799d250605b6fe/f836f/what-is-privileged-access-management-cover.jpg 200w,\n/static/e9d8c753fde4fa2986799d250605b6fe/2244e/what-is-privileged-access-management-cover.jpg 400w,\n/static/e9d8c753fde4fa2986799d250605b6fe/14b42/what-is-privileged-access-management-cover.jpg 800w,\n/static/e9d8c753fde4fa2986799d250605b6fe/16310/what-is-privileged-access-management-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Bhavya Tugnawat","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":216,"currentPage":37,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}