{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/38","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Every country is progressively inching towards diverse smart city projects that eventually become the new driving force behind a state’s…","fields":{"slug":"/identity/smart-cities-improve-unified-identity/"},"html":"<p>Every country is progressively inching towards diverse smart city projects that eventually become the new driving force behind a state’s overall development. </p>\n<p>However, the key aspect determining whether these projects are a failure or a success is the involvement of civilians living and working in that city. </p>\n<p>Undoubtedly, civilian engagement is a significant factor that can offer valuable insights to enhance the current services that pave the path for the region’s overall development. </p>\n<p>But the big question is how to enhance civilian engagement?</p>\n<p>Well, delivering a flawless user experience and online services can help increase civilian engagement. </p>\n<p>The key lies in leveraging a robust <a href=\"https://www.loginradius.com/b2b-identity/\">identity management solution</a> that delivers a great user experience to citizens across multiple platforms and devices and ensures adequate security and privacy. </p>\n<p>Let’s understand the role of digital identity for smart cities in improving civilians’ digital experience through unified identity.</p>\n<h2 id=\"the-role-of-digital-identity-for-smart-cities\" style=\"position:relative;\"><a href=\"#the-role-of-digital-identity-for-smart-cities\" aria-label=\"the role of digital identity for smart cities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Digital Identity for Smart Cities</h2>\n<p>With population growth and the expansion of public services, cities need to be innovative about providing services to all people without compromising service quality. There is a need for a single platform where all facilities are centralized, and customer experience is considered.</p>\n<p>Digital identity is a great way to get started as it can prove a citizen’s identity through diverse government channels and is crucial for citizens to avail government services. </p>\n<p>As the government invokes the potential of secure digital identities, citizens would access core services and resources without any hassle. </p>\n<p>Moreover, every citizen requires some kind of public service, and that’s why handling a unique number of identities securely becomes a tough nut to crack for the government. Here’s where the need for digital identity management comes into play. </p>\n<p>A smart CIAM (consumer identity and access management) solution like LoginRadius helps public sector organizations manage heaps of identities efficiently without hampering user experience. </p>\n<p>Let’s learn how a CIAM solution like LoginRadius can deliver a flawless digital experience to civilians that pushes overall development reinforced by adequate security.</p>\n<h2 id=\"centralized-online-services\" style=\"position:relative;\"><a href=\"#centralized-online-services\" aria-label=\"centralized online services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Centralized Online Services</h2>\n<p>Cities need one unified self-service portal so that their constituents have a seamless, efficient experience as they access the services they need. The LoginRadius Identity Platform enables cities to centralize their customer-facing digital applications into one portal. </p>\n<p>This portal enables a frictionless experience across multiple services that improve user experience and <a href=\"https://www.loginradius.com/customer-experience-solutions/\">enhance user engagement</a>. </p>\n<p> <br>\nThis single locus of access delivers a connected experience across multiple touchpoints and channels. LoginRadius has supported applications such as Account Summary, Customer Profile, Permit Applications, and Bill Payment. </p>\n<h2 id=\"maintaining-one-digital-identity-across-all-customer-service\" style=\"position:relative;\"><a href=\"#maintaining-one-digital-identity-across-all-customer-service\" aria-label=\"maintaining one digital identity across all customer service permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Maintaining One Digital Identity Across All Customer Service</h2>\n<p>What good is a centralized portal if citizens create multiple identities for individual web and mobile applications? Operating in this way creates identity silos that prevent a thorough view of the customer’s journey and preferences, which means the customer experience can’t be optimized for each individual.</p>\n<p>Without a seamless user experience, engagement rates drop. But with <a href=\"https://www.loginradius.com/single-sign-on/\">LoginRadius Single Sign-on (SSO),</a> cities and companies can allow customers to access all applications within their platform with a single set of unified credentials, rather than having to register and log in to each service separately. </p>\n<h2 id=\"integrating-with-third-party-applications\" style=\"position:relative;\"><a href=\"#integrating-with-third-party-applications\" aria-label=\"integrating with third party applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Integrating with Third-Party Applications</h2>\n<p>Many public sector organizations have a hard time using customer data to improve the digital experience. </p>\n<p>The LoginRadius Identity Platform offers pre-built integrations with over 150 third-party applications such as CRM, email marketing tools, online communities, payment systems, and more.</p>\n<p>This enables organizations to use that customer data to understand their customers better, offer more useful information and deliver that information more directly.</p>\n<h2 id=\"how-loginradius-helped-hydro-ottawa-in-creating-a-solid-architectural-foundation\" style=\"position:relative;\"><a href=\"#how-loginradius-helped-hydro-ottawa-in-creating-a-solid-architectural-foundation\" aria-label=\"how loginradius helped hydro ottawa in creating a solid architectural foundation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Helped Hydro Ottawa in Creating a Solid Architectural Foundation</h2>\n<p>Hydro Ottawa is a regulated electricity local distribution company in eastern Ontario. </p>\n<p>As the third-largest municipally-owned electric utility in Ontario, Hydro Ottawa maintains one of the safest, most reliable, and most cost-effective electricity distribution systems in the province.  They serve about 332,000 residential and commercial customers across 1,116 square kilometers.</p>\n<p><a href=\"https://www.loginradius.com/resource/case-study-page-hydro-ottawa/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"smart-cities-improve-unified-identity-Hydro-Ottawa\"\n        title=\"smart-cities-improve-unified-identity-Hydro-Ottawa\"\n        src=\"/static/b6964cfa0103e3728d3c44a7135854a7/e5715/smart-cities-improve-unified-identity-Hydro-Ottawa.png\"\n        srcset=\"/static/b6964cfa0103e3728d3c44a7135854a7/a6d36/smart-cities-improve-unified-identity-Hydro-Ottawa.png 650w,\n/static/b6964cfa0103e3728d3c44a7135854a7/e5715/smart-cities-improve-unified-identity-Hydro-Ottawa.png 768w,\n/static/b6964cfa0103e3728d3c44a7135854a7/63ff0/smart-cities-improve-unified-identity-Hydro-Ottawa.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"client-requirements\" style=\"position:relative;\"><a href=\"#client-requirements\" aria-label=\"client requirements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Client Requirements</h3>\n<p>The Hydro Ottawa team wanted to create a solid architectural foundation for digital growth and innovation. They decided that the core of this new system would be a <a href=\"https://www.loginradius.com/\">customer identity solution</a>  that centralizes and unifies customer identity data.</p>\n<p>With the launch of their mobile app and a revamp of their customer web portal underway, Hydro Ottawa needed an SSO solution to log in with a single profile that included social media validation.</p>\n<h3 id=\"result\" style=\"position:relative;\"><a href=\"#result\" aria-label=\"result permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Result</h3>\n<ul>\n<li>By implementing the LoginRadius customer identity solution, Hydro Ottawa now offers their customers a secure, streamlined login and registration system. </li>\n<li>Single sign-on (SSO) capabilities removed the previous accessibility barriers. With SSO, customers can move seamlessly through different Hydro Ottawa web applications without signing up or logging in again. </li>\n<li>Customers can easily access their accounts online to see their electricity usage and billing activities.</li>\n<li>By leveraging the identity solution and digital infrastructure already in place, Hydro Ottawa was able to release an award-winning mobile application. It’s the first app in North America that lets customers track their household’s electricity usage and costs, access their billing information, and find out about current power outages using a single tool.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Digital identity is paving the path for a rich unified experience for citizens that require public services in daily routines. </p>\n<p>Robust consumer identity and access management solutions like <a href=\"https://www.loginradius.com/contact-sales/\">LoginRadius</a> can help public sectors deliver great experiences tacked by adequate security to their civilians, reinforcing different smart city projects. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 25, 2021","updated_date":null,"description":"Civilian engagement is a significant factor that can offer valuable insights to enhance the current services that pave the path for the region’s overall development. This post highlights the role of digital identities in supporting the idea of smart cities.","title":"How Cities Can Improve Civilians’ Digital Experience with Unified Identity","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6129032258064515,"src":"/static/7667de49e49fc737acd82123663210c6/14b42/smart-cities-improve-unified-identity-cover.jpg","srcSet":"/static/7667de49e49fc737acd82123663210c6/f836f/smart-cities-improve-unified-identity-cover.jpg 200w,\n/static/7667de49e49fc737acd82123663210c6/2244e/smart-cities-improve-unified-identity-cover.jpg 400w,\n/static/7667de49e49fc737acd82123663210c6/14b42/smart-cities-improve-unified-identity-cover.jpg 800w,\n/static/7667de49e49fc737acd82123663210c6/16310/smart-cities-improve-unified-identity-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The modern digital landscape demands robust security, which significantly relies on access tokens that securely authenticate users.  A token…","fields":{"slug":"/identity/refresh-tokens-jwt-interaction/"},"html":"<p>The modern digital landscape demands robust security, which significantly relies on access tokens that securely authenticate users. </p>\n<p>A token plays a crucial role in enhancing the overall security mechanism of an organization that helps to deliver flawless and secure authentication and authorization on their website or application.</p>\n<p>For years, businesses have been using <a href=\"https://www.loginradius.com/blog/identity/pros-cons-token-authentication/\">token-based authentication</a> that allows users to access resources. These tokens have a minimal lifetime, ensuring that cybercriminals have minimum time to exploit a user’s identity. </p>\n<p>With token security, users have to re-authenticate themselves for obvious security reasons by offering credentials to sign in if the access token is expired. </p>\n<p>However, this can be tedious and hampers user experience. To overcome this, the concept of refresh tokens was introduced.</p>\n<p>A refresh token ensures that a user can regain the access token without providing login credentials. </p>\n<p>Let’s dig deeper about refresh tokens, their use, and how they interact with JWTs (JSON Web Token). </p>\n<h2 id=\"what-is-a-token\" style=\"position:relative;\"><a href=\"#what-is-a-token\" aria-label=\"what is a token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Token?</h2>\n<p>A token can be defined as a digitally encoded signature used to authenticate and authorize a user to access specific resources on a network.</p>\n<p>A token is always generated in the form of an OTP (One-Time Password), which depicts that it could only be used once and is generated randomly for every transaction.</p>\n<p>The token-based authentication allows users to verify their unique identity, and in return, they receive a special token that provides access to specific resources for a particular time frame.</p>\n<p>Apart from this, users can easily access the website or network for which the token is issued and need not enter the credentials again and again until the token expires.</p>\n<p>Tokens are widely used for regular online transactions for enhancing overall security and accuracy.</p>\n<h2 id=\"what-is-a-refresh-token\" style=\"position:relative;\"><a href=\"#what-is-a-refresh-token\" aria-label=\"what is a refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Refresh Token?</h2>\n<p>Since access tokens aren’t valid for an extended period because of security reasons, a refresh token helps re-authenticate a user without the need for login credentials. </p>\n<p>The primary purpose of a refresh token is to get long-term access to an application on behalf of a particular user. </p>\n<p>In a nutshell, a refresh token allows any website or application to regrant the access token without bothering the user. Here are its benefits:</p>\n<ul>\n<li>Balances security with usability</li>\n<li>Reinforces authentication</li>\n<li>Improves user experience </li>\n</ul>\n<h2 id=\"what-is-a-jwt-json-web-token\" style=\"position:relative;\"><a href=\"#what-is-a-jwt-json-web-token\" aria-label=\"what is a jwt json web token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a JWT (JSON Web Token)?</h2>\n<p>JWT (JSON Web Token) is used to provide a standard way for two parties to communicate securely. JWT is commonly used for managing authorization.</p>\n<p>There is an open industry standard called RFC-7519, which defines how JWT should be structured and how to use it to exchange information (called “claims”) in the form of JSON objects. This information can be verified and trusted as it is digitally signed.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/jwt/\">JWT (JSON Web Token)</a> is a popular method of SSO, which is widely used by B2C applications, and through this system, you can allow your consumers to log in to an application that supports JWT.</p>\n<h2 id=\"when-to-use-a-refresh-token\" style=\"position:relative;\"><a href=\"#when-to-use-a-refresh-token\" aria-label=\"when to use a refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>When to Use a Refresh Token?</h2>\n<p>Before inching towards refresh tokens, one should understand that <a href=\"https://www.loginradius.com/blog/engineering/oauth2/\">OAuth 2.0</a> specifications define both access tokens and refresh tokens. </p>\n<p>Enterprises can leverage a refresh token in scenarios where the API needs authentication through an access token but users aren’t always available to provide credentials again and again. </p>\n<p>Hence, to enhance usability and improve user experience, refresh tokens can be used. </p>\n<p><strong>Also read:</strong> <strong><a href=\"https://www.loginradius.com/blog/identity/oauth2-0-guide/\">Working With Industry Authorization: A Beginner's Guide to OAuth 2.0</a></strong></p>\n<h2 id=\"best-practices-to-secure-refresh-tokens\" style=\"position:relative;\"><a href=\"#best-practices-to-secure-refresh-tokens\" aria-label=\"best practices to secure refresh tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices to Secure Refresh Tokens</h2>\n<p>Since browser-based web applications cannot start using a refresh token, refresh tokens always require additional security. </p>\n<p>Whenever a refresh token is being utilized, the security token service quickly issues another access token and a new refresh token. The user can now make API calls through a refresh token. </p>\n<p>Whenever the overall security token service suspects that any refresh token is being used more than once, it automatically assumes something isn’t right. As a result, the refresh token gets immediately revoked and hence ensures adequate security. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">RBA (Risk-based Authentication) </a>can be the finest way to enhance the security of a refresh token since it helps to analyze a vulnerability and automatically adds another stringent security layer in the mechanism. </p>\n<p>RBA works seamlessly with token-based authentication and can help improve overall security in high-risk scenarios where businesses need a stringent mechanism to prevent a security breach. </p>\n<h2 id=\"authentication-using-jwt-token-and-refresh-token\" style=\"position:relative;\"><a href=\"#authentication-using-jwt-token-and-refresh-token\" aria-label=\"authentication using jwt token and refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication Using JWT Token and Refresh Token</h2>\n<p>JWTs represent a set of claims as JSON objects encoded in a JWS and JWE structure. This JSON object is called “JWT Claims Set.” The JSON object consists of zero or more name/value pairs (or members), where the names are strings, and the values are arbitrary JSON values. These members are the claims represented by the JWT.</p>\n<p>Your JWTs can contain any information you want; the user's name, birth date, email, etc. You do this with claims-based authorization. You then just tell your provider to make a JWT with these claims from the claims principle.</p>\n<p>Authentication is implemented through JWT access tokens along with refresh tokens. The API returns a short-lived token (JWT), which expires in 15 minutes, and in HTTP cookies, the refresh token expires in 7 days. </p>\n<p>JWT is currently used for accessing secure ways on API, whereas a refresh token generates another new JWT access token when it expires or even before. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Refresh tokens can be the ideal way to enhance security and improve user experience since users need not enter login credentials again and again. </p>\n<p>LoginRadius helps enterprises get maximum benefits in terms of security, scalability, and usability when implementing token-based authentication on web and mobile devices. </p>\n<p>Businesses can leverage LoginRadius’ authentication and authorization services for a seamless experience that fosters business growth. <a href=\"https://www.loginradius.com/contact-sales\">Schedule a call today</a>! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 24, 2021","updated_date":null,"description":"A token plays a crucial role in enhancing the overall security mechanism of an organization. This blog provides an overview of using refresh tokens and how it helps securely authenticate users without hampering their overall experience.","title":"Refresh Tokens: When to Use Them and How They Interact with JWTs","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6129032258064515,"src":"/static/3e53bf0d14b0304e647258612eee7deb/14b42/refresh-tokens-jwt-interaction-cover.jpg","srcSet":"/static/3e53bf0d14b0304e647258612eee7deb/f836f/refresh-tokens-jwt-interaction-cover.jpg 200w,\n/static/3e53bf0d14b0304e647258612eee7deb/2244e/refresh-tokens-jwt-interaction-cover.jpg 400w,\n/static/3e53bf0d14b0304e647258612eee7deb/14b42/refresh-tokens-jwt-interaction-cover.jpg 800w,\n/static/3e53bf0d14b0304e647258612eee7deb/16310/refresh-tokens-jwt-interaction-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Saikiran Babladi","github":null,"avatar":null}}}},{"node":{"excerpt":"The ever-expanding competitive business landscape demands enterprises to deliver rich consumer experiences from the moment they interact…","fields":{"slug":"/identity/progressive-disclosure-user-onboarding/"},"html":"<p>The ever-expanding competitive business landscape demands enterprises to deliver rich consumer experiences from the moment they interact with the brand for the first time. </p>\n<p>This means if an organization fails to impress the visitor in the first place, they’ll surely lose a potential customer since competitors in every field are just a few clicks away. </p>\n<p>Progressive disclosure plays a crucial role in <a href=\"https://www.loginradius.com/blog/fuel/importance-customer-onboarding/\">enhancing the onboarding experience</a> as it defers rarely used or advanced features for secondary screens that help make applications easier to learn. </p>\n<p>In the context of the onboarding process for a product, it refers to disclosing features or options as the user gradually navigates through the overall process. </p>\n<p>Progressive disclosure helps businesses portray essential information initially and then gradually uncover the rest of the features that ensure users aren’t overburdened and that their purpose is solved. </p>\n<p>Let’s understand what progressive disclosure is, why businesses strictly need to put their best foot forward to adopt progressive disclosure, and how LoginRadius helps pave the path for a successful onboarding process. </p>\n<h2 id=\"what-is-progressive-disclosure\" style=\"position:relative;\"><a href=\"#what-is-progressive-disclosure\" aria-label=\"what is progressive disclosure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Progressive Disclosure</h2>\n<p>Progressive disclosure is an innovative interaction design pattern that sequences information and various actions across different screens. </p>\n<p>The purpose is to enhance conversion rates by ensuring users don’t switch to competitors just because they aren’t getting relevant information when they first interact with a brand. </p>\n<p>In a nutshell, progressive disclosure interaction design pattern provides a quick overview of features/content of an application that helps users make better decisions. </p>\n<h2 id=\"benefits-and-examples-of-progressive-disclosure\" style=\"position:relative;\"><a href=\"#benefits-and-examples-of-progressive-disclosure\" aria-label=\"benefits and examples of progressive disclosure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits and Examples of Progressive Disclosure</h2>\n<p>With technology offering new horizons to businesses, modern applications and websites are becoming more complex. The more features and functionality we add to our business website/application, the more its interface becomes complex. </p>\n<p>Excessive information/choices eventually make users feel dissatisfied as it hampers their first experience with the product. </p>\n<p>Here’s where progressive disclosure comes into play.</p>\n<p>Users always choose the most effortless path to get a job done. They won’t spend an extra second to scroll through and find what they’re actually looking for. </p>\n<p>If a business website/application isn’t able to convince them that they have landed at the right spot within the first interaction of a user, they’ll end up losing a potential client. </p>\n<p>Progressive disclosure helps build a seamless experience for users while portraying the necessary information regarding the features and capabilities of a product that helps <a href=\"https://www.loginradius.com/customer-security/\">build trust in a user</a> in the initial yet crucial few seconds of their interaction. </p>\n<p>In other words, progressive disclosure streamlines baseline experience as it hides details from users until they need or ask to see them. </p>\n<p>Let’s understand this thing through a real-life example. </p>\n<p>An e-Commerce website contains thousands of products. For these thousands of products, there can be thousands of customers or even more. </p>\n<p>It becomes technically impossible for the vendor to mention all the products on the website’s landing page to please every user that lands on their website. The e-Commerce store places mega menus (drop-down menus) that contain specific categories of products to overcome this. This arrangement saves more space for essential elements, including the search bar and promotional offer banners. </p>\n<p>This arrangement helps everyone, including the buyers and sellers, as users can quickly navigate to their desired product category, choose their product, and make a purchase. </p>\n<h2 id=\"progressive-disclosure-coupled-with-progressive-profiling\" style=\"position:relative;\"><a href=\"#progressive-disclosure-coupled-with-progressive-profiling\" aria-label=\"progressive disclosure coupled with progressive profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Progressive Disclosure Coupled with Progressive Profiling</h2>\n<p>We’ve learned a lot about progressive disclosure and have a fair idea about its importance and implementation.</p>\n<p>Let’s now look at one of the essential elements that combine with progressive disclosure to help improve customer onboarding and enhance conversions. </p>\n<h2 id=\"what-is-progressive-profiling\" style=\"position:relative;\"><a href=\"#what-is-progressive-profiling\" aria-label=\"what is progressive profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Progressive Profiling?</h2>\n<p><strong>Progressive Profiling</strong> is an intelligent feature that gradually gathers data from customers in an automated way. </p>\n<p>Progressive profiling for customer registration allows you to split a potentially complicated registration process into multiple steps. You can capture a customer’s information upfront and then slowly build out a holistic view of that customer through subsequent actions.</p>\n<p>The benefit of progressive profiling is that it requests permissions for a customer’s data at various stages of their life cycle rather than all at once. </p>\n<p>You can establish a greater level of trust with your customers as you only request their personal data when needed and not just every time they interact with your brand. </p>\n<p>LoginRadius’ progressive profiling helps businesses seamlessly enhance conversion rates through a rich consumer onboarding experience. </p>\n<h2 id=\"progressive-disclosure--progressive-profiling--great-onboarding--increased-conversions\" style=\"position:relative;\"><a href=\"#progressive-disclosure--progressive-profiling--great-onboarding--increased-conversions\" aria-label=\"progressive disclosure  progressive profiling  great onboarding  increased conversions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Progressive Disclosure + Progressive Profiling = Great Onboarding + Increased Conversions</h2>\n<p>Progressive disclosure and progressive profiling both alone can help improve customer onboarding, but when you combine them in a single application, the results are marvelous. </p>\n<p>Over the years, business giants are leveraging both components in designing rich consumer experiences that improve first interaction with the brand and eventually ensure that the user enters the sales funnel and becomes a customer. </p>\n<p>With LoginRadius’ Progressive Profiling, you can continually build richer profiles as you earn customers’ trust.</p>\n<p>The smart feature allows you to collect first-party data from your customers gradually, allowing you to build trust before you ask for too much personally identifiable information. </p>\n<p>With many people now wary of the ever-growing list of companies that have fallen prey to data breaches, customers are more reluctant to hand over too much sensitive information. </p>\n<p><a href=\"https://www.loginradius.com/progressive-profiling/\">LoginRadius’ Progressive Profiling</a> module allows you to decide what information you collect on each visit so you can increase your conversion rate and build customer profiles over time.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Progressive disclosure is an inevitable element for a successful consumer onboarding process that leads to conversion. </p>\n<p>However, leveraging the advancements of Progressive Profiling makes things work flawlessly and paces the conversion rates as users enjoy interacting with brands and sharing insights. </p>\n<p>LoginRadius’ Progressive profiling is helping thousands of businesses to streamline their onboarding process to enhance conversion rates. </p>\n<p>If you wish to see the future of progressive profiling and progressive disclosure in action, <a href=\"https://www.loginradius.com/contact-sales/\">contact us</a> now. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 18, 2021","updated_date":null,"description":"Progressive disclosure helps businesses portray essential information initially and then gradually uncover the rest of the features that ensure users aren’t overburdened and that their purpose is solved. This post helps businesses understand the importance of progressive disclosure and progressive profiling that work harmoniously to enhance conversions.","title":"How Progressive Disclosure Makes Your User's Onboarding Easy","tags":["user onboarding","data security","progressive profiling"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5151515151515151,"src":"/static/0272d069c90cce3bedb0fe6d8a3606b0/14b42/progressive-disclosure-user-onboarding-cover.jpg","srcSet":"/static/0272d069c90cce3bedb0fe6d8a3606b0/f836f/progressive-disclosure-user-onboarding-cover.jpg 200w,\n/static/0272d069c90cce3bedb0fe6d8a3606b0/2244e/progressive-disclosure-user-onboarding-cover.jpg 400w,\n/static/0272d069c90cce3bedb0fe6d8a3606b0/14b42/progressive-disclosure-user-onboarding-cover.jpg 800w,\n/static/0272d069c90cce3bedb0fe6d8a3606b0/16310/progressive-disclosure-user-onboarding-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction We all have gone through proving our identity somehow, and many of us won’t understand its importance.  Imagine you’re about to…","fields":{"slug":"/identity/what-is-identity-verification/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>We all have gone through proving our identity somehow, and many of us won’t understand its importance. </p>\n<p>Imagine you’re about to book a hotel in another state, and you go to the counter, show your identity verification documents like passport or identity card, and take the keys to your room. </p>\n<p>This is what identity proofing is. The process of verifying an individual’s identity whether it matches their claimed identity or not. It’s quite a simple process. Isn’t it? </p>\n<p>However, things aren’t that easy as they might seem, especially when it comes to digital identities. </p>\n<p><a href=\"https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2019/consumer_sentinel_network_data_book_2019.pdf\">As per stats</a>, around 3.4 million identities were compromised to a breach in 2019, which is pretty problematic. </p>\n<p>So, does it mean that cybercriminals are exploiting certain loopholes in the current identity verification system? </p>\n<p>Unfortunately, yes. </p>\n<p>Let’s understand how identity verification works in the digital era and uncover various digital identity verification methods. </p>\n<h2 id=\"what-is-identity-verification\" style=\"position:relative;\"><a href=\"#what-is-identity-verification\" aria-label=\"what is identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity Verification?</h2>\n<p>Identity verification is a necessary process that ensures an individual’s identity matches the one that is supposed to be. </p>\n<p>The identity verification process involves comparing the set of unique characteristics and traits associated with an individual with the one claiming the same. </p>\n<p>Identity verification is essential to ensure an actual individual is behind a process and prevent fraud through authentication and authorization. </p>\n<p>Whether online or offline, identity verification is an essential requirement for most procedures and processes, including online/offline banking, booking flights, or applying for a passport. </p>\n<h2 id=\"what-is-digital-identity-verification\" style=\"position:relative;\"><a href=\"#what-is-digital-identity-verification\" aria-label=\"what is digital identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Identity Verification?</h2>\n<p>Digital identity implies how you are represented and digitally documented online, sometimes through social login, work email address, or personal email ID. </p>\n<p>In a nutshell, it's a process that validates a person's identifying characteristics or traits and verifies they really are who they claim to be by leveraging computer technology.</p>\n<h2 id=\"why-verification-for-digital-identity-became-necessary\" style=\"position:relative;\"><a href=\"#why-verification-for-digital-identity-became-necessary\" aria-label=\"why verification for digital identity became necessary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Verification for Digital Identity Became Necessary?</h2>\n<p>Since technology has helped us perform complex tasks like a breeze, the associated cybersecurity threats can’t be overlooked. </p>\n<p>Every year, millions of people compromise their identities since cybercriminals are always on a hunt for frail networks that can be easily bypassed. This means weak authentication or a loophole in the overall <a href=\"https://www.loginradius.com/blog/identity/what-is-iam/\">identity management system</a> can be fatal for an organization. </p>\n<p>Hackers are able to impersonate users within a network and gain access to sensitive business information, which is further exploited for diverse purposes. </p>\n<p>Hence a more robust line of defense is becoming the need of the hour in the form of digital identity verification as organizations have to face financial losses worth millions along with brand tarnishing just because of an increasing number of identity thefts. </p>\n<h2 id=\"digital-identity-verification-use-cases\" style=\"position:relative;\"><a href=\"#digital-identity-verification-use-cases\" aria-label=\"digital identity verification use cases permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital Identity Verification Use Cases</h2>\n<p>Digital identity verification serves a multitude of purposes across various sectors. Here are some common use cases:</p>\n<ul>\n<li><strong>Financial Services</strong>: Banks and financial institutions use digital identity verification to authenticate customers for account openings, loans, and transactions.</li>\n<li><strong>Healthcare</strong>: Healthcare providers verify patient identities for telemedicine appointments, prescription refills, and accessing medical records.</li>\n<li><strong>E-Commerce</strong>: Online retailers use identity verification to prevent fraud in purchases, especially for high-value items.</li>\n<li><strong>Travel and Hospitality</strong>: Airlines and hotels verify identities for booking tickets and check-ins, enhancing security and preventing identity theft.</li>\n<li><strong>Government Services</strong>: Government agencies use digital identity verification for citizen services like tax filings, voting, and license renewals.</li>\n</ul>\n<h2 id=\"how-to-analyze-digital-identity-verification-solutions\" style=\"position:relative;\"><a href=\"#how-to-analyze-digital-identity-verification-solutions\" aria-label=\"how to analyze digital identity verification solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Analyze Digital Identity Verification Solutions</h2>\n<p>When evaluating digital identity verification solutions, consider the following factors:</p>\n<ul>\n<li><strong>Security Features</strong>: Look for solutions with robust encryption, multi-factor authentication (MFA), and biometric verification for enhanced security.</li>\n<li><strong>User Experience</strong>: A seamless user experience is crucial. Ensure the solution offers easy integration, smooth onboarding, and minimal friction for users.</li>\n<li><strong>Compliance</strong>: Verify that the solution complies with industry standards and regulations such as GDPR, HIPAA, and PCI-DSS.</li>\n<li><strong>Scalability</strong>: Choose a solution that can scale with your business growth, accommodating increasing user volumes and diverse verification needs.</li>\n<li><strong>Cost-effectiveness</strong>: Evaluate the pricing structure, considering factors like transaction volume, support costs, and implementation expenses.</li>\n</ul>\n<h2 id=\"how-is-digital-identity-verification-different-from-authentication\" style=\"position:relative;\"><a href=\"#how-is-digital-identity-verification-different-from-authentication\" aria-label=\"how is digital identity verification different from authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Digital Identity Verification Different from Authentication?</h2>\n<p>While digital identity verification and authentication are closely related, they serve distinct purposes:</p>\n<ul>\n<li><strong>Identity Verification</strong>: Verifies the user's identity against a trusted source, ensuring they are who they claim to be. It involves validating personal information and documents.</li>\n<li><strong>Authentication</strong>: Confirms a user's identity during access attempts. It typically involves verifying credentials (username, password) or using additional factors like biometrics or one-time passwords (OTP).</li>\n</ul>\n<p>In essence, identity verification establishes trust in the user's identity, while authentication grants access based on that verified identity.</p>\n<h2 id=\"what-are-the-benefits-of-digital-identity-verification\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-digital-identity-verification\" aria-label=\"what are the benefits of digital identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Benefits of Digital Identity Verification?</h2>\n<p>When it comes to the advantages of digital identity verification, the list is endless. Here are some of the benefits associated with digital identity verification: </p>\n<p><strong>1. Robust Security</strong></p>\n<p>Adding multiple layers of authentication to your current network through <a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\">multi-factor authentication</a> (MFA) can help enhance overall security. </p>\n<p>MFA is considered the most reliable way to authenticate users that prevents unauthorized access and eventually helps to comply with specific industry regulations.</p>\n<p>For example, PCI-DSS requires MFA to be implemented in certain situations to prevent unauthorized users from accessing systems. So, even when application updates lead to unknown and unattended consequences, MFA compliance ensures that it remains virtually non-intrusive.</p>\n<p><strong>2. Mitigates the Risks Associated with Human Verification Measures</strong></p>\n<p>The traditional methods for verifying an identity solely rely on human verification measures that include comparing a person’s picture on a government-issued identity with the ones asking to avail certain services (online/offline).</p>\n<p>These measures are widely used to judge the identity, whether it’s fake or genuine. </p>\n<p>However, unauthorized professionals can easily bypass these verification processes by altering the documents through several free tools available in the market. </p>\n<p>Using a reliable identity verification system reduces human judgment-related risks and mitigates human error in verifying an individual’s identity. </p>\n<p><strong>3. Improves Customer Experience</strong></p>\n<p>Customer experience is everything, and if it’s reinforced with the highest level of security, it’s the game-changer for any enterprise or public sector service provider. </p>\n<p>The cutting-edge identity verification system offered by LoginRadius offers user-friendly experiences for potential customers right from the onboarding stage and during the entire consumer life cycle. </p>\n<p>The robust CIAM (consumer identity and access management) solution by LoginRadius enables secure authentication and adds multiple layers of authentication through multi-factor authentication and adaptive authentication (risk-based authentication). </p>\n<p>Customers can quickly verify their identity either through their social media accounts or through a one-time password (OTP), which enhances the overall user experience. </p>\n<h2 id=\"how-does-the-identity-verification-process-work\" style=\"position:relative;\"><a href=\"#how-does-the-identity-verification-process-work\" aria-label=\"how does the identity verification process work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does the Identity Verification Process Work?</h2>\n<p>The identity verification process through the identity and access management system works by performing three main tasks viz. identification, <a href=\"https://www.loginradius.com/blog/identity/authentication-vs-authorization-infographic/\">authentication, and authorization</a>.</p>\n<p>In other words, a CIAM solution functions to provide the right people access to devices, hardware, software applications, or any IT tool to perform a specific task.</p>\n<p><a href=\"https://www.loginradius.com/resource/digital-consumer-landscape-ebook/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-Bridging-Trust-Gap\"\n        title=\"EB-Bridging-Trust-Gap\"\n        src=\"/static/08357e020e7a3bb945a8624acead5e63/e5715/EB-Bridging-Trust-Gap.png\"\n        srcset=\"/static/08357e020e7a3bb945a8624acead5e63/a6d36/EB-Bridging-Trust-Gap.png 650w,\n/static/08357e020e7a3bb945a8624acead5e63/e5715/EB-Bridging-Trust-Gap.png 768w,\n/static/08357e020e7a3bb945a8624acead5e63/63ff0/EB-Bridging-Trust-Gap.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>The CIAM includes the following core components:</p>\n<ul>\n<li>A database that includes the identities and access rights of users and consumers</li>\n<li>CIAM tools to provision, monitor, change and remove access privileges</li>\n<li>A framework for auditing login and access history</li>\n</ul>\n<p>The list of access rights must be up-to-date all the time with the entry of new users or the change of roles of current users. </p>\n<p>The responsibilities of identity and access management typically come under IT or departments that handle data processing and cybersecurity.</p>\n<h2 id=\"types-of-identity-verification-methods\" style=\"position:relative;\"><a href=\"#types-of-identity-verification-methods\" aria-label=\"types of identity verification methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Identity Verification Methods</h2>\n<p>Identity verification is the necessary implementation for secure and genuine access to resources of web and mobile applications. It helps to authorize the user and provide access control for applications based on the user’s credentials. </p>\n<p>Here are some ways through which identities of consumers can be verified: </p>\n<ul>\n<li><strong>Email Verification:</strong> Email is still considered the primary means of authentication because other mechanisms are not as optimized or approach everyone. So it is safe to say that most of your application users use their Gmail accounts for creating their new accounts. The credentials used in setting up the email verification can be used to sign in to an account. </li>\n<li><strong>Biometric Verification:</strong> Biometrics are physical characteristics and traits of an individual that are unique to them. These characteristics can be used for authentication purposes. Most common <a href=\"https://www.loginradius.com/resource/mobile-biometric-authentication-datasheet\">biometric authentication</a> characteristics include fingerprints, iris, face, and voice. </li>\n<li>\n<p><strong>Phone Verification:</strong> With phone verification, customers use their telephone numbers to identify themselves. This process occurs in three simple steps.</p>\n<ul>\n<li>The customer fills out the registration form with their phone number, later acting as the username.</li>\n<li>LoginRadius sends a temporary one-time passcode (OTP) registration via an SMS message or automated call.</li>\n<li>The customer verifies their phone number by entering the OTP on the website or mobile app.</li>\n</ul>\n</li>\n<li>\n<p><strong>Social Verification:</strong> Social login/verification enables users to use existing login credentials from a social networking platform, including Facebook, Google, Twitter, and more, allowing simplified logins and registrations. LoginRadius simplifies social authentication and improves the overall user experience. </p>\n<p>Our social authentication solution flawlessly combines the APIs of over 40 social networks that create a unified social API fully equipped to handle all the specific features of these platforms.</p>\n</li>\n</ul>\n<h2 id=\"identity-verification-regulations-and-standards\" style=\"position:relative;\"><a href=\"#identity-verification-regulations-and-standards\" aria-label=\"identity verification regulations and standards permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Verification Regulations and Standards</h2>\n<p>Several countries have different standards and regulations for identity verification, which service providers should consider before serving the citizens of that particular country. </p>\n<p>If you’re relying on a CIAM solution like LoginRadius, you need not worry about identity verification regulations and standards. </p>\n<p>The <a href=\"https://www.loginradius.com/\">LoginRadius Identity Platform</a> is designed to comply with all significant data security and privacy laws and with the terms of various social networks. Our legal team constantly monitors changes in the laws, and we perform regular security audits to ensure that our compliance is always up to date.</p>\n<p>The LoginRadius Identity Platform is designed to handle consent management and ensure continued compliance with all major privacy regulations, including the EU’s GDPR and California’s CCPA.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Organizations that aren’t able to earn consumers’ trust gradually end up losing business. This is perhaps the reason why stringent authentication practices should be in place. </p>\n<p>Since cybercriminals easily exploit inadequate identity verification systems, the end result is compromised consumer identity and brand tarnishing. </p>\n<p>Businesses need to consider relying on a robust CIAM solution that helps in securely verifying user identities without hampering user experience. </p>\n<p>LoginRadius’ cutting-edge CIAM can be the ultimate choice for preserving crucial consumer data and offering a robust authentication mechanism backed with a great user experience. </p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is digital ID verification?</strong></p>\n<p>Digital ID verification is the process of confirming a person's identity online using digital methods.</p>\n<p><strong>2. How do you digitally verify your identity?</strong></p>\n<p>Digitally verifying your identity typically involves providing specific information or documents through an online platform, such as uploading a photo of your government-issued ID or answering security questions.</p>\n<p><strong>3. What is digital identity verification with example?</strong></p>\n<p>Digital identity verification is used in various industries like finance and healthcare. An example would be opening a bank account online, where the bank verifies your identity using the information and documents you provide.</p>\n<p><strong>4. What is virtual identity verification?</strong></p>\n<p>Virtual identity verification is the process of verifying an individual's identity through digital channels without physical presence, often using methods like video calls or AI analysis of facial features or voice patterns. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 13, 2021","updated_date":null,"description":"Identity verification is a necessary process that ensures an individual’s identity matches the one that is supposed to be. This post helps better understand what digital identity verification is, how it works, and the types of digital identity verification systems.","title":"What is Digital Identity Verification and Why is it Necessary?","tags":["identity verification","digital identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9607843137254901,"src":"/static/6ffb10f263d7c21a4e4b58c666edde67/14b42/what-is-identity-verification-cover.jpg","srcSet":"/static/6ffb10f263d7c21a4e4b58c666edde67/f836f/what-is-identity-verification-cover.jpg 200w,\n/static/6ffb10f263d7c21a4e4b58c666edde67/2244e/what-is-identity-verification-cover.jpg 400w,\n/static/6ffb10f263d7c21a4e4b58c666edde67/14b42/what-is-identity-verification-cover.jpg 800w,\n/static/6ffb10f263d7c21a4e4b58c666edde67/16310/what-is-identity-verification-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rajeev Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"The paradigm shift that the world has witnessed amid the global pandemic has altered the way broadcasters distribute content.  With the…","fields":{"slug":"/identity/ott-simplify-authentication/"},"html":"<p>The paradigm shift that the world has witnessed amid the global pandemic has altered the way broadcasters distribute content. </p>\n<p>With the significant <a href=\"https://pages.conviva.com/rs/138-XJA-134/images/RPT_Conviva_State_of_Streaming_Q1_2021.pdf\">increase in the over-the-top (OTT) audience</a> in the last year, the media industry has undoubtedly changed everyone’s leisure time. </p>\n<p>However, the sudden increase in OTT users has also increased the security challenges, and many OTT platforms witnessed massive identity thefts. </p>\n<p>Since the world isn’t going to shift back to conventional entertainment any soon (or maybe never), delivering rich omnichannel experiences backed with robust security becomes the need of the hour for the media industry. </p>\n<p>Enterprises need to put their best foot forward to securely authenticate and authorize users to avoid any chance of sneak into the network that may lead to financial losses or brand reputation tarnishing. </p>\n<p>In this post, we’ll understand the importance of secure authentication through a consumer identity and access management (CIAM) solution and how it paves the path for securing consumer identities on different devices for OTT platforms. </p>\n<h2 id=\"why-ciam-solution-for-ott-platforms\" style=\"position:relative;\"><a href=\"#why-ciam-solution-for-ott-platforms\" aria-label=\"why ciam solution for ott platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why CIAM Solution for OTT Platforms?</h2>\n<p>Amid the global pandemic, when everyone was locked inside their homes, and the internet became their second home, OTT platforms witnessed record subscriptions. </p>\n<p>This means every platform had to cater to a vast number of individuals and manage heaps of identities. </p>\n<p>However, most of the platforms weren’t relying on a secure mechanism to handle such a huge number of identities, which led to compromised identities causing losses worth millions of dollars. </p>\n<p>Moreover, delivering a rich omnichannel experience for users accessing the network from different devices becomes challenging for vendors. </p>\n<p>Here’s where a <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">consumer identity and access management</a> (CIAM) solution comes into play. </p>\n<p>With a CIAM solution in place, any OTT platform can securely handle billions of identities without hampering user experience on any device. </p>\n<p>Moreover, a robust CIAM like LoginRadius can help OTT platforms to autoscale their servers whenever the demand increases exponentially. </p>\n<p>Let’s understand how a CIAM solution can help OTT platforms simplify authentication on different devices. </p>\n<h2 id=\"benefits-of-identity-management-through-a-ciam\" style=\"position:relative;\"><a href=\"#benefits-of-identity-management-through-a-ciam\" aria-label=\"benefits of identity management through a ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Identity Management through a CIAM</h2>\n<p>When it comes to the advantages of a leading CIAM like LoginRadius, the list is endless. Here we’ve clubbed some of the benefits of a CIAM for OTT platforms. Let’s have a look: </p>\n<h3 id=\"single-sign-on-sso\" style=\"position:relative;\"><a href=\"#single-sign-on-sso\" aria-label=\"single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Single Sign-On (SSO)</h3>\n<p>Honestly, nobody likes to remember long credentials, especially if they can utilize the true potential of frictionless login across all the applications and connected devices.</p>\n<p>While SSO is on the verge of becoming an industry standard for authentication, OTT platforms need to quickly gear up for enhancing the user experience through SSO and Federated SSO.</p>\n<p>OTT users perceive your enterprise as a single entity, and they expect you to treat them like a single customer.</p>\n<p>If you have multiple websites and mobile apps under the same company umbrella, there’s no reason you can’t meet this expectation.</p>\n<p><a href=\"https://www.loginradius.com/web-and-mobile-sso/\">Web SSO</a> authentication from LoginRadius brings everything together.</p>\n<p>Each customer has one account. One set of credentials that they can use anywhere they interact with your brand.</p>\n<p>Since the market is flooded with plenty of OTT platforms and publication websites, the ones offering a seamless experience to the users would surely get more signups and subscriptions.</p>\n<p><strong>Also read:</strong> <a href=\"https://www.loginradius.com/resource/how-media-and-publication-companies-use-loginradius-identity-platform/\">How Media and Publication Companies Use the LoginRadius Identity Platform</a></p>\n<h3 id=\"access-management---for-restricting-content\" style=\"position:relative;\"><a href=\"#access-management---for-restricting-content\" aria-label=\"access management   for restricting content permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Access Management - For Restricting Content</h3>\n<p>With the increasing access to media over OTT platforms, the entertainment industry’s biggest challenge is setting age restrictions for specific content.</p>\n<p>While most media platforms aren’t focusing on creating sub-profiles, the competitors are already leveraging access management for a single identity used by multiple users.</p>\n<p>Whether we talk about a particular category of content for premium users or setting age restrictions, access management plays a crucial role in enhancing the user experience for every business.</p>\n<p>Access management through a CIAM solution like LoginRadius helps improve user experience and eventually plays a crucial role in enhancing overall data and privacy security.</p>\n<p>LoginRadius’ cloud-based CIAM solution helps businesses seamlessly manage access without hampering the overall user experience. This allows OTT platforms to gain more signups, increase retention rates, and scale business growth.</p>\n<h3 id=\"progressive-profiling\" style=\"position:relative;\"><a href=\"#progressive-profiling\" aria-label=\"progressive profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Progressive Profiling</h3>\n<p>Media businesses need to understand that registration fatigue could be why they lose a potential subscriber.</p>\n<p>Admit it; nobody wants to share heaps of personal details in a single go, especially during the sign-up process. Keeping the subscription form compact is the best way to ensure a quick sign-up from the users’ end.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/\">Progressive profiling</a> lets you gather important details about a subscriber over time and not everything in a single go. This not only improves user experience but eventually helps to build credibility in the long run.</p>\n<p>LoginRadius enables you to gather consumer data through various stages of the consumer's journey to share their information as they interact with your business.</p>\n<p><a href=\"https://www.loginradius.com/resource/a-complete-guide-to-website-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABiklEQVQY0y3Qyy8kQQDH8UZMP6aXbMgajNeYNuMxaI9pGsMYs8QrOi4eG0GchDiIOHjswcmeHcTFcR+HTTZ7EBwknJzcHET8K1/V1Q6/VKUq9alflaI3DRJODmFEBzFqZlDVbpSVS5TTV/S5W0q6ltHiDnpiSIwuRmuO8j6PsvYcetsYWnIY3RrAdzQRxZ8YAjSrXbQGj6JIlsLYGrX5XxTn/vDJXhJQWhwIwHAqT212kdb8AmFnHjX1VYBuAFoC1IRuNmdQv9hCF6nwUBq3UdtPKHLOBbgoG/q3G6JlND1JVc84ke4JanonqOub5nNqFDUeoBL0U2FliHd61PesEnF2UdqOKXAuKBGgbjmyoX+orGOMqDMlU52eknDQLni2fLKfqmQWy/ZocjeIZ/cxe78T6j+j1F7ATLgolTZbRz94fnnj79UdP/9d8/v/DfePT9w+PMqWoUb34w8TwQ2hWD/FMVds+GsjmC05MWbkfmF9Gmd2lc2DU5Z3jljaPpRZ3zvh285x8G3CeAeLbMaCXANuEAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-to-web-auth\"\n        title=\"GD-to-web-auth\"\n        src=\"/static/38e94af31b34229a6f6bcba148eb92b7/e5715/GD-to-web-auth.png\"\n        srcset=\"/static/38e94af31b34229a6f6bcba148eb92b7/a6d36/GD-to-web-auth.png 650w,\n/static/38e94af31b34229a6f6bcba148eb92b7/e5715/GD-to-web-auth.png 768w,\n/static/38e94af31b34229a6f6bcba148eb92b7/81501/GD-to-web-auth.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"multi-factor-authentication---for-enhanced-layers-of-security\" style=\"position:relative;\"><a href=\"#multi-factor-authentication---for-enhanced-layers-of-security\" aria-label=\"multi factor authentication   for enhanced layers of security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication - For Enhanced Layers of Security</h3>\n<p>While the number of media platform subscriptions surged amid the global pandemic, the fact that cyber-attacks on diverse platforms increased exponentially can’t be overlooked.</p>\n<p>With millions of data breaches and identity thefts in the media industry alone, a CIAM solution with multi-factor authentication can be the ultimate solution.</p>\n<p>LoginRadius’<a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\"> Multi-factor authentication</a> coupled with risk-based authentication helps businesses in creating a secure login experience for subscribers.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>With the increasing number of data breaches and compromised identities worldwide, OTT platforms should consider getting a robust CIAM solution in place. </p>\n<p>Whether it’s delivering a seamless omnichannel experience across multiple devices or managing billions of identities, a CIAM solution is becoming the need of the hour. </p>\n<p>Enterprises can <a href=\"https://www.loginradius.com/contact-sales/\">leverage LoginRadius CIAM</a> that helps to scale business growth through a state-of-the-art omnichannel experience reinforced by stringent security.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 10, 2021","updated_date":null,"description":"In this post, we’ll understand the importance of secure authentication through a consumer identity and access management (CIAM) solution and how it paves the path for safeguarding consumer identities on different devices for OTT platforms.","title":"How OTT Services can Simplify Authentication on Various Devices","tags":["ciam solution","mfa","progressive profiling"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5625,"src":"/static/e4c5c6354a5a808de32e7ea8049db1a5/14b42/ott-simplify-authentication-cover.jpg","srcSet":"/static/e4c5c6354a5a808de32e7ea8049db1a5/f836f/ott-simplify-authentication-cover.jpg 200w,\n/static/e4c5c6354a5a808de32e7ea8049db1a5/2244e/ott-simplify-authentication-cover.jpg 400w,\n/static/e4c5c6354a5a808de32e7ea8049db1a5/14b42/ott-simplify-authentication-cover.jpg 800w,\n/static/e4c5c6354a5a808de32e7ea8049db1a5/16310/ott-simplify-authentication-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Manish Tiwari","github":null,"avatar":null}}}},{"node":{"excerpt":"In a world where data breaches aren’t uncommon, businesses are always on the verge of compromising sensitive information, and cybersecurity…","fields":{"slug":"/identity/beginners-guide-zero-trust-security/"},"html":"<p>In a world where data breaches aren’t uncommon, businesses are always on the verge of compromising sensitive information, and cybersecurity best practices become the need of the hour. </p>\n<p>For years, enterprises have modeled cybersecurity around a specific virtual perimeter of trust, including trusted users, devices, and trusted network infrastructure. </p>\n<p>Although these fundamental entities are considered safe and trustworthy, this cybersecurity model is the one that’s been exploited by cybercriminals for years. </p>\n<p>Undoubtedly, there’s an immediate need for a robust mechanism that doesn’t leave any loophole in the entire system consisting of numerous devices, users, and digital touchpoints and provides a risk-free ecosystem. </p>\n<p>Here’s where the <a href=\"https://www.loginradius.com/blog/identity/sase-zero-trust/\">zero trust security model</a> comes into play. </p>\n<p>The shortcomings of the current cybersecurity system that can be quickly analyzed by hackers that are always on a hunt for finding loopholes can be fixed by implementing a zero trust security model across the entire network. </p>\n<p>Let’s understand the concept of zero trust in detail and why businesses need to put their best foot forward in deploying zero trust security without further delay. </p>\n<h2 id=\"what-is-zero-trust-security\" style=\"position:relative;\"><a href=\"#what-is-zero-trust-security\" aria-label=\"what is zero trust security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Zero Trust Security</h2>\n<p>Zero trust can be defined as the security concept based on a belief that enterprises shouldn’t automatically trust any device or individual, whether inside or outside its perimeters and should strictly verify everything before granting access. </p>\n<p>In a nutshell, zero trust relies on the principle of “don’t trust anyone.” This architecture cuts all the access points until proper verification is done and trust is established. </p>\n<p>No access is provided until the system verifies the individual or device demanding n access to the IP address, device, or storage. </p>\n<p>This strategic initiative helps prevent data breaches as the concept of trusting anyone is eliminated, even if the access request is from within the network. </p>\n<p>Hence, implementing zero trust architecture ensures the highest level of security and mitigates the risk of a data breach or unauthorized access.</p>\n<h2 id=\"why-do-you-need-zero-trust-security\" style=\"position:relative;\"><a href=\"#why-do-you-need-zero-trust-security\" aria-label=\"why do you need zero trust security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Do You Need Zero Trust Security</h2>\n<p>The zero trust security model strictly believes that everything inside is by default secure, and the only thing that requires adequate security is outside network access. </p>\n<p>Moreover, security experts now firmly believe that the conventional security approach is good for nothing, especially in a world where most data breaches are caused by bypassing the corporate firewalls and the hackers could move inside a private network without enough resistance. </p>\n<p>Many businesses are letting too many things run way too openly on too many connections, which is perhaps why they get targeted by cybercriminals that are always on a hunt for enterprise networks with minimal layers of security. </p>\n<p>Since the network is too open for all inside the organization, anyone can share everything, which is alarming. </p>\n<p>Hence enterprises today need a whole new way of thinking regarding access management within the organization, which helps minimize data compromise by a bad external actor. </p>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-zero-trust-1\"\n        title=\"WP-zero-trust-1\"\n        src=\"/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-1.png\"\n        srcset=\"/static/1899738346b212558cc624397cb31d32/a6d36/WP-zero-trust-1.png 650w,\n/static/1899738346b212558cc624397cb31d32/e5715/WP-zero-trust-1.png 768w,\n/static/1899738346b212558cc624397cb31d32/81501/WP-zero-trust-1.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"benefits-of-getting-zero-trust-security-mechanism\" style=\"position:relative;\"><a href=\"#benefits-of-getting-zero-trust-security-mechanism\" aria-label=\"benefits of getting zero trust security mechanism permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Getting Zero Trust Security Mechanism</h2>\n<h3 id=\"1-safeguards-sensitive-business-information-and-brand-repute\" style=\"position:relative;\"><a href=\"#1-safeguards-sensitive-business-information-and-brand-repute\" aria-label=\"1 safeguards sensitive business information and brand repute permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Safeguards Sensitive Business Information and Brand Repute</h3>\n<p>Securing sensitive business data should be the #1 priority for enterprises embarking on a journey to digital transformation, which not only prevents losses worth millions of dollars but eventually preserves brand reputation. </p>\n<p>Lack of a robust security mechanism could also lead to compromised consumer identities that further cause financial losses.</p>\n<p>Moreover, consumers’ refusal to do business with a breached enterprise will naturally affect the overall revenues.</p>\n<p>Enforcing an effective Zero Trust solution will not only ensure that only authenticated and authorized individuals and devices have access to resources and applications but will also help <a href=\"https://www.loginradius.com/blog/identity/how-to-handle-data-breaches/\">mitigate data breaches</a>, preventing many of these negative consequences.</p>\n<h3 id=\"2-greater-visibility\" style=\"position:relative;\"><a href=\"#2-greater-visibility\" aria-label=\"2 greater visibility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Greater Visibility</h3>\n<p>Since Zero Trust never trusts anyone, you can always decide what resources, data, and activity you’ll need to add to your security strategy.</p>\n<p>All information and computing sources are secure, and every user needs to go through a stringent authentication process to gain access to specific resources. Once you have set up the monitoring that covers all your activities and resources, you gain complete visibility into how and who accesses your organization’s network.</p>\n<p>This means you have precise data regarding the time, location, and application involved in each request.</p>\n<p>Moreover, your overall security system helps to flag suspicious behaviors and keeps track of every activity that occurs.</p>\n<h3 id=\"3-secures-remote-workforce\" style=\"position:relative;\"><a href=\"#3-secures-remote-workforce\" aria-label=\"3 secures remote workforce permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Secures Remote Workforce</h3>\n<p>One of the biggest challenges IT organizations face today is the sudden shift to the remote working ecosystem.</p>\n<p>As per the latest<a href=\"https://lp.skyboxsecurity.com/WICD-2020-11-WW-Distributed-Workforce-Report-Reg.html\"> stats</a>, around 73% of IT professionals C-level executives are concerned that the distributed workforce has eventually introduced new vulnerabilities along with a sudden increase in exposure.</p>\n<p>With Zero Trust in place, identity is undeniably the perimeter and is attached to users, applications, and devices seeking access, reinforcing security.</p>\n<p>Moreover, the dependency on firewalls, which aren’t the best line of defense, is reduced as a robust security mechanism reassuring that users spread across the world can securely access data across the cloud.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>With the increasing risk of security breaches from within a network, the need for a zero trust mechanism becomes more crucial than ever before. </p>\n<p>Decision-makers and IT department heads of an organization should consider putting their best foot forward in <a href=\"https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/\">securing important consumer information</a> and business data by leveraging robust layers of defense through a zero trust security model. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 05, 2021","updated_date":null,"description":"With the rising number of cyberattacks, there’s an immediate need for a robust mechanism that provides a risk-free digital ecosystem. Zero trust helps businesses create the most secure environment that mitigates the risk of any kind of security breach.","title":"A Beginner's Guide to Zero Trust Security Model","tags":["zero trust security","cybersecurity","mfa"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9047619047619047,"src":"/static/43443aadbfa7657687a7b897f80a33f8/14b42/beginners-guide-zero-trust-security-cover.jpg","srcSet":"/static/43443aadbfa7657687a7b897f80a33f8/f836f/beginners-guide-zero-trust-security-cover.jpg 200w,\n/static/43443aadbfa7657687a7b897f80a33f8/2244e/beginners-guide-zero-trust-security-cover.jpg 400w,\n/static/43443aadbfa7657687a7b897f80a33f8/14b42/beginners-guide-zero-trust-security-cover.jpg 800w,\n/static/43443aadbfa7657687a7b897f80a33f8/16310/beginners-guide-zero-trust-security-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":222,"currentPage":38,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}