{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/44","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"In an era, when every business is gearing up for a digital transformation journey to thrive productivity and scalability, the role of…","fields":{"slug":"/identity/ciam-role-enterprise-decision-making/"},"html":"<p>In an era, when every business is gearing up for a digital transformation journey to thrive productivity and scalability, the role of identity management can’t be overlooked.</p>\n<p>Whether we talk about user experience or data privacy and security, identity management can do wonders for online businesses striving for business growth.</p>\n<p>You might be thinking about identity management from a security perspective, and surprisingly, many of you won’t even consider its importance for your business.</p>\n<p>Well, leading <a href=\"https://www.loginradius.com/\">identity management software</a> are reinforcing online businesses by not just offering data security and privacy but eventually helping them increase their client base, get more subscriptions, and enhanced sign-ups.</p>\n<p>The way companies operate and present themselves in the digital world is perhaps the key to business success.</p>\n<p>Let’s learn how identity management is shaping decision-making for diverse enterprises.</p>\n<h2 id=\"consumer-experience\" style=\"position:relative;\"><a href=\"#consumer-experience\" aria-label=\"consumer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consumer Experience</h2>\n<p>With decision making at the users’ end becoming a matter of seconds, consumer identity and access management is the heart of delivering the best consumer experience.</p>\n<p>Believe it or not, if you’re able to offer the best consumer experience to your targeted audience, you’re almost on the verge of digitally transforming your business.</p>\n<p>With new rules, possibilities, and access management, digital technologies are paving the path for <a href=\"https://www.loginradius.com/customer-experience-solutions/\">superior user experience</a>, which is undoubtedly the need of the hour.</p>\n<p>The increasingly sophisticated audience now considers digital interactions as the sole mechanism for interacting with businesses and established brands and expects enhanced online relationships that are delivered seamlessly and modestly.</p>\n<p>In a nutshell, an enterprise cannot even think of digital growth without leveraging a consumer identity and access management solution, which helps brands deliver a flawless user experience without compromising on security.</p>\n<h2 id=\"data-privacy-and-security\" style=\"position:relative;\"><a href=\"#data-privacy-and-security\" aria-label=\"data privacy and security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data Privacy and Security</h2>\n<p>While the total number of data breaches rapidly surging across the globe, consumers do expect adequate control around how a business collects, stores, and manages its profile data.</p>\n<p>Since your competitors are just a click away, you need to ensure that you’re delivering the most secure environment to your audience and that too backed by a great user experience.</p>\n<p>Sure enough, you won’t expect your brand image gets tarnished just because you were unable to secure consumer data.</p>\n<p>There are many examples where industry leaders have to face losses worth millions due just because their clients’ data was exposed to unauthorized professionals.</p>\n<p>With a <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">consumer identity and access management (CIAM)</a> solution in place, a brand can be sure enough that their consumers’ data and privacy is secured.</p>\n<p>This not only helps in building trust over potential clients but eventually lends a hand in maintaining a brand image in the market.</p>\n<p>So, next time you’re thinking of delivering a rich consumer experience with the highest level of data security, get a CIAM in place.</p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"modern-customer-identity\"\n        title=\"modern-customer-identity\"\n        src=\"/static/04bf5e11f74fd31f8819d64573a1e02c/e5715/modern-customer-identity.png\"\n        srcset=\"/static/04bf5e11f74fd31f8819d64573a1e02c/a6d36/modern-customer-identity.png 650w,\n/static/04bf5e11f74fd31f8819d64573a1e02c/e5715/modern-customer-identity.png 768w,\n/static/04bf5e11f74fd31f8819d64573a1e02c/63ff0/modern-customer-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"consumer-on-boarding\" style=\"position:relative;\"><a href=\"#consumer-on-boarding\" aria-label=\"consumer on boarding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consumer On-Boarding</h2>\n<p>Admit it, if your potential client isn’t finding it easier to sign-up on your website or application, or unable to understand the value that you’ll offer, they’ll surely inch towards your competitors.</p>\n<p>Every product is unique, and how your business is going to handle the onboarding process will help you to know about your users, their needs, and how your product is going to stay with them.</p>\n<p>Once you get a client sign-up for your services, the next big step is to gather the information in a way that doesn’t hamper client experience.</p>\n<p>Since you can’t force your client or potential consumer to provide a lot of details in a single form, which always affects sign-up rates, you need a smart onboarding solution for the same.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/02/presenting-progressive-profiling-loginradius/\">Progressive profiling</a> in a CIAM solution through multi-step registration is proven to be a game-changer for businesses struggling with adequate traffic but no conversions.</p>\n<p>Progressive profiling for consumer registration and onboarding allows you to split a potentially complicated registration process into multiple easy steps. You can capture a client’s information upfront and then slowly build out a holistic view of that consumer through subsequent actions.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>The modern epoch has significantly offered new horizons to businesses for scaling growth while they walk on a path for digital transformation.</p>\n<p>Consumer identity and access management solutions help businesses achieve their goals through delivering a seamless user experience to their clients and ensuring the highest level of security.</p>\n<p>In simple words, a modern CIAM solution is undoubtedly paving the path for a rich consumer experience that leads to more subscriptions and sign-ups.  </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 11, 2021","updated_date":null,"description":"The increasingly sophisticated audience now considers digital interactions as the sole mechanism for interacting with brands. Let’s learn how an identity management solution helps these brands to deliver rich user experiences backed by adequate data security.","title":"The Changing Role of Identity Management in Enterprise Decision-Making","tags":["identity management","data security","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6129032258064515,"src":"/static/27185c21224cbd62c8935ac20e349c81/14b42/ciam-role-enterprise-decision-making-cover.jpg","srcSet":"/static/27185c21224cbd62c8935ac20e349c81/f836f/ciam-role-enterprise-decision-making-cover.jpg 200w,\n/static/27185c21224cbd62c8935ac20e349c81/2244e/ciam-role-enterprise-decision-making-cover.jpg 400w,\n/static/27185c21224cbd62c8935ac20e349c81/14b42/ciam-role-enterprise-decision-making-cover.jpg 800w,\n/static/27185c21224cbd62c8935ac20e349c81/16310/ciam-role-enterprise-decision-making-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"With cloud computing evolving leaps and bounds, enterprises are exploring new horizons to streamline processes and scale business growth…","fields":{"slug":"/identity/cloud-governance-business/"},"html":"<p>With cloud computing evolving leaps and bounds, enterprises are exploring new horizons to streamline processes and scale business growth.</p>\n<p>Since many businesses are inching towards cloud services, it’s becoming quite challenging for them to provide a governance model that not only provides visibility of every cloud service but eventually offers appropriate access with proper security.</p>\n<p>It would be great for businesses to learn about the fact that migrating from on-premises to cloud isn’t a piece of cake and requires an adequate governance model in place.</p>\n<p>You might be thinking about what governance model is and why your business requires it implemented within the organization.</p>\n<p>Well, just like on-premise IT infrastructure, companies relying on the cloud must have control over which apps or software can be accessed within the organization and by which department.</p>\n<p>In the cloud, the same can be implemented in a couple of seconds. To handle the overall efficiency and costs, businesses must have a certain set of rules.</p>\n<p>Let’s learn what cloud governance is and reasons to rely on cloud governance solutions for streamlined processes.</p>\n<h2 id=\"what-is-cloud-governance\" style=\"position:relative;\"><a href=\"#what-is-cloud-governance\" aria-label=\"what is cloud governance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Cloud Governance</h2>\n<p>Cloud governance could be defined as the set of rules and protocols that <a href=\"https://www.loginradius.com/blog/identity/2020/12/data-security-best-practices/\">enhance data security</a> and helps to manage risks to ensure smooth functioning in a cloud environment.</p>\n<p>With cloud governance in place, organizations can ensure that all the systems interactions along with access are precisely measured and managed without hampering the overall security.</p>\n<p>There are endless complexities whenever a business migrates from on-premise to cloud, which impacts the architecture as well.</p>\n<p>Cloud governance streamlines access for users with rules that simplify establishment, verification, and <a href=\"https://www.loginradius.com/blog/identity/2021/03/privacy-compliance/\">reinforces policy compliance</a>.   </p>\n<p>Here are the reasons why your business needs cloud governance:</p>\n<p><strong>1. Easy management of cloud resources.</strong></p>\n<p>One of the biggest advantages of cloud governance is the delivery of precise access control coupled with cost management without breaking the first line of defense.</p>\n<p>A strong governance strategy allows enterprises to organize multiple accounts and provide access as per their requirement and designation. This not only strengthens data security but also lends a hand in organizing and maintaining resource allocation on the cloud.</p>\n<p><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABbklEQVQY0z2QOU8CURSFiVFnmBGZRCAQAU0UxQEUkTDjsC8iiGDAxAU0IcSKxKWxEm2s+CVamWglNiZU2tjZmPhbjneejsXJW+5937nvmMwLCegSFpMQ/SlMGFpKsbNR18XPaxACOdjUOqaW8zAHC+D9aZh9cfB/PSYDZlspwCpnIOjnhTgmaW+PlCAFc+DpAYPSKhLEmzuEXNiHoDTAhYp0r/0aUp0BOXL2pRpI7p5A3WlDq3cQ2jiASEbWQJY16nKsFuFRKnBGinBENuGOluCOleFRt9lvGNBo9tJluNRCZOsIa6SZ9SoDSsHsv7tFTsNJkOlYhdU9ahWuaBl2MjJ+wYCiPwkLTcL5Ehid0zAyG8MYrQLlYyWgnqnJFUb3qo/Pr288PL/i7nGA+6cXDN8/MBi+MeNxemPSw2SThPIQKXBRzkKgXHhlD1K0BimQYc66iVJro9vro3V+jeZpD82zHjqXtzi+uGGmHA33A90sxCcku3zKAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Future-proof-your-security\"\n        title=\"Future-proof-your-security\"\n        src=\"/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png\"\n        srcset=\"/static/a164480ea3177cb0422ee6104202f8b3/a6d36/Future-proof-your-security.png 650w,\n/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png 768w,\n/static/a164480ea3177cb0422ee6104202f8b3/63ff0/Future-proof-your-security.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>2. Cloud governance minimizes compliance risk.</strong></p>\n<p>It doesn’t matter which industry vertical you serve, you need to conduct regular security and compliance audits and assessments. Cloud governance can help you in preparing a long list of compliances that are under security frameworks.</p>\n<p>Most businesses aren’t aware of data and security compliances, which is perhaps the reason they have to pay hefty fines whenever there are any legal consequences.</p>\n<p>It’s always a great decision to audit the compliances and implement the required compliances that can ensure data and privacy security for your clients and employees accessing data over the cloud.</p>\n<p><strong>3. Cloud governance reduces costs.</strong></p>\n<p>Gone are the days when you had to deploy a team that can manually track accounts, compliance, and costs. You can now leverage automation to control access, policy, and the overall budget for your specified projects.</p>\n<p>Apart from this, the governance solutions can provide enforcement actions that can further allow you to do the follow-ups whenever you receive an alert. This prevents non-compliant activities and saves time and effort as well.</p>\n<p><strong>4. Cloud governance improves security.</strong></p>\n<p>As an organization moves to the cloud, certain risks linked to data storage, maintenance, and retrieval arise. Here’s where cloud governance comes into play.</p>\n<p>Enterprises can be sure enough that their data is securely managed and stored in the cloud with certain protocols in place. This reduces the chances of employees and consumers inching towards shadow IT to get the job done as they would already have a solution for every issue.</p>\n<p>Organizations that are consistently worried regarding the concept of shadow IT and its consequences for their company can leverage cloud governance to avoid any similar issues.</p>\n<p><strong>5. Cloud governance regulates and monitors data access.</strong></p>\n<p>Another great aspect associated with cloud governance is that enterprises can regulate and monitor data access in real-time. This means if there’s unauthorized access to data stored over the cloud, the same would be reported to the admin in real-time.</p>\n<p>This enhances the overall data security and the admin can keep an eye on insignificant data access requests even within the organizational network.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Cloud governance should be the top-most priority for businesses leveraging <a href=\"https://www.loginradius.com/blog/identity/2021/02/strategies-secure-cloud-operations/\">cloud infrastructure</a> in today’s era as the data regulations are getting stringent day-by-day.</p>\n<p>The aforementioned aspects depict the role of cloud governance and how it lays the foundation of security and data access within an organization.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 07, 2021","updated_date":null,"description":"Security management platforms are designated systems that work towards providing network security to an enterprise for the storage of data that they have collected. This process involves security and compliance as well.","title":"5 Reasons Why Cloud Governance Matters For Your Business","tags":["cloud governance","compliance","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/2f5ee86519d1f7d59eeab6f238dba479/14b42/cloud-governance-business-cover.jpg","srcSet":"/static/2f5ee86519d1f7d59eeab6f238dba479/f836f/cloud-governance-business-cover.jpg 200w,\n/static/2f5ee86519d1f7d59eeab6f238dba479/2244e/cloud-governance-business-cover.jpg 400w,\n/static/2f5ee86519d1f7d59eeab6f238dba479/14b42/cloud-governance-business-cover.jpg 800w,\n/static/2f5ee86519d1f7d59eeab6f238dba479/16310/cloud-governance-business-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Did you know adding social login to your website can drastically enhance engagement and bump-up registrations? If you’re a business with an…","fields":{"slug":"/identity/social-authentication/"},"html":"<p>Did you know adding social login to your website can drastically enhance engagement and bump-up registrations?</p>\n<p>If you’re a business with an online platform that has a significant amount of traffic but unable to generate a good amount of leads, you probably need to rework your website’s authentication process.</p>\n<p>Yes, nobody wishes to squander their precious time when it comes to registrations on a website. Or we can say, no one wants to juggle separate passwords and ids for different platforms.</p>\n<p>Social login enables users to use existing login credentials from a social networking platform including Facebook, Google, Twitter, and more enabling simplified logins and registrations.</p>\n<p>Let’s learn how LoginRadius’ social authentication helps to scale business growth and how to implement social login.</p>\n<h2 id=\"why-social-login\" style=\"position:relative;\"><a href=\"#why-social-login\" aria-label=\"why social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Social Login?</h2>\n<p>While social login bypasses the conventional registration forms that eventually eat up a lot of time, it also builds credibility on an online service provider that is not asking for your details in a single go.</p>\n<p>Moreover, another hurdle for businesses seeking business growth through online platforms is the overall security of user data while the information is being collected, stored, and retrieved.</p>\n<p>One needs to follow the necessary compliances while collecting PII to ensure that the data is securely collected and managed.</p>\n<p>Apart from this, maintaining compliance with enhanced user experience is yet another uphill battle for businesses, especially when all it takes is a couple of seconds to decide whether you have a lead or an increase in the bounce rate of the site.</p>\n<p>Here’s the place where you need a smart and efficient social login in place.</p>\n<p>LoginRadius’ social authentication not only offers compliance to international privacy and data security regulations but eventually provides a smooth login experience.</p>\n<p>Users can quickly sign up for a platform in just a couple of seconds through LoginRadius’ social authentication solution.</p>\n<h2 id=\"why-loginradius-social-login\" style=\"position:relative;\"><a href=\"#why-loginradius-social-login\" aria-label=\"why loginradius social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why LoginRadius Social Login?</h2>\n<p>LoginRadius is the leading <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">consumer identity and access management (CIAM) </a>solution provider that has woven a trust among global clients ranging from startups to Fortune 500 enterprises.</p>\n<p>Our social authentication solution is helping diverse businesses securely manage millions of identities along and offering quick sign-ups without hampering user experience.</p>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social-login-wp\"\n        title=\"social-login-wp\"\n        src=\"/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-wp.png\"\n        srcset=\"/static/bf408b3bda215542fe05da49cb06b853/a6d36/social-login-wp.png 650w,\n/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-wp.png 768w,\n/static/bf408b3bda215542fe05da49cb06b853/63ff0/social-login-wp.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Let’s learn why LoginRadius is the one-stop-solution for your online platform:</p>\n<p><strong>1. Endless Connection Options - One Unified Social API</strong></p>\n<p>With LoginRadius, businesses can enjoy the benefits of social login and experience seamless connectivity with our unified social API.</p>\n<p>Our social authentication solution flawlessly combines the APIs of over 40 social networks that create a unified social API fully equipped to handle all the specific features of these platforms.</p>\n<p>This not only saves the time and efforts of the developers while they learn each network’s API but ultimately delivers a smooth implementation experience.</p>\n<p><strong>2. Maintenance - Free Solution</strong></p>\n<p>Since every social media platform keeps on rolling updates in their APIs, LoginRadius ensures every API is up-to-date.</p>\n<p>This enhances security and ensures that our clients and their consumers need not worry regarding any issues.</p>\n<p>LoginRadius’ social authentication is completely maintenance-free.</p>\n<p><strong>3. More than Just Login - A Wealth of First-Party Consumer Data</strong></p>\n<p>Enhance your marketing reach with complete access to your consumers’ social profile data that also includes verified email addresses, their interests, contacts, and much more.</p>\n<p>With LoginRadius’ <a href=\"https://www.loginradius.com/blog/identity/2021/02/social-login-infographic/\">social login</a>, you get endless marketing opportunities through which you can convert your visitors into buyers by leveraging real-time data with behavior analysis.</p>\n<p>Moreover, the data is collected from the user after their consent and you can have access to their contacts, addresses, interests, likes, and much more.</p>\n<p>Here’s the list of social profile data points that you can access through LoginRadius’ advanced social login platform.  </p>\n<p><strong>4. Easy to Manage Admin Console</strong></p>\n<p>LoginRadius not only offers the finest user experience to your clients while they sign-up but eventually delivers rich experience to the site owners through an intuitive admin console.</p>\n<p>With LoginRadius Admin Console, you get a single dashboard for social login, data gathering, and other social permissions. You can quickly set configurations through the dashboard and make changes including, but not limited to:</p>\n<p>· Add/remove social ID providers</p>\n<p>· Configure social ID</p>\n<p>· Choose which social data to gather from social networks</p>\n<p>· Quickly enable profile access and permissions</p>\n<p>· Set token expiration for each social id</p>\n<p><strong>5.Native Mobile Support and Responsive Apps</strong>   </p>\n<p>LoginRadius works harmoniously with mobile platforms and integrates natively. The smart login solution quickly detects consumer’s mobile app and authenticates without the need for any social credentials.</p>\n<p>This enables users to quickly sign-up for your application without the hassle of entering credentials for their social profiles.  </p>\n<p><strong>Final Thoughts</strong></p>\n<p>While social login inches towards the verge of becoming an industry standard for <a href=\"https://www.loginradius.com/blog/identity/2020/12/login-security/\">secure and quick login</a>, businesses need to understand its true potential in improving business growth.</p>\n<p>LoginRadius’ social authentication, driven by cutting-edge technology and backed by the highest level of security ensures clients get a seamless user experience that further improves conversion rate.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 07, 2021","updated_date":null,"description":"Social login enables users to use existing login credentials from a social networking platform including Facebook, Google, Twitter, and more enabling simplified logins and registrations. Let’s learn how LoginRadius simplifies social authentication and improves the overall user experience.","title":"Implementing Effective Social Authentication Solution with LoginRadius","tags":["social authentication","social login","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/63597f5ae5a331ddd6f0bdcc93b52fa6/14b42/social-authentication-cover.jpg","srcSet":"/static/63597f5ae5a331ddd6f0bdcc93b52fa6/f836f/social-authentication-cover.jpg 200w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/2244e/social-authentication-cover.jpg 400w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/14b42/social-authentication-cover.jpg 800w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/16310/social-authentication-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"While logging on to your social media account or a bank account online, there are several credentials you tend to feed in before being able…","fields":{"slug":"/identity/passwordless-magic-links/"},"html":"<p>While logging on to your social media account or a bank account online, there are several credentials you tend to feed in before being able to access your account. The process is a tad bit lengthy, and there are even chances of you mismatching or forgetting the passwords for a particular account. But with the help of passwordless magic links, these issues are easily resolved.</p>\n<h2 id=\"what-is-a-passwordless-magic-link\" style=\"position:relative;\"><a href=\"#what-is-a-passwordless-magic-link\" aria-label=\"what is a passwordless magic link permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What is a Passwordless Magic Link?</strong></h2>\n<p>A <strong>passwordless magic link</strong> allows you to log in directly with the help of a link that is received through an email. This process is similar to when you receive a one-time-password (OTP) though you might have to physically enter the OTP once you are redirected to the page or application. In the case of passwordless magic links, all you have to do is click on the link sent through an email, allowing you to log in directly.</p>\n<h2 id=\"how-magic-links-work\" style=\"position:relative;\"><a href=\"#how-magic-links-work\" aria-label=\"how magic links work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Magic Links Work?</strong></h2>\n<p>Passwordless magic links follow three steps that enable the user a hassle-free login. The three steps are as follows.</p>\n<ul>\n<li>When a consumer is about to log in/ sign in, they go to the sign-in screen and enter their email address.</li>\n<li>If the email address entered is a registered type, they will receive the magic link through the email provided.</li>\n<li>To complete the sign-in process, they have to click on the link received through the entered email.</li>\n</ul>\n<p>Optionally, they might be sent a live link during registration, which can be made use of eventually for authentication. </p>\n<p>It is similar to the password reset flow process, where you receive a secret link that allows you to sidestep the password and create a new one. </p>\n<p>The app designers have to follow a process and take out the password and any other approach to resetting protocols. Doing so ensures that you receive a one-time-use <strong><a href=\"https://www.loginradius.com/passwordless-login/\">passwordless magic link</a></strong> at the time of your login.</p>\n<p>The app designers or developers can program the link depending on whether the link should be valid for a particular time or for as long as the session is valid. After clicking on the link, the consumer’s information is verified, and a cookie is set up; this ensures that they stay logged in for the entire process of the session.</p>\n<p>Even though passwordless magic links display hundreds of password resets, consumers need not remember the password to access the account. Magic links are a user-friendly feature that ensures an inviting user experience without any hardware requirement.</p>\n<h2 id=\"pros-and-cons-of-magic-links\" style=\"position:relative;\"><a href=\"#pros-and-cons-of-magic-links\" aria-label=\"pros and cons of magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pros and Cons of Magic Links</h2>\n<h3 id=\"pros-of-magic-links\" style=\"position:relative;\"><a href=\"#pros-of-magic-links\" aria-label=\"pros of magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pros of Magic Links</h3>\n<ol>\n<li><strong>Enhanced User Experience</strong>: Magic links offer a seamless login experience, reducing friction and enhancing user satisfaction.</li>\n<li><strong>Improved Security</strong>: Magic links mitigate password-related risks like breaches and phishing, providing added security without compromising convenience.</li>\n<li><strong>Simplified Onboarding</strong>: Magic links streamline the signup process by eliminating the need for users to create and remember passwords.</li>\n<li><strong>Convenient Access</strong>: Users can access their accounts with a single click, making login across devices effortless.</li>\n<li><strong>Flexible Implementation</strong>: Magic links can be used across various platforms, making them versatile for applications.</li>\n</ol>\n<h3 id=\"cons-of-magic-links\" style=\"position:relative;\"><a href=\"#cons-of-magic-links\" aria-label=\"cons of magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cons of Magic Links</h3>\n<ol>\n<li><strong>Dependency on Email</strong>: Magic links rely on email delivery, which can be problematic if users have limited access or if emails are delayed.</li>\n<li><strong>Potential for Email Compromise</strong>: Email account security becomes crucial as magic links are sent via email, posing a risk if the account is compromised.</li>\n<li><strong>Lack of Control Over Link Sharing</strong>: Administrators may struggle to monitor and control link sharing, raising concerns about unauthorized access.</li>\n<li><strong>Limited Offline Access</strong>: Magic links typically require an internet connection for verification, posing challenges in offline scenarios.</li>\n</ol>\n<h2 id=\"how-can-organizations-use-magic-links\" style=\"position:relative;\"><a href=\"#how-can-organizations-use-magic-links\" aria-label=\"how can organizations use magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Can Organizations Use Magic Links?</strong></h2>\n<p>By opting to add the magic link feature to your mobile apps or email accounts, you are likely trying to make your mobile app or site user-friendly, contributing to a strong security strategy. Here are some reasons for which you can opt passwordless magic links.</p>\n<ul>\n<li><strong>Ideal for infrequent login demands:</strong> Passwordless magic link is provided at the beginning of each user session, verifying the user through a single-use basis. This type of magic link login implementation is well suited with mobile apps or the login process of an email account that require single or infrequent authentication, enabling easy access.</li>\n<li><strong>Prevent password-based attacks:</strong> Data breaches, hacking, and phishing are ever increasing in today's times. There is a major loss of necessary credentials, and magic link login security ensures the safety of the same by warding off security risks implicating passwords.</li>\n</ul>\n<h2 id=\"benefits-of-using-magic-links\" style=\"position:relative;\"><a href=\"#benefits-of-using-magic-links\" aria-label=\"benefits of using magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Using Magic Links</h2>\n<p>There are plenty of benefits of using a passwordless magic link. They are as follows -</p>\n<ul>\n<li><strong>Easy authentication, deployment, and use:</strong> When the user clicks the magic link, though the flow is similar to that of password reset, <strong><a href=\"https://www.loginradius.com/blog/identity/2020/10/loginradius-launches-passwordless-login-with-magic-link-or-otp/\">magic link login implementation</a></strong> includes some minor changes in the code at no extra cost.</li>\n<li><strong>Seamless onboarding:</strong> Earlier, logging into applications used to be more tedious than the present times as you would get a message through email or SMS. Only when the user clicks the required redirecting option would they be able to log in. The most feasible is the magic link alternative, where you need to enter your email address, and by clicking the link, you would be able to register for the app.</li>\n<li><strong>Increase app adoption</strong>: Any user would prefer a trouble-free login process. For instance, as soon as the user clicks the magic link, the process is completed. Since magic link login implementation reduces the troubles faced during the login process, it is possible to get a loyal and returning fanbase.</li>\n</ul>\n<h2 id=\"what-are-the-challenges-of-using-magic-links\" style=\"position:relative;\"><a href=\"#what-are-the-challenges-of-using-magic-links\" aria-label=\"what are the challenges of using magic links permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What are the Challenges of Using Magic Links?</strong></h2>\n<p>Though there are numerous benefits of using a passwordless magic link, there are some challenges that particularly come with security blind spots. Magic links may help secure the transfer of information, ensuring the valid identity of the user. But since the security is tied with the user's account, it is wise that the email account is protected with multi-factor authentication. </p>\n<p>Another challenge you might face with magic link apps is that the admins have no control over link sharing. Regardless of the user, admins are unable to keep track of the confidential or sensitive information shared with others. Apart from these challenges the major one is the increased cyber-attacks with nearly <a href=\"https://thepaypers.com/thought-leader-insights/goodbye-passwords-passwordless-authentication-is-here-to-stay--1245019\">7K global data breaches </a>in 2019 that risked about 15 billion user records.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-Product-Passwordless-Login-1024x310\"\n        title=\"DS-Product-Passwordless-Login-1024x310\"\n        src=\"/static/4a7ab097b9cc29def32540d76bfac344/e5715/DS-Product-Passwordless-Login-1024x310.png\"\n        srcset=\"/static/4a7ab097b9cc29def32540d76bfac344/a6d36/DS-Product-Passwordless-Login-1024x310.png 650w,\n/static/4a7ab097b9cc29def32540d76bfac344/e5715/DS-Product-Passwordless-Login-1024x310.png 768w,\n/static/4a7ab097b9cc29def32540d76bfac344/2bef9/DS-Product-Passwordless-Login-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"examples-of-when-magic-links-are-used\" style=\"position:relative;\"><a href=\"#examples-of-when-magic-links-are-used\" aria-label=\"examples of when magic links are used permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Examples of When Magic Links Are Used</h2>\n<ol>\n<li><strong>Mobile Applications</strong>: Productivity tools, social media, and banking apps offer magic link authentication for simplified login.</li>\n<li><strong>Email Services</strong>: Some email providers use magic links instead of passwords to enhance email account security.</li>\n<li><strong>Online Marketplaces</strong>: E-commerce platforms use magic links for user authentication during registration and login.</li>\n<li><strong>Enterprise Applications</strong>: Many organizations adopt magic links for internal systems to streamline access management and enhance security.</li>\n</ol>\n<h2 id=\"why-is-loginradius-passwordless-magic-link-is-preferred-over-others\" style=\"position:relative;\"><a href=\"#why-is-loginradius-passwordless-magic-link-is-preferred-over-others\" aria-label=\"why is loginradius passwordless magic link is preferred over others permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why is LoginRadius' Passwordless Magic Link is Preferred Over Others?</strong></h2>\n<p>LoginRadius's passwordless magic link enables the user a safe and secure transfer of information. It makes sure that the user's login credentials stay guarded against hacking, phishing, and other fraudulent practices. </p>\n<p>The intent behind the launch of the LoginRadius passwordless magic link is to reduce friction during the registration and login processes. Other business advantages include: </p>\n<ul>\n<li><strong>Consumer experience is streamlined</strong>: One-step registration and login reduce friction for consumers. Furthermore, consumers do not need to create or remember passwords to access their accounts.</li>\n<li><strong>Consumers are aware</strong>: This form of authentication is quickly becoming one of the most common trends among consumers. </li>\n<li><strong>Account security is increased</strong>: Since a magic link is created dynamically and sent to the recipient upon request, it removes the risk of password attacks.</li>\n<li><strong>Adaptive security is improved</strong>: As an adaptive protection measure for your consumers, you can pre-define the Magic Link expiry period and disable account access after the set period. </li>\n</ul>\n<p>Depending on your business requirements, LoginRadius also supports a variety of implementation and deployment methods.</p>\n<ul>\n<li>After completing all configurations, you can use the pre-designed Passwordless Login with Magic Link with LoginRadius' <strong>Identity Experience Framework</strong>.</li>\n<li>Using the LoginRadius <strong>JavaScript Libraries</strong>, you can create an embedded Passwordless Login with Magic Link.</li>\n<li>You can build on and change the code in the open-source <strong>web and mobile SDKs</strong> to meet your specific needs. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Magic links may not be one of the most reliable means of logging in, but it is undoubtedly a convenient means for <a href=\"https://www.loginradius.com/blog/identity/2021/04/maintaining-quality-data-security-practices/\">users to log in to their accounts</a>. In today’s fast-paced times, any sort of validation needs to be done with immense meticulousness, and to cater to this need; a passwordless magic link is the right solution. </p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1.  What is a magic link?</strong></p>\n<p>A magic link is a secure authentication method that allows users to log in by clicking on a unique link sent to their email, eliminating the need for passwords.</p>\n<p><strong>2. How does the magic link work?</strong></p>\n<p>Users enter their email, receive a link, and click to access their account, streamlining the login process and enhancing security.</p>\n<p><strong>3. Are magic links safe?</strong></p>\n<p>Yes, magic links enhance security by mitigating password-related risks like breaches and phishing, offering a secure authentication alternative.</p>\n<p><strong>4. How do you make a magic link?</strong></p>\n<p>Developers program the system to generate a one-time-use magic link upon user request, ensuring secure authentication without passwords.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 05, 2021","updated_date":null,"description":"By opting to add the magic link feature to your mobile apps or email accounts, you are likely trying to make your mobile app or site user-friendly, contributing to a strong security strategy. Here are some reasons for which you can opt passwordless magic links.","title":"The Future of Authentication is Passwordless With Magic links","tags":["passwordless login","authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/f0ccb193ae49ca1feb33a60d08d3810b/14b42/passwordless-magic-links-cover.jpg","srcSet":"/static/f0ccb193ae49ca1feb33a60d08d3810b/f836f/passwordless-magic-links-cover.jpg 200w,\n/static/f0ccb193ae49ca1feb33a60d08d3810b/2244e/passwordless-magic-links-cover.jpg 400w,\n/static/f0ccb193ae49ca1feb33a60d08d3810b/14b42/passwordless-magic-links-cover.jpg 800w,\n/static/f0ccb193ae49ca1feb33a60d08d3810b/16310/passwordless-magic-links-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"It is a principle that encompasses every aspect of information security from the physical sense of hardware and storage devices to…","fields":{"slug":"/identity/maintaining-quality-data-security-practices/"},"html":"<p>It is a principle that encompasses every aspect of information security from the physical sense of hardware and storage devices to administrative and access controls. Also, the logical security of software applications, organizational policies, and procedures.</p>\n<p>When implemented well, <a href=\"https://www.loginradius.com/security/\">data security</a> policies protect an organisation's information possessions and resources against cybercriminal activities. They also protect against human error and any possible internal threats, which tend to be the leading causes of data breaches today.</p>\n<p>There are a variety of tools and technologies that can enhance an organisation's existing data, how it's used and how critical it is. The data security tools should be able to protect sensitive files while also adhering to regulatory requirements.</p>\n<p>The steps to make towards better data security include multi-factor authentication, strict permissions, updating your security, encryption, and the importance of training all those that have access to it.</p>\n<p>Read more about these below on how businesses such as <a href=\"https://www.platincasino.com/ie/home.html\">Platincasino Ireland</a> and others alike take the necessary precautions to make sure their data and those visiting their sites are kept as secure as possible.</p>\n<h2 id=\"5-ways-to-keep-consumer-data-secure\" style=\"position:relative;\"><a href=\"#5-ways-to-keep-consumer-data-secure\" aria-label=\"5 ways to keep consumer data secure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Ways to Keep Consumer Data Secure</h2>\n<p><strong>1. Implement Multi-Factor Authentication</strong></p>\n<p>A form of digital data security includes multi-factor authentication which is a method that requires users to provide two or more verification factors to get access to a resource such as an application, an online account or even VPN software.</p>\n<p>Instead of asking just for a username and a password, multi-factor authentication needs one or more verification factors. This helps to lessen the probability of cyber-attacks being successful. The use of multi-factor authentication is important because it strengthens and improves an organisation's security by requiring users to distinguish themselves with more than just a simple username and weak passwords.</p>\n<p>It's not uncommon for businesses to face security risks due to employee’s weak passwords or the use of the same password for multiple accounts which leaves organisations vulnerable to breaches. Having said that, multi-factor authentication helps with these challenges while also assisting employees in safely managing different accounts. This also provides organisations more control over identity management and achieving legal compliance with data regulations.</p>\n<p>It's highly recommended to implement <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a>  because it can reduce the likelihood of being attacked by a cyber-criminal.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"mfa\"\n        title=\"mfa\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/Multi-Factor-Authentication.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/Multi-Factor-Authentication.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/Multi-Factor-Authentication.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/Multi-Factor-Authentication.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>2. Strict Permissions</strong> </p>\n<p>Another important aspect of data protection and security is to keep the list of people who have access to it short. Permissions should remain as short and direct as possible to ensure that keeping data safe and secure is manageable.</p>\n<p>If you think about it, access control and strict permissions are a part of everyday life in one way or another and it's an important aspect of data security for businesses. The reason being is that it controls who has access to what resources and limits those who shouldn't or don't need access to certain aspects.</p>\n<p>Following this principle means that access to databases, networks and administrative accounts should be granted to as few people as possible and only to those who need it to get their jobs done. By doing this, users have the rights and access to the information that they need to get their jobs done without allowing access to information that they do not need. This is an important step in providing data security and managing control over who has access to what.</p>\n<p>Additionally, this helps organisations to remain compliant with industry standards and regulations by limiting the potential risks associated with data exposure. With less access to important information by fewer people, the less likely it is that this information will be exposed through inside threats or online compromises.</p>\n<p><strong>3. Update your security</strong>  </p>\n<p>Another way to keep your data safe is by updating your security regularly so that you can be ahead of any threats that may come your way. Properly updating your computer is how you can ensure that your data is protected. Because hackers love a good software flaw and are always adapting their strategies to exploit weaker software versions, it is highly recommended to update applications regularly since they are only as good as their most recent update.</p>\n<p>If a hacker manages to get through, this can infect your whole system with high chances that they can gain control over your computer and encrypt your files while stealing any data they can access. With your information, they can commit several harmful <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">cyber-crimes</a>, or they could sell your data on the dark web.</p>\n<p>It's best to avoid this which is why updating your software is so important for data protection as updates usually come with what is called a 'software patch' which covers the security holes that help to keep hackers out.</p>\n<p>As always, keep in mind that you should always have a backup of your data to ensure you don't run into any conflicts or loss of information during regular software updates.</p>\n<p><strong>4. Encrypt your data</strong>  </p>\n<p>To make sure that data on mobile devices is trustworthy and secure is through format encryption. This is the process through which data is encoded so that it is inaccessible to unauthorised users and helps to protect sensitive data and private information. <a href=\"https://us.norton.com/internetsecurity-privacy-what-is-encryption.html\">Encryption</a> can also improve the security of communication between servers and client apps.</p>\n<p>Encrypting data is pretty straightforward. An algorithm is required to translate (encode) plaintext or readable data into unreadable data or what's known as ciphertext. Then, the only way to <a href=\"https://www.loginradius.com/blog/engineering/read-and-write-in-a-local-file-with-deno/\">decode the text</a> into readable text is with a corresponding decryption key from authorised users. If the encryption is effective, data should be protected and unreachable from any unauthorised access.</p>\n<p>Although encryption is basic, it's an essential aspect of data security. Organisations must do all that they can to protect their customer's information online as well as their own. Hence, why it's becoming more and more common for technology encryption to be activated on apps and websites.</p>\n<p><strong>5. Make sure everyone who has access is trained</strong>  </p>\n<p>Apart from all the processes and techniques mentioned above, it's also a good idea to ensure that any employee who has access to sensitive or important data is adequately trained to maintain safe practices.</p>\n<p>Teaching and training employees on the importance of good security measures, password dynamics and assisting them in recognising potential attacks can play a huge role in keeping your data safe throughout.</p>\n<p>There are various ways that organisations can create security awareness through training programmes to educate employees and users on the importance of data sensitivity and security. If employees are aware of the dangers that are out there and the importance of keeping data as secure as possible, they will assist in looking out for any potential threats while also making sure to update their software.</p>\n<p>Therefore, educating and training employees is important as it ensures that everyone is on the same page and it helps to inform them on how to contribute to the security of data information and can phish out any potentially harmful and compromising cyber-attacks.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>To conclude, as technology advances and more activities are being processed in the digital space, it’s becoming more and more important to keep data private and secure. There are several ways organisations can do this; some of which are easy to implement while others may take more time, resources, and focus than others.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 30, 2021","updated_date":null,"description":"Data security is important for businesses today, more than it ever was. By definition, data security is the practice of protecting digital information from unauthorised access, cyber corruption or theft.","title":"Maintaining Quality Data Security Practices","tags":["data security","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8181818181818181,"src":"/static/c7bcc2007b972ca764d57dd9c7ffc631/14b42/data-security-loginradius.jpg","srcSet":"/static/c7bcc2007b972ca764d57dd9c7ffc631/f836f/data-security-loginradius.jpg 200w,\n/static/c7bcc2007b972ca764d57dd9c7ffc631/2244e/data-security-loginradius.jpg 400w,\n/static/c7bcc2007b972ca764d57dd9c7ffc631/14b42/data-security-loginradius.jpg 800w,\n/static/c7bcc2007b972ca764d57dd9c7ffc631/47498/data-security-loginradius.jpg 1200w,\n/static/c7bcc2007b972ca764d57dd9c7ffc631/0e329/data-security-loginradius.jpg 1600w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"User experience backed by security is all that a business needs to focus on in today’s era when consumers are always on a hunt for better…","fields":{"slug":"/identity/handling-scalability-security-loginradius/"},"html":"<p>User experience backed by security is all that a business needs to focus on in today’s era when consumers are always on a hunt for better experiences without any threat to their identities and personal data.</p>\n<p>LoginRadius understands the importance of a secure and flawless experience for consumers, especially amid the global pandemic when everyone is online and the number of data breaches is substantially increasing.</p>\n<p>Since consumers and businesses have transitioned to online platforms amidst the global crisis, there’s a huge possibility that the number of logins and the creation of new accounts will surge.</p>\n<p>Without a highly scalable infrastructure to handle the increasing account creations and logins, peak loads can dramatically impede performance and can also hamper consumer experience.</p>\n<p>For this, you need to ensure you have a robust identity solution that grows at the same pace.  </p>\n<p>Here’s LoginRadius for you. A leading CIAM solution provider that empowers businesses to deliver a secure and delightful user experience to their clients through its comprehensive and scalable consumer identity and access management platform.</p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABc0lEQVQY002RO08CQRSFiYXArmEhgAIioAgsLBheLq9dVmRFBFGjhVHBmNhpgjY2Bmys/CVamWhjpDDRShs7Gwv/ynFmCAnFzZ2Ze+a798wYzGEFNLiIAl5UMSWWWeZJ5iIqRnUapsUiOKkKR34H9qUqzHEdJlGDKVQiMdQYhjAVzrgGh1iCsJiDJShjJlGBJ12DVVphFxiUZJ5AfKsHiOn74ORdGBM1cOFhneoY0EgWoUIT2lYHaqsNSWmB96chELBV0lid6tzZDXjlBjyZdbgydXizdbaflZsQSGOqM7Bxidib0iEWGogRWCCtQ1hYhoWEjU44ZtuZXIM318RcfhO+Qos1oc8zcsGA9MAWIe/jS7HJ7MS6NVqGZT4La6zM6gZ3Eue9O/z8/uHx5Q33T694eB7g/esbg49PCPEKJoPFMSCB8AToiCpwJXVMl4/h37tmlmnniYCM3PYJzgi0fdHHYbeHo24fp1e36FzesM+klv8BIh7Cv8YBwbcAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"modern-ciam\"\n        title=\"modern-ciam\"\n        src=\"/static/04bf5e11f74fd31f8819d64573a1e02c/e5715/modern-ciam.png\"\n        srcset=\"/static/04bf5e11f74fd31f8819d64573a1e02c/a6d36/modern-ciam.png 650w,\n/static/04bf5e11f74fd31f8819d64573a1e02c/e5715/modern-ciam.png 768w,\n/static/04bf5e11f74fd31f8819d64573a1e02c/63ff0/modern-ciam.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Let’s understand how LoginRadius handles scalability with the ability to cater to 5-10x more users with the highest level of security.</p>\n<p><strong>A Robust Cloud Infrastructure</strong></p>\n<p>With 100% uptime and 35 data centers across the globe,<a href=\"https://www.loginradius.com/blog/engineering/effective-cloud-management-platform/\"> LoginRadius’ cloud-based platform</a> can scale to 100s of millions of users in a couple of seconds.</p>\n<p>This is perhaps the reason why global leaders including Fortune 500 companies and startups with hundreds of millions of users rely on us.</p>\n<p><strong>Auto-scalable Infrastructure</strong></p>\n<p>No business can give precise predictions regarding the upsurge in their number of daily signups or subscriptions in today’s era when the internet has become the second home for most of us.</p>\n<p>Thus, businesses need to understand the importance of a robust and scalable CIAM solution that can handle a sudden rush in the number of logins or sign-ups without hampering the user experience.</p>\n<p>With LoginRadius, you can be sure enough to deliver the best user experience to your existing clients and potential subscribers as our cloud infrastructure automatically scales to accommodate swiftly changing loads of data storage, account creation, consumer authentication, new application deployment, and more.</p>\n<p><strong>Organizational Level Licensing</strong></p>\n<p>With LoginRadius’ advanced CIAM solution, enterprises can leverage a single corporate license that ensures the platform can flawlessly scale across your organization’s web and mobile applications, offering availability through subsidiaries and geographic locations.</p>\n<p>The innovative solution crafted to deliver a seamless experience across your organization’s web and mobile application helps in delivering a rich user experience to your consumers every time they use their website/ application to log in or sign-up.</p>\n<p><strong>Platform Security</strong></p>\n<p>LoginRadius offers endless solutions that enhance the overall security of your platform. Whether it’s account verification workflow or validating the provided identity, everything is backed by a highly secure infrastructure.</p>\n<p>Apart from this, businesses must ensure that their clients’ data is efficiently and securely handled, especially when a huge number of identities get stolen daily.</p>\n<p>To safeguard your clients’ identities and personal details, LoginRadius ensures you get compliance with all the necessary data privacy and security regulations including EU’s GDPR and CCPA.</p>\n<p>Data security and privacy are ensured through a built-in web application firewall along with cryptographic hashing algorithms that further reinforce clients’ data security.</p>\n<p>Moreover, with industry-standard authentication methods and security features including <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication (MFA)</a>, risk-based authentication (RBA), and geo-fencing LoginRadius has woven a trust over clients.  </p>\n<p><strong>Innovative Technology Infrastructure</strong></p>\n<p>Businesses can rely on the cutting-edge technology offered by LoginRadius that helps every enterprise regardless of the industry and domain to deliver rich consumer experiences backed by the highest level of data and privacy security. Here’s what LoginRadius’ innovative CIAM offers:</p>\n<ul>\n<li><strong>Scalable Users:</strong> LoginRadius’ smart infrastructure auto-scales to accommodate your increasing client base. We ensure there’s no cap on the number of users or subscribers so that there’s no limitation to your business growth.</li>\n<li><strong>Scalable Applications:</strong> LoginRadius’ identity platform scales automatically to handle multiple applications. Hundreds of applications can be handled whether they’re web, smart TV, mobile, gaming console, and so on.</li>\n<li><strong>Scalable Storage:</strong> Data storage is perhaps the biggest challenge among businesses seeking online growth. With LoginRadius’ CIAM, you can seamlessly handle incremental data storage from registered consumers since the LoginRadius Cloud Directory scales automatically and that too in real-time, every time.</li>\n<li><strong>Scalable Peak Load:</strong> Since large client bases necessitate frequent and substantial peak loads of login and account creation activity, LoginRadius’ infrastructure swiftly scales to meet the ever-increasing demands.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>A robust consumer IAM solution is the need of the hour for businesses delivering online services and catering to a huge client base.</p>\n<p>The solution must ensure adequate security for both the clients and enterprise data to avoid any chance of security threat without hampering the overall user experience.</p>\n<p>LoginRadius is the leading CIAM solution provider that not only empowers businesses to deliver a rich user experience but eventually offers a robust and highly secure infrastructure that ensures the utmost level of <a href=\"https://www.loginradius.com/blog/identity/2021/03/privacy-compliance/\">data and privacy security</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 30, 2021","updated_date":null,"description":"Without a highly scalable infrastructure, it is not possible to handle increasing account creations and logins. Even peak loads can dramatically impede performance and degrade the consumer experience for any business. Learn how LoginRadius empowers businesses to deliver a secure and delightful user experience to their consumers.","title":"Handling Scalability and Enhancing Security with LoginRadius","tags":["data security","ciam platform","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/7313f8e38afd2c9efe419124dac7491d/14b42/handling-scalability-security-loginradius-cover.jpg","srcSet":"/static/7313f8e38afd2c9efe419124dac7491d/f836f/handling-scalability-security-loginradius-cover.jpg 200w,\n/static/7313f8e38afd2c9efe419124dac7491d/2244e/handling-scalability-security-loginradius-cover.jpg 400w,\n/static/7313f8e38afd2c9efe419124dac7491d/14b42/handling-scalability-security-loginradius-cover.jpg 800w,\n/static/7313f8e38afd2c9efe419124dac7491d/16310/handling-scalability-security-loginradius-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":258,"currentPage":44,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}