{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/50","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"In the present era, people have become more reliant on technology, especially social media. Many people use different devices and platforms…","fields":{"slug":"/identity/continuous-authentication/"},"html":"<p>In the present era, people have become more reliant on technology, especially social media. Many people use different devices and platforms to remain connected with their office work and friends. Furthermore, people nowadays can also access their social and work accounts anytime and anywhere as long as they remember their login details and authenticate themselves to the system. </p>\n<h2 id=\"continuous-authentication---what-is-it\" style=\"position:relative;\"><a href=\"#continuous-authentication---what-is-it\" aria-label=\"continuous authentication   what is it permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Continuous Authentication - What is it</h2>\n<p>Continuous authentication can be regarded as a confirmation process directed at rendering identity verification and cybersecurity safeguard on an open-ended basis. This process estimates the likelihood that the discrete network users are the ones who they claim to be throughout an entire session. However, the method of continuous authentication is fairly new. </p>\n<p>Previously, we had static authentication, where the individuals just had to enter their login credentials in the system to log on to any application. The system then evaluates the entered credentials and matches those credential stuffing in the database. If the credentials match the details in the database, the system grants access to the users by successfully authenticating their credentials. However, this static content authentication has become less secure in the present times, where online frauds have become more technological. </p>\n<p>In 2018 alone, almost <a href=\"https://www150.statcan.gc.ca/n1/pub/89-28-0001/2018001/article/00015-eng.htm\">57% of Canadian internet users</a> experienced some form of a cybersecurity incident. Fast forward to pandemic-induced work-from-home months; 3 out of 10 organizations in Canada faced increased cybersecurity attacks. These increased online frauds have called for a more secure authentication process.</p>\n<p>This is where continuous authentication comes into the limelight. It has brought a novel perspective to network protection, and the response it has earned continues to illustrate the significance organizations append to their network security these days. </p>\n<p>Apart from this, continuous authentication can assist an organization in defending itself from online swindlers. They attempt to take over the online session right after when the user has finished using them. This continuous authentication further assists in securing a network from <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing</a> and stuffing threats. </p>\n<h2 id=\"how-continuous-authentication-operates\" style=\"position:relative;\"><a href=\"#how-continuous-authentication-operates\" aria-label=\"how continuous authentication operates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Continuous Authentication Operates</h2>\n<p>Continuous user authentication operates based on user behavior and tries to authenticate a user based on that and has always remained an indispensable element of cybersecurity. </p>\n<p>However, with the advent of time, this authentication has grown rapidly from employing a complex password to password-less authentication for user access using methods like facial recognition, biometric authentication, and many more authentication scores. </p>\n<p>In the present times, it may seem like all these methods are also not sufficient due to the upsurging in cybercrimes, and the session imposters have become far more advanced. However, the developers have started employing continuous authentication in the network to make these methods more secure. </p>\n<p>There are numerous means that the system uses for continuous authentication. Mentioned below are some of the most common verification types that continuous authentication employs for its hassle-free operation.  </p>\n<p><strong>1. Biometric authentication</strong></p>\n<p>Biometric authentication is deemed as the most secured authentication method that a system uses. Mentioned here are some of the advantages of biometric authentication: </p>\n<ul>\n<li>Physiological features can be efficiently analyzed to authorized characteristics accumulated in a database. </li>\n<li>Physical access can also be controlled on various entrances with the help of biometric authentication. </li>\n<li>Biometric authentication can also be utilized and incorporated in two-factor authentication. </li>\n</ul>\n<p>An instance of the importance of continuous authentication using behavioral biometrics can be a situation when a user puts a two-factor authentication in their system, contemplating that this is the most secured level of authentication that they can use to protect their system. </p>\n<p>However, this two-factor authentication can also be easily hacked by the session imposters, and this is the reason why numerous reputed companies and government agencies utilize continuous authentication for a more secured network. </p>\n<p>Biometric authentication technology is utilized by numerous organizations, government, military, and other important departments that are in need of continuous authentication for protecting their networks. Some of the most common biometric and continuous authentications comprise: </p>\n<ul>\n<li><strong>Physical movement</strong></li>\n</ul>\n<p>In this kind of continuous authentication, the system can easily track the bodily movement of a user, like how a person uses their mouse pointers, the velocity of the mouse cursor, and many other factors to authenticate a user. </p>\n<p>An example of this kind of continuous authentication can be large multinational companies that employ this authentication to track the movement of their employees. </p>\n<p><a href=\"https://www.loginradius.com/resource/continuous-authentication-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"continuous-authentication-whitepaper\"\n        title=\"continuous-authentication-whitepaper\"\n        src=\"/static/10483414f418f9ae619c49546072cc20/e5715/continuous-authentication-whitepaper.png\"\n        srcset=\"/static/10483414f418f9ae619c49546072cc20/a6d36/continuous-authentication-whitepaper.png 650w,\n/static/10483414f418f9ae619c49546072cc20/e5715/continuous-authentication-whitepaper.png 768w,\n/static/10483414f418f9ae619c49546072cc20/63ff0/continuous-authentication-whitepaper.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>Facial recognition</strong></li>\n</ul>\n<p>In this kind, the system saves the face of the user in the database and hence, will require facial recognition every time the user wishes to use the system interface. </p>\n<ul>\n<li><strong>Behavioural attributes</strong></li>\n</ul>\n<p>Behavioral patterns are a kind of continuous authentication method where the system identifies some behavioral traits like typing speed, finger pressure on the mouse, etc., for authenticating them.  </p>\n<ul>\n<li><strong>Voice recognition</strong></li>\n</ul>\n<p>This process is the most helpful in the case of banks or any other organization that has a lot of over-the-call interaction. This method of authentication verifies users based on their voice. </p>\n<p><strong>2. Authentication with passwords</strong></p>\n<p>Passwords are considered one of the most prevalent ways of continuous authentication. These are a combination of letters, numbers, strings or any special character that a person uses to protect their network. It is extremely important to <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">create strong passwords</a> that use all the above-mentioned combinations to give additional security to your network. However, nowadays, these passwords have become more prone to various phishing acts as they can be easily hacked by cybercriminals. </p>\n<p>The main reason for passwords losing their effectiveness is due to the fact that many people employ similar passwords for all their accounts as they think they would not be able to remember a different password for every online account. Using similar passwords can easily help imposters hack into a system. Hence, it is advisable that people must use strong and different passwords for all their online accounts to prevent themselves from all fraudulent activities.  </p>\n<p><strong>3. Authentication based on certificate</strong></p>\n<p>In this method, the system uses digital certificates to identify its users. A digital certificate can be defined as a digital document that works as a consumer’s license to the system. It carries a key that holds the consumer’s digital signature and is only issued by a certification official. This certification-based authentication system is a more secure way of signing in to a system. </p>\n<p>The use of certificate-based continuous authentication can be seen in software development companies where there is a more threat to data and its privacy. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 51.07692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"continuous-authentication-1\"\n        title=\"continuous-authentication-1\"\n        src=\"/static/2d531e359126d6ce37abf0cc0c630fd4/e5715/continuous-authentication-1.png\"\n        srcset=\"/static/2d531e359126d6ce37abf0cc0c630fd4/a6d36/continuous-authentication-1.png 650w,\n/static/2d531e359126d6ce37abf0cc0c630fd4/e5715/continuous-authentication-1.png 768w,\n/static/2d531e359126d6ce37abf0cc0c630fd4/d0143/continuous-authentication-1.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"all-about-loginradius-continuous-authentication-solution\" style=\"position:relative;\"><a href=\"#all-about-loginradius-continuous-authentication-solution\" aria-label=\"all about loginradius continuous authentication solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>All About LoginRadius' Continuous Authentication Solution</h2>\n<p>If you are perplexed in choosing an authentication system for your networks, you can choose LoginRadius' authentication options without batting an eyelid. The continuous authentication solutions provided by LoginRadius comprises of various methods to cater to the needs of various enterprise and users that are stated below: </p>\n<ul>\n<li><strong>Smart login</strong></li>\n</ul>\n<p>In this smart login continuous authentication method provided by LoginRadius, consumers or enterprises can easily log in with a smart net server without actually logging-in to a domain for additional security. </p>\n<ul>\n<li><strong>One-touch login</strong></li>\n</ul>\n<p>The consumer is not required to enter the password every time they log on to a system with this method, subduing the threat from entering passwords multiple times.</p>\n<ul>\n<li><strong>Multi-factor authentication</strong></li>\n</ul>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication</a> allows users to add various layers of protection to their data. This method requires additional authentication other than a password, including a mobile code, captcha verification, fingerprint, etc.</p>\n<ul>\n<li><strong>Social login</strong></li>\n</ul>\n<p>In this method, individuals can sign up for their work or social media accounts from a third-party website rather than logging it from their system to protect them from cybercriminals.</p>\n<p>All these <strong>authentication methods are provided by LoginRadius make the login and authentication</strong> process more effortless for your users and further assist you in creating a more solid client base and keeping your data safe and secured. The technology of authentication is constantly changing and evolving.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Many businesses have progressed ahead of password-based authentication and embraced the technology of continuous authentication to intensify the client experience on their network and keep their data secured. <a href=\"https://www.loginradius.com/blog/identity/2021/01/what-is-iam/\">Access management</a> has become easier, and also the need for remembering complex passcodes has diminished with this method. Moreover, continuous authentication systems like biometrics further prevent a data breach in the form of cybercrime. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 03, 2021","updated_date":null,"description":"Continuous authentication estimates the likelihood that the discrete network users are the ones who they claim to be throughout an entire session. However, the method of continuous authentication is fairly new and has brought a novel perspective to network protection these days.","title":"What is Continuous Authentication","tags":["continuous authentication","biometric authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.2738853503184713,"src":"/static/036a8e8748438acb126cb21d9e87c910/14b42/continuous-authentication-cover.jpg","srcSet":"/static/036a8e8748438acb126cb21d9e87c910/f836f/continuous-authentication-cover.jpg 200w,\n/static/036a8e8748438acb126cb21d9e87c910/2244e/continuous-authentication-cover.jpg 400w,\n/static/036a8e8748438acb126cb21d9e87c910/14b42/continuous-authentication-cover.jpg 800w,\n/static/036a8e8748438acb126cb21d9e87c910/16310/continuous-authentication-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"What is Brute Force Attack Brute Force is a hacking technique used to find out the user credentials by trying out possible credentials.  So…","fields":{"slug":"/identity/brute-force-lockout/"},"html":"<h1 id=\"what-is-brute-force-attack\" style=\"position:relative;\"><a href=\"#what-is-brute-force-attack\" aria-label=\"what is brute force attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Brute Force Attack</h1>\n<p>Brute Force is a hacking technique used to find out the user credentials by trying out possible credentials. </p>\n<p>So in brute force attacks, you are not exploiting any vulnerability in the web application. Instead, you are trying all the possible combinations and permutations of passwords and usernames of the victim and trying to see if you get any of those right. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 49.07692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"What is bruteforce\"\n        title=\"What is bruteforce\"\n        src=\"/static/6a9511bfec2c6fcc50f5807c5328860b/212bf/what-is-bruteforce.jpg\"\n        srcset=\"/static/6a9511bfec2c6fcc50f5807c5328860b/6aca1/what-is-bruteforce.jpg 650w,\n/static/6a9511bfec2c6fcc50f5807c5328860b/212bf/what-is-bruteforce.jpg 768w,\n/static/6a9511bfec2c6fcc50f5807c5328860b/98b09/what-is-bruteforce.jpg 1301w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-brute-force-works\" style=\"position:relative;\"><a href=\"#how-brute-force-works\" aria-label=\"how brute force works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Brute Force works</h2>\n<p>Attackers use a tool to which they feed the username and password—may be one username and a <a href=\"https://www.loginradius.com/blog/identity/2019/12/worst-passwords-list-2019/\">list of passwords</a> or a list of usernames and a list of passwords.</p>\n<p>Thereafter, the tool sends the combinations of these usernames and passwords to the web application where credentials are checked and depending on the response of the application, the tool decides whether the credentials were right or wrong/incorrect.</p>\n<p>If the login is successful, then the username and password combination is considered as correct. If the login was a failure, then the combination of those credentials was wrong.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 48.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How bruteforce works\"\n        title=\"How bruteforce works\"\n        src=\"/static/4e98cca6ffe2550471139c5a0151766e/212bf/how-bruteforce-works.jpg\"\n        srcset=\"/static/4e98cca6ffe2550471139c5a0151766e/6aca1/how-bruteforce-works.jpg 650w,\n/static/4e98cca6ffe2550471139c5a0151766e/212bf/how-bruteforce-works.jpg 768w,\n/static/4e98cca6ffe2550471139c5a0151766e/4b190/how-bruteforce-works.jpg 800w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"types-of-brute-force-attacks\" style=\"position:relative;\"><a href=\"#types-of-brute-force-attacks\" aria-label=\"types of brute force attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Brute Force Attacks</h2>\n<ul>\n<li><strong>Dictionary Attack:</strong> A dictionary attack is an attempt to guess passwords by using well-known words or phrases.</li>\n<li><strong>Simple Brute Force Attack:</strong> In this type of attack, hackers attempt to <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">logically guess your credentials completely</a> unassisted from software tools or other means. </li>\n<li><strong>Hybrid Brute Force Attack:</strong> A typical hybrid attack is one that merges a dictionary attack and a brute-force attack.</li>\n<li><strong>Reverse Brute Force Attack:</strong> Reverse brute force attacks begin with the attacker knows the password, but not the username. So, in this, the attacker tries different usernames.</li>\n<li><strong>Credential Recycling:</strong>  Credential recycling refers to the hacking practice of re-using username and password combinations gathered in previous brute-force attacks. A special form of credential recycling is passed the hash, where unsalted hashed credentials are stolen and re-used without first being brute-forced.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"credential-stuffing\"\n        title=\"credential-stuffing\"\n        src=\"/static/b3baaddebefb0cbc65bd1297d10b82fd/e5715/WP-Credential-stuffing.png\"\n        srcset=\"/static/b3baaddebefb0cbc65bd1297d10b82fd/a6d36/WP-Credential-stuffing.png 650w,\n/static/b3baaddebefb0cbc65bd1297d10b82fd/e5715/WP-Credential-stuffing.png 768w,\n/static/b3baaddebefb0cbc65bd1297d10b82fd/81501/WP-Credential-stuffing.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>Rainbow Table Attacks:</strong> A rainbow table is a database used to gain authentication by cracking the password. It is a dictionary of plaintext passwords and their corresponding hash values that can be used to find out what plaintext password produces a particular hash.</li>\n</ul>\n<h2 id=\"how-to-defend-against-brute-force-attacks\" style=\"position:relative;\"><a href=\"#how-to-defend-against-brute-force-attacks\" aria-label=\"how to defend against brute force attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Defend Against Brute Force Attacks</h2>\n<p>Brute force attack takes time. It could take from a few weeks to even months. So, if you want to defend from hackers, you should make credentials hard for attackers to guess. Here are a few ways you can be safe.</p>\n<ul>\n<li><strong>Increase password length:</strong> The more characters in your password, the more difficult it is to guess. </li>\n<li><strong>Increase password complexity:</strong> Use special characters and other combinations to make the password complex.</li>\n<li><strong>Limit login attempts:</strong> This is the commonly used method. It creates a counter once a failed login attempt is done and can lock the account after certain attempts.</li>\n<li><strong>Implement Captcha:</strong> It is used to identify if the user is a human by providing a captcha.</li>\n<li><strong>Use multi-factor authentication:</strong> It adds an <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">extra security layer to the authentication process</a> and ensures that the person who is trying to log in is human.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this blog we have tried to explain the brute force in simple language. Bruteforce is not only used for hacking purposes but many companies use it for testing their security system also. This gives us the knowledge about how we can protect our accounts from hackers.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 27, 2021","updated_date":null,"description":"In brute force attacks, you are not exploiting any vulnerability in the web application. Instead, you are trying all the possible combinations and permutations of passwords and usernames of the victim and trying to see if you get any of those right.","title":"What is Brute Force Attack","tags":["data security","cybersecurity","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/1fbc4aff23283a32fd6bd7bd0d7c6d41/33aa5/brute-force-lockout.jpg","srcSet":"/static/1fbc4aff23283a32fd6bd7bd0d7c6d41/f836f/brute-force-lockout.jpg 200w,\n/static/1fbc4aff23283a32fd6bd7bd0d7c6d41/2244e/brute-force-lockout.jpg 400w,\n/static/1fbc4aff23283a32fd6bd7bd0d7c6d41/33aa5/brute-force-lockout.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Manish Tiwari","github":null,"avatar":null}}}},{"node":{"excerpt":"What is PIN Authentication Pin Authentication is yet another popular method of authenticating consumer identity more efficiently.  Logging…","fields":{"slug":"/identity/what-is-pin-authentication/"},"html":"<h1 id=\"what-is-pin-authentication\" style=\"position:relative;\"><a href=\"#what-is-pin-authentication\" aria-label=\"what is pin authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is PIN Authentication</h1>\n<p>Pin Authentication is yet another popular method of authenticating consumer identity more efficiently. </p>\n<p>Logging in through PIN is in popular culture nowadays. This feature allows the consumer to set a PIN in addition to the password during registration or login. Later, during the subsequent logins for authentication, the application requests the same PIN to authenticate. </p>\n<p>This means PIN verification is not a stand-alone authentication feature, i.e., it will always require the first level authentication feature in place to work with it.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-and-pin-auth\">PIN based authentication</a> generally works on a two-level authentication model. Let’s try to understand it with the help of an example:</p>\n<p>Let’s say there is an application that supports PIN based authentication. Whenever a new user accesses the application, they’re prompted to enter the email/username and password combination, which can be considered a level 1 of this authentication model. </p>\n<p>Now there comes PIN, where the user gets an option to first set up one, either at registration or login. Whenever the same user reaccesses the application, they are prompted to enter a PIN instead of the email/username and password combination, which is considered level 2 of this authentication model.</p>\n<p>Some other aspects which prove PIN authentication a robust and a secured model:</p>\n<ol>\n<li>It is not permanent. The sign in PIN will only be asked until the corresponding PIN system access token is valid.</li>\n<li>It is device-specific and will ask to set up a new one whenever it detects a new device.</li>\n<li>It can also be used as a Re-Authentication model.</li>\n</ol>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.92307692307692%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"What is PIN Authentication\"\n        title=\"What is PIN Authentication\"\n        src=\"/static/500d3987f6cb67a8aa1a8caffef3fb87/212bf/pin-authentication.jpg\"\n        srcset=\"/static/500d3987f6cb67a8aa1a8caffef3fb87/6aca1/pin-authentication.jpg 650w,\n/static/500d3987f6cb67a8aa1a8caffef3fb87/212bf/pin-authentication.jpg 768w,\n/static/500d3987f6cb67a8aa1a8caffef3fb87/0ed67/pin-authentication.jpg 769w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"what-is-3d-secure-authentication-pin\" style=\"position:relative;\"><a href=\"#what-is-3d-secure-authentication-pin\" aria-label=\"what is 3d secure authentication pin permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is 3D Secure Authentication PIN</h2>\n<p>3D Secure Authentication is a security protocol used in online transactions to prevent fraud. </p>\n<p>When making a purchase, the cardholder is prompted to verify their identity, often by entering a one-time PIN sent to their mobile device or through another method, such as biometric authentication. </p>\n<p>This additional step helps ensure that the person making the transaction is the legitimate cardholder, providing an extra layer of security.</p>\n<h2 id=\"advantages-of-pin-authentication\" style=\"position:relative;\"><a href=\"#advantages-of-pin-authentication\" aria-label=\"advantages of pin authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of PIN Authentication</h2>\n<p>PIN authentication offers several benefits that make it an attractive option for businesses seeking enhanced security measures:</p>\n<ul>\n<li><strong>Two-Level Authentication</strong>: PIN authentication operates on a two-level authentication model, requiring both a password and a PIN for access. This dual-layered approach significantly strengthens security compared to traditional single-factor authentication methods.</li>\n<li><strong>Efficiency</strong>: The use of PINs streamlines the authentication process, reducing the time and effort required for users to access their accounts. This efficiency is particularly valuable in environments where quick and secure access is essential, such as online banking or e-commerce platforms.</li>\n<li><strong>Device-Specific Security</strong>: PIN authentication is device-specific, meaning that each device requires its own unique PIN. This adds an extra layer of security by preventing unauthorized access from unrecognized devices, thus safeguarding user accounts against potential breaches.</li>\n<li><strong>Dynamic Authentication</strong>: PINs are not permanent and are only valid for the duration of the corresponding session or token. This dynamic nature enhances security by reducing the risk of PIN theft or compromise over time.</li>\n<li><strong>Re-Authentication Capabilities</strong>: PIN authentication can also serve as a re-authentication model, allowing users to verify their identity at various access points within an application. This flexibility enables businesses to implement additional security measures without compromising user experience.</li>\n</ul>\n<h2 id=\"pin-authentication-vs-other-authentication-methods\" style=\"position:relative;\"><a href=\"#pin-authentication-vs-other-authentication-methods\" aria-label=\"pin authentication vs other authentication methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>PIN Authentication vs. Other Authentication Methods</h2>\n<p>PIN authentication offers distinct advantages over alternative authentication methods:</p>\n<ul>\n<li><strong>Versus Password-Only Authentication</strong>: Unlike traditional password-only authentication, which relies solely on a single-factor authentication model, PIN authentication enhances security by incorporating an additional layer of verification. This makes it more resistant to common security threats such as brute force attacks and password guessing.</li>\n<li><strong>Versus Biometric Authentication</strong>: While biometric authentication methods, such as fingerprint or facial recognition, offer convenience and unique identifiers, they are not immune to vulnerabilities such as spoofing or replication. PIN authentication provides an alternative that complements biometric solutions, offering added security without solely relying on biometric data.</li>\n<li><strong>Versus Two-Factor Authentication (2FA)</strong>: While both PIN authentication and 2FA involve multiple layers of verification, PIN authentication simplifies the process by combining two factors—password and PIN—into a single step. This streamlined approach reduces user friction without compromising security, making it a preferred option for businesses seeking efficient authentication methods.</li>\n</ul>\n<h2 id=\"why-should-businesses-use-pin-authentication\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-pin-authentication\" aria-label=\"why should businesses use pin authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why Should Businesses Use PIN Authentication?</strong></h2>\n<p>PIN Authentication flow reduces the efforts as well as time in the <a href=\"https://www.loginradius.com/blog/identity/2020/04/loginradius-pin-based-authentication/\">complete authentication process</a>. As it is a two-level authentication model, the session is considered more secure as compared to a simple traditional login method because the PIN’s session depends on two different tokens to be a valid one.\nHow Useful is PIN Authentication for Businesses</p>\n<p>As we’ve already discussed the multiple advantages of using a PIN in an authentication process, apart from its usability alongside the authentication processes, PIN can also be used as an additional feature where the use cases of Re-Authentication arise. </p>\n<p>You can simply leverage this feature within your application to authenticate at different levels of granting access to the application.</p>\n<h2 id=\"security-measures-to-enhance-pin-authentication\" style=\"position:relative;\"><a href=\"#security-measures-to-enhance-pin-authentication\" aria-label=\"security measures to enhance pin authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Measures to Enhance PIN Authentication</h2>\n<p>To further enhance the security of PIN authentication, businesses can implement the following measures:</p>\n<ul>\n<li><strong>Token Validity Period</strong>: Limit the validity period of tokens associated with PIN authentication to minimize the risk of unauthorized access. By expiring tokens after a predefined timeframe, businesses can reduce the window of opportunity for potential attacks.</li>\n<li><strong>Multi-Factor Authentication (MFA)</strong>: Supplement PIN authentication with additional factors such as biometric authentication or one-time passcodes (OTP) to create a multi-layered security approach. MFA strengthens authentication by requiring multiple forms of verification, making it more difficult for attackers to compromise accounts.</li>\n<li><strong>User Education and Awareness</strong>: Educate users about the importance of selecting strong PINs and practicing good security hygiene. Encourage users to choose unique PINs that are not easily guessable and to avoid sharing them with others.</li>\n<li><strong>Monitoring and Logging</strong>: Implement robust monitoring and logging mechanisms to track authentication attempts and detect suspicious activities. By continuously monitoring for anomalous behavior, businesses can identify and respond to potential security threats in real-time.</li>\n<li><strong>Regular Security Audits</strong>: Conduct regular security audits and assessments to evaluate the effectiveness of PIN authentication measures and identify areas for improvement. This proactive approach helps businesses stay ahead of emerging threats and maintain a strong security posture.</li>\n</ul>\n<p>By implementing these security measures, businesses can strengthen the integrity of PIN authentication and mitigate the risk of unauthorized access and data breaches.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-and-pin-auth\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"pin-login\"\n        title=\"pin-login\"\n        src=\"/static/6099428d13e6f2100456e5017de70164/e5715/pin-login.png\"\n        srcset=\"/static/6099428d13e6f2100456e5017de70164/a6d36/pin-login.png 650w,\n/static/6099428d13e6f2100456e5017de70164/e5715/pin-login.png 768w,\n/static/6099428d13e6f2100456e5017de70164/63ff0/pin-login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-to-implement-pin-authentication\" style=\"position:relative;\"><a href=\"#how-to-implement-pin-authentication\" aria-label=\"how to implement pin authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How to Implement PIN Authentication?</strong></h2>\n<p>To implement this feature, you will be required to have an instance of LoginRadius Admin Console, which can be used further to enable and enforce PIN authentication.</p>\n<p>Now once you have your own instance of LoginRadius Admin Console, you can refer to this <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/pin-authentication/overview/\">document</a> for gaining detailed information on the implementation of the PIN Authentication feature.</p>\n<p>For PIN Re-Authentication, you can have a reference through this <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/re-authentication/pin/overview/\">document</a>.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this blog, we’ve conveyed all the relevant information about what exactly a PIN authentication means along with it’s workflow and how you can use the same to implement along with web applications, so that it can fulfill your business requirements. I hope this will help you understand the feature accordingly as per your use cases.</p>\n<p>Cheers!</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1.  How does PIN-based authentication work?</strong></p>\n<p>PIN-based authentication involves users setting a personal identification number (PIN) alongside their password, requiring both for subsequent logins, and adding an extra layer of security.</p>\n<p><strong>2. What is the difference between PIN and OTP?</strong></p>\n<p>A PIN is a fixed, user-selected code used for authentication, while an OTP (One-Time Passcode) is a dynamically generated code valid for a single login session, enhancing security through temporary access.</p>\n<p><strong>3. What are the types of authentication?</strong></p>\n<p>Authentication methods include single-factor (e.g., passwords), two-factor (e.g., PIN and biometrics), and multi-factor (e.g., PIN, biometrics, and OTP) authentication, offering varying levels of security.</p>\n<p><strong>4. What is PIN verification data?</strong></p>\n<p>PIN verification data refers to information associated with a user's PIN, including its validity period, device-specificity, and dynamic nature, enhancing security and access control measures.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 27, 2021","updated_date":null,"description":"Logging in through PIN is in popular culture nowadays. This feature allows the consumer to set a PIN in addition to the password during registration or login. Later, during the subsequent logins, the application requests the same PIN to authenticate.","title":"What is PIN Authentication","tags":["pin authentication","data security","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f25fab7b418d8ecc64dbfd3ca8ee076e/33aa5/pin-authenticaton.jpg","srcSet":"/static/f25fab7b418d8ecc64dbfd3ca8ee076e/f836f/pin-authenticaton.jpg 200w,\n/static/f25fab7b418d8ecc64dbfd3ca8ee076e/2244e/pin-authenticaton.jpg 400w,\n/static/f25fab7b418d8ecc64dbfd3ca8ee076e/33aa5/pin-authenticaton.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Abhishek Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"What is Risk-Based Authentication Risk-based authentication is a non-static authentication system that considers the profile(IP address…","fields":{"slug":"/identity/risk-based-authentication/"},"html":"<h1 id=\"what-is-risk-based-authentication\" style=\"position:relative;\"><a href=\"#what-is-risk-based-authentication\" aria-label=\"what is risk based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Risk-Based Authentication</h1>\n<p>Risk-based authentication is a non-static authentication system that considers the profile(IP address, Browser, physical Location, and so on) of a consumer requesting access to the system to determine the risk profile associated with that action. The risk-based implementation allows your application to challenge the consumer for additional credentials only when the risk level is appropriate.</p>\n<p>It is a method of applying various levels of stringency to authentication processes based on the likelihood that the access to a given system could result in it being compromised. As the level of risk increases, the authentication process becomes more complicated and restrictive.</p>\n<h2 id=\"how-risk-based-authentication-works\" style=\"position:relative;\"><a href=\"#how-risk-based-authentication-works\" aria-label=\"how risk based authentication works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Risk-Based Authentication Works</h2>\n<p>RBA implementation follows the challenge and response process. One party presents a challenge (in the form of a question) and the other party provides a response (in the form of response) as the second factor after submitting the username and password.</p>\n<p>Whenever a system identifies any risk with a login activity, there can be multiple actions based on the configuration setup. See below:</p>\n<ul>\n<li><strong>Block the consumer</strong> - The system will block the consumer if it identifies a compromising risk associated with the consumer account. </li>\n<li>\n<p><strong>Multi-Factor Authentication</strong> - The system will prompt the consumer to pass through the next security channel as below: </p>\n<ul>\n<li>Google Authenticator</li>\n<li>SMS Passcode</li>\n</ul>\n</li>\n</ul>\n<p>In addition to prompting the consumer with challenge and response, there are options to either send an email to the consumer about the suspicious activity or let the Site Administrator know that the account has been compromised. It will alert the consumer as well as the Site Administrator.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"mfa\"\n        title=\"mfa\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/mfa.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/mfa.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/mfa.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/mfa.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"why-should-businesses-use-rba\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-rba\" aria-label=\"why should businesses use rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Use RBA</h2>\n<p>Risk-based authentication is an essential security feature because it works in real-time to prevent cyber frauds like accounts getting compromised without causing an inconvenience for legitimate consumers. </p>\n<p>Risk-based authentication helps businesses in achieving the following goals:</p>\n<ul>\n<li>Reduce online fraud and the risk of improper access.</li>\n<li>It enforces different authentication levels depending on factors such as consumer activity and geolocation and similar calculated risk scores.</li>\n<li>It helps in improving the consumer experience. Consumers need to provide the additional details for authentication only when the associated risk appears.</li>\n<li>Access control in federated setups.</li>\n<li>Widely used and easy to deploy.</li>\n</ul>\n<h2 id=\"how-to-implement-rba-with-loginradius\" style=\"position:relative;\"><a href=\"#how-to-implement-rba-with-loginradius\" aria-label=\"how to implement rba with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement RBA with LoginRadius</h2>\n<p>At LoginRadius, we know how critical it is to maintain consumer security and how we can efficiently and effectively manage the process if a consumer account gets compromised. </p>\n<p>LoginRadius’ RBA feature allows a quick, simple, and time-saving way to implement this on your website. You can create a consumer risk profile based on the below factors :</p>\n<ul>\n<li>IP</li>\n<li>City</li>\n<li>Browser</li>\n<li>Country.</li>\n</ul>\n<h2 id=\"a-use-case-of-rba\" style=\"position:relative;\"><a href=\"#a-use-case-of-rba\" aria-label=\"a use case of rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Use Case of RBA</h2>\n<p>LoginRadius Risk-based authentication applies the precise security level for each unique consumer interaction and avoids unnecessary security steps for low-risk transactions, which can add friction for the consumer. </p>\n<p>A good example is a legitimate consumer logging into a banking portal with a known personal device that has been registered with the bank, using the same browser they typically do. In this case, the system determines the risk of fraud is pretty low that they don’t need to re-authenticate after they’ve logged in. </p>\n<p>Only when the consumer behavior deviates from normal activity (such as a different device or Browser) are additional authentication challenges added, resulting in increased security hurdles for riskier transactions such as bank transactions. The consumer will be prompted to authenticate themselves in one or another form and, if successful, they will go on to the correct portal.</p>\n<p>To learn more about this feature, please visit our <a href=\"https://www.loginradius.com/docs/api/v2/admin-console/platform-security/risk-based-auth/\">Risk-Based Authentication documentation</a>.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about making the accounts secured using Risk Based Authentication and learnt how it will enhance the consumer security. This feature helps define the risk areas and take actions if any risk is detected with respect to the defined constraints.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 26, 2021","updated_date":null,"description":"RBA is a method of applying various levels of stringency to authentication processes based on the likelihood that the access to a given system could result in it being compromised. As the level of risk increases, authentication becomes more restrictive.","title":"What is Risk-Based Authentication","tags":["data security","risk based authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5384615384615385,"src":"/static/77ac4a923dd99aa30b4d1f87844da56e/91a06/risk-based-authentication.png","srcSet":"/static/77ac4a923dd99aa30b4d1f87844da56e/69585/risk-based-authentication.png 200w,\n/static/77ac4a923dd99aa30b4d1f87844da56e/497c6/risk-based-authentication.png 400w,\n/static/77ac4a923dd99aa30b4d1f87844da56e/91a06/risk-based-authentication.png 587w","sizes":"(max-width: 587px) 100vw, 587px"}}},"author":{"id":"Rajeev Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Tenancy in cloud computing refers to the sharing of computing resources in a private or public environment that is isolated from other users…","fields":{"slug":"/identity/single-tenant-vs-multi-tenant/"},"html":"<p>Tenancy in <a href=\"https://www.loginradius.com/blog/identity/2021/01/identity-management-in-cloud-computing/\">cloud computing</a> refers to the sharing of computing resources in a private or public environment that is isolated from other users and kept secret. Tenancy in SaaS is divided into two types: single-tenant SaaS and multi-tenant SaaS.</p>\n<h2 id=\"what-is-a-single-tenant-architecture\" style=\"position:relative;\"><a href=\"#what-is-a-single-tenant-architecture\" aria-label=\"what is a single tenant architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Single-Tenant Architecture</h2>\n<p>A single-tenant cloud runs on a dedicated infrastructure. This means that the hardware, storage, and network are dedicated to a single client, and there are no neighbors to share hosted resources with. They may reside in a dedicated offsite data center or with a managed private cloud provider. </p>\n<p>In a single-tenancy architecture, each tenant gets their own database. This way, data from each tenant remains separated from the other. Furthermore, the architecture is built such that only one software instance per SaaS server is allowed. </p>\n<h3 id=\"advantages-single-tenant-cloud\" style=\"position:relative;\"><a href=\"#advantages-single-tenant-cloud\" aria-label=\"advantages single tenant cloud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages single-tenant cloud</h3>\n<ul>\n<li><strong>Enhanced security</strong> - Single-tenancy offers true data isolation that contributes to optimal protection and increased security. </li>\n<li><strong>Migration</strong>- When a tenant wants to migrate from a single-tenant (SaaS) system into a self-hosted or local environment, they can quickly move an application to their own managed servers. </li>\n<li><strong>Customization</strong>- Single tenancy offers the ability to architect an environment exactly how a consumer needs it. </li>\n<li><strong>Reliability</strong>- Single tenancy offers consistency and the highest level of performance for an application.</li>\n</ul>\n<h3 id=\"drawbacks-of-single-tenant-cloud\" style=\"position:relative;\"><a href=\"#drawbacks-of-single-tenant-cloud\" aria-label=\"drawbacks of single tenant cloud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Drawbacks of single-tenant cloud</h3>\n<ul>\n<li><strong>Cost</strong>: Because, single-tenant does not allow cost-sharing for facilities such as deployment and monitoring, companies end up paying more. Also, more customizations and maintenance often take more resources and time, which results in higher costs.</li>\n<li><strong>Maintenance</strong>: Since a single-tenant architecture needs continuous modifications and improvements, a lot of maintenance is required. </li>\n<li><strong>Setup</strong>: There may be delays due to individual installs, and not to forget the learning curves, that should be considered as well. </li>\n</ul>\n<h2 id=\"what-is-a-multi-tenant-architecture\" style=\"position:relative;\"><a href=\"#what-is-a-multi-tenant-architecture\" aria-label=\"what is a multi tenant architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Multi-Tenant Architecture</h2>\n<p>Multi-tenant cloud architecture is a single cloud infrastructure built to serve multiple businesses. The entire system may cover multiple servers and data centers, incorporated into a single database. </p>\n<p>Cloud providers offer multi-tenancy as a gateway to share the same application with multiple businesses, on the same hardware, in the same operating environment, and with the same storage mechanism. </p>\n<h3 id=\"advantages-of-multi-tenant-architecture\" style=\"position:relative;\"><a href=\"#advantages-of-multi-tenant-architecture\" aria-label=\"advantages of multi tenant architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of multi-tenant architecture</h3>\n<ul>\n<li><strong>Scalable</strong>: It is very easy to <a href=\"https://www.loginradius.com/blog/identity/2021/01/user-onboarding-revamp-application/\">onboard users</a> with a multi-tenant cloud. In fact, there is no difference between onboarding ten users from a thousand companies or a thousand users from one company.</li>\n<li><strong>Saves money</strong>: Multi-tenancy allows resources to be consolidated and allocated efficiently, thereby saving a lot of expenses. </li>\n<li><strong>Flexible</strong>: A multi-tenant cloud can allocate a pool of resources to the users who need it, as their needs scale up and down.</li>\n<li><strong>Efficient</strong>: Multitenancy reduces the need to manage infrastructure and handle updates. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Future-proof-your-security\"\n        title=\"Future-proof-your-security\"\n        src=\"/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png\"\n        srcset=\"/static/a164480ea3177cb0422ee6104202f8b3/a6d36/Future-proof-your-security.png 650w,\n/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png 768w,\n/static/a164480ea3177cb0422ee6104202f8b3/63ff0/Future-proof-your-security.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"drawbacks-of-multi-tenant-cloud\" style=\"position:relative;\"><a href=\"#drawbacks-of-multi-tenant-cloud\" aria-label=\"drawbacks of multi tenant cloud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Drawbacks of multi-tenant cloud</h3>\n<ul>\n<li><strong>Security</strong>: Cybercriminals can take advantage of multiple access points to exploit <a href=\"https://www.loginradius.com/blog/identity/2021/01/7-web-app-sec-threats/\">systems vulnerabilities</a>. </li>\n<li><strong>Backup and restoration</strong>: A lot of companies fail to keep up with the latest system backup advances and restore options. </li>\n<li><strong>Limited management</strong>: They do not provide a lot of customization options, and that reduces the consumer's ability to interact with the system.</li>\n</ul>\n<p>To learn more about Single-Tenant vs Multi-Tenant Cloud, check out the infographic by LoginRadius. Find out which is the right solution for your business. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 734.1538461538462%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"single-tenant-vs-multi-tenant-infographic\"\n        title=\"single-tenant-vs-multi-tenant-infographic\"\n        src=\"/static/67c1505912e3d92d7925aebfd59939a8/e5715/single-tenant-vs-multi-tenant-infographic.png\"\n        srcset=\"/static/67c1505912e3d92d7925aebfd59939a8/a6d36/single-tenant-vs-multi-tenant-infographic.png 650w,\n/static/67c1505912e3d92d7925aebfd59939a8/e5715/single-tenant-vs-multi-tenant-infographic.png 768w,\n/static/67c1505912e3d92d7925aebfd59939a8/4fa52/single-tenant-vs-multi-tenant-infographic.png 1241w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> </p>\n<p>Contact us for your personalized deployment requirements.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 26, 2021","updated_date":null,"description":"A single-tenant cloud runs on dedicated infrastructure, while a multi-tenant cloud is a single cloud infrastructure built to serve multiple businesses. Check out the infographic by LoginRadius to understand the difference between the two and find out which is the right solution for your business.","title":"Understanding the Difference Between Single-Tenant and Multi-Tenant Cloud [Infographic]","tags":["cloud computing","single tenant","multi tenant"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6,"src":"/static/c6c9407ec1dcb981767278f4e5a53674/14b42/single-tenant-vs-multi-tenant-cover.jpg","srcSet":"/static/c6c9407ec1dcb981767278f4e5a53674/f836f/single-tenant-vs-multi-tenant-cover.jpg 200w,\n/static/c6c9407ec1dcb981767278f4e5a53674/2244e/single-tenant-vs-multi-tenant-cover.jpg 400w,\n/static/c6c9407ec1dcb981767278f4e5a53674/14b42/single-tenant-vs-multi-tenant-cover.jpg 800w,\n/static/c6c9407ec1dcb981767278f4e5a53674/16310/single-tenant-vs-multi-tenant-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Have you heard of phone login lately? We will get to it soon.  With all the business going online in this digital era, there is…","fields":{"slug":"/identity/what-is-phone-login/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Have you heard of phone login lately? We will get to it soon. </p>\n<p>With all the business going online in this digital era, there is probably a possibility that there is not even a single person on this planet who enjoys filling out registration forms. </p>\n<p>Today, a single consumer interacts with various apps/websites, which require them to log in or register before allowing them to use their services. There are relatively high chances of forgetting the username and the associated password while trying to log in.</p>\n<p>In this type of process, consumers may become frustrated and completely give up the sign-up process as it asks for a lot of information. Ultimately, businesses end up with lower consumer growth rates.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"PhoneLogin_overview\"\n        title=\"PhoneLogin_overview\"\n        src=\"/static/8ca3a907b397665830aeb5464c7d341f/212bf/PhoneLogin_overview.jpg\"\n        srcset=\"/static/8ca3a907b397665830aeb5464c7d341f/6aca1/PhoneLogin_overview.jpg 650w,\n/static/8ca3a907b397665830aeb5464c7d341f/212bf/PhoneLogin_overview.jpg 768w,\n/static/8ca3a907b397665830aeb5464c7d341f/b17f8/PhoneLogin_overview.jpg 1600w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>But if the sign-up and login process is done right, it can trigger the retention of lots of new consumers. If done in an improper method, it may backfire and can have the exact opposite effect. </p>\n<p>So now the question is, what is the right process? How do we tame this beast? </p>\n<p>We tame it by following the best consumer experience practices and using the right analysis and optimization techniques.</p>\n<p>You might think that we can also implement a social login method like GitHub, Facebook, Google, etc., to skip traditional registration/login. </p>\n<p>Yes, you are right, we can do that! But there is a slight problem that sometimes consumers do not want their data to be shared with app developers. </p>\n<p>This is where <strong>Phone Login</strong> comes to the rescue.</p>\n<h2 id=\"introduction-to-phone-login\" style=\"position:relative;\"><a href=\"#introduction-to-phone-login\" aria-label=\"introduction to phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction to Phone Login</h2>\n<p>In the fast-paced digital landscape, the convenience and security of consumer interactions are paramount. Phone Login emerges as a powerful tool designed to streamline the often cumbersome processes of registration and login. As consumers juggle multiple apps and websites, each requiring their own set of credentials, the need for a more straightforward solution becomes evident. Phone Login steps in to simplify this process, allowing users to swiftly register or access their accounts using nothing but their mobile phones.</p>\n<p>Gone are the days of lengthy registration forms and forgotten passwords. With Phone Login, users input their phone number, receive a one-time password (OTP) on their mobile device, and gain instant access. This not only improves the user experience but also significantly reduces friction in the onboarding process for businesses.</p>\n<h2 id=\"crucial-considerations-in-phone-login-implementation\" style=\"position:relative;\"><a href=\"#crucial-considerations-in-phone-login-implementation\" aria-label=\"crucial considerations in phone login implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Crucial Considerations in Phone Login Implementation</h2>\n<h3 id=\"abuse-scenario-vigilance\" style=\"position:relative;\"><a href=\"#abuse-scenario-vigilance\" aria-label=\"abuse scenario vigilance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Abuse Scenario Vigilance</h3>\n<p>One crucial consideration in Phone Login implementation is being vigilant against abuse scenarios. The login endpoint could be vulnerable to attacks where repeated requests are sent with similar phone numbers, potentially slowing down the login page. To mitigate this risk, implementing checks on the frequency of requests from a single phone number can help maintain the system's integrity.</p>\n<h3 id=\"handling-phone-number-alterations\" style=\"position:relative;\"><a href=\"#handling-phone-number-alterations\" aria-label=\"handling phone number alterations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Handling Phone Number Alterations</h3>\n<p>Another important aspect to consider is how to handle scenarios where a user alters their phone number. To address this, a verification process can be implemented where the new number is verified before updating it in the user's account. This ensures that user information remains accurate and secure, preventing unauthorized access.</p>\n<h3 id=\"session-management-and-security\" style=\"position:relative;\"><a href=\"#session-management-and-security\" aria-label=\"session management and security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Session Management and Security</h3>\n<p>Effective session management is essential for <a href=\"https://www.loginradius.com/blog/identity/security-ux-can-coexist/\">security and user convenience</a>. Generated tokens play a vital role in this aspect, allowing for the expiration of sessions and the logging out of idle accounts. When a user enters the OTP received on their phone, the backend system verifies the token to ensure a secure login process.</p>\n<h3 id=\"telephony-api-integration\" style=\"position:relative;\"><a href=\"#telephony-api-integration\" aria-label=\"telephony api integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Telephony API Integration</h3>\n<p>To send OTPs to users' phones, integration with a telephony API is necessary. This API enables the system to send SMS messages with the OTP code for user verification. Choosing a reliable telephony API provider, such as LoginRadius, ensures the seamless delivery of OTPs to users, enhancing the overall user experience.</p>\n<h3 id=\"consumer-data-privacy\" style=\"position:relative;\"><a href=\"#consumer-data-privacy\" aria-label=\"consumer data privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consumer Data Privacy</h3>\n<p>Lastly, ensuring consumer data privacy is paramount. Phone Login should comply with data protection regulations to safeguard user information. This includes securely storing phone numbers, encrypting sensitive data, and obtaining user consent for using their phone numbers for verification purposes.</p>\n<h2 id=\"what-is-phone-login\" style=\"position:relative;\"><a href=\"#what-is-phone-login\" aria-label=\"what is phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Phone Login</h2>\n<p>Phone Login is a compelling and handy feature designed to enhance consumer experience and ease the process of login and registration.</p>\n<p>It is the process of registering or accessing a user's account by using a phone number. The user enters their phone number as username and receives a one-time password (OTP) on their mobile phone, entering which they can log in.</p>\n<p>It eliminates the hassle of filling lengthy registration forms and creating new passwords and usernames, thereby allowing users to quickly login or register just by using their mobile phones.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"PhoneLogin\"\n        title=\"PhoneLogin\"\n        src=\"/static/8626ee3b4671d36b271a302cee89c73c/212bf/PhoneLogin.jpg\"\n        srcset=\"/static/8626ee3b4671d36b271a302cee89c73c/6aca1/PhoneLogin.jpg 650w,\n/static/8626ee3b4671d36b271a302cee89c73c/212bf/PhoneLogin.jpg 768w,\n/static/8626ee3b4671d36b271a302cee89c73c/27023/PhoneLogin.jpg 5032w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"why-should-businesses-use-phone-login\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-phone-login\" aria-label=\"why should businesses use phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Use Phone Login</h2>\n<p>As mentioned earlier, <a href=\"https://www.loginradius.com/resource/loginradius-ciam-phone-authentication/\">phone login simplifies the login and registrations process</a>. By using this feature, app developers and business owners can show their consumers that they understand what annoys them— and that they value their time. A rich consumer experience has always been seen providing a more significant consumer growth rate.</p>\n<p>This feature makes it easy for your consumers to register and log in within seconds using their phone numbers. To sign-in, they have to enter their phone number and the code they received (usually a one-time password ). </p>\n<p>And it should not be tough to understand that consumers will always tend to move in a comfortable and less time-consuming path.</p>\n<h2 id=\"benefits-of-phone-login-for-businesses\" style=\"position:relative;\"><a href=\"#benefits-of-phone-login-for-businesses\" aria-label=\"benefits of phone login for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Phone Login for Businesses</h2>\n<p><a href=\"https://www.loginradius.com/phone-login/\">Phone Login</a> becomes extremely useful for those businesses which rely heavily on consumer's phone numbers. For example, food delivery companies, cabs, and more. Other than these the following are a few benefits that will help any business.</p>\n<ul>\n<li>Easy and hassle-free registration for consumers as it skips the filling of lengthy forms.</li>\n<li>Consumers can register and login directly with their phone numbers.</li>\n<li>It avoids spam consumer registration on your website.</li>\n<li>It saves consumers time. A lot of it. By skipping traditional registration form filling.</li>\n<li>Consumers can also login without remembering their user ID and Password.</li>\n<li>Verify consumer mobile number by SMS OTP.</li>\n<li>All verified consumers are genuine, and hence it prevents fake orders.</li>\n<li>Order processing is fast because consumer identity is already verified by Phone Number and One-time password (OTP).</li>\n<li>As order processing is quick, the consumer trusts the merchant.</li>\n<li>Consumers can be notified quickly through mobile, even if they do not have internet or email access, and notifications are always read.</li>\n<li>Merchants shall reach consumers with their promotions and offers quickly through phone number</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 52.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Benifits_of_phoneLogin_in_business\"\n        title=\"Benifits_of_phoneLogin_in_business\"\n        src=\"/static/a920662c97f4ec8fd8d0839b5edf8a46/212bf/Benifits_of_phoneLogin_in_business.jpg\"\n        srcset=\"/static/a920662c97f4ec8fd8d0839b5edf8a46/6aca1/Benifits_of_phoneLogin_in_business.jpg 650w,\n/static/a920662c97f4ec8fd8d0839b5edf8a46/212bf/Benifits_of_phoneLogin_in_business.jpg 768w,\n/static/a920662c97f4ec8fd8d0839b5edf8a46/3acf0/Benifits_of_phoneLogin_in_business.jpg 2000w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Looking at the above benefits, business owners can easily enhance their business strategies and ultimately increase their consumer growth. You've got everything you need to communicate with your end-users in the most concrete and straightforward method.</p>\n<h2 id=\"how-to-implement-phone-login\" style=\"position:relative;\"><a href=\"#how-to-implement-phone-login\" aria-label=\"how to implement phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Phone Login</h2>\n<p>Now that you have read all the advantages of using a phone login and you are planning to implement it for your business, too, your first question will be, \"How can I implement this thing on my website.\" Right ??</p>\n<p>Don't worry, we've got you covered.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-phone-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"phone-authentication\"\n        title=\"phone-authentication\"\n        src=\"/static/e803561322c0f2e7a0423cf87d0771b2/e5715/phone-authentication.png\"\n        srcset=\"/static/e803561322c0f2e7a0423cf87d0771b2/a6d36/phone-authentication.png 650w,\n/static/e803561322c0f2e7a0423cf87d0771b2/e5715/phone-authentication.png 768w,\n/static/e803561322c0f2e7a0423cf87d0771b2/63ff0/phone-authentication.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>This whole implementation is divided into two parts.\nThe user submits the phone number to the website's backend via GUI and obtains a token.\nUsers submit the obtained token in a web field, where it is verified. Upon successful verification, the user is logged into the website.</p>\n<p>Let's start with the first scenario where the user submits the phone number to the App backend through GUI. After submitting the number, they land on a new page which asks for a token. The application backend verifies the input number and combines it with extra information such as IP address, geographical location, and device information.</p>\n<p>This wholesome mixture of information is now submitted to the User service, which generates a token, and then they associate it with these requests. </p>\n<p>Here is an important aspect that you need to keep in mind: <strong>The generation of a token</strong>.</p>\n<p>See, this generated token will help us in many ways, and they are essential as well. These tokens can be used to expire the ongoing sessions or logging out of an idle account. And many more things like this, which increases the security of your user's account.</p>\n<p>Now our next challenge is how do we send OTP to the consumers. This will be done by your User Service, which will call a telephony API and will send the OTP to the consumers' phone number as an SMS. Many companies provide this functionality, and LoginRadius is one of them.</p>\n<p>On receiving the One-time password in SMS, the user will now enter the OTP in the form. Once again, the application backend comes into action and verifies the token which was sent by User Service.</p>\n<p>If the token is exactly the same as what was sent, the user is logged into the account. Simple!</p>\n<h2 id=\"what-things-to-take-care-of-while-implementing-phone-login\" style=\"position:relative;\"><a href=\"#what-things-to-take-care-of-while-implementing-phone-login\" aria-label=\"what things to take care of while implementing phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Things to Take Care of While Implementing Phone Login</h2>\n<p>Now that you know how to implement phone login, you must be excited to implement it for your website too. But there are a few things we need to keep in mind while implementing this feature.</p>\n<ul>\n<li>Be careful and vigilant about the multiple abuse scenarios where the login endpoint can get attacked by a code that keeps sending a request with a similar phone number. This can slow down your login page. To handle this, you can implement a check on how many times a consumer (phone number) can send requests.</li>\n<li>Another case is to consider the scenario if a consumer alters the phone number. You can use a similar method of first verifying the number and then updating it in the consumer’s account to handle this.\n<br /><br /></li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about applying a simple approach of using Phone Login on the websites and how it will enhance the businesses. This feature removes the consumer's mental load to remember each password created on different websites. Finally, before implementing any functionality on your website, analyze and consider the pros and cons from every possible angle. </p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 26, 2021","updated_date":null,"description":"Phone Login is a compelling and handy feature designed to enhance consumer experience and ease the process of login and registration. It eliminates the hassle of filling lengthy registration forms and creating new passwords and usernames, thereby allowing consumers to quickly login or register just by using their mobile phones.","title":"What is Phone Login","tags":["phone login","authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6,"src":"/static/21e6146fafaa9d0ef6e6b2ffc507029f/14b42/PhoneLogin_cover_pic.jpg","srcSet":"/static/21e6146fafaa9d0ef6e6b2ffc507029f/f836f/PhoneLogin_cover_pic.jpg 200w,\n/static/21e6146fafaa9d0ef6e6b2ffc507029f/2244e/PhoneLogin_cover_pic.jpg 400w,\n/static/21e6146fafaa9d0ef6e6b2ffc507029f/14b42/PhoneLogin_cover_pic.jpg 800w,\n/static/21e6146fafaa9d0ef6e6b2ffc507029f/47498/PhoneLogin_cover_pic.jpg 1200w,\n/static/21e6146fafaa9d0ef6e6b2ffc507029f/0e329/PhoneLogin_cover_pic.jpg 1600w,\n/static/21e6146fafaa9d0ef6e6b2ffc507029f/d8255/PhoneLogin_cover_pic.jpg 1920w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Ashish Kumar Yadav","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":294,"currentPage":50,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}