{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/62","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"COVID-19 is a global epidemic that demands decisive and robust action. Following the announcement by the World Health Organization (WHO) to…","fields":{"slug":"/identity/loginradius-business-continuity-covid-19-outbreak/"},"html":"<p><em>COVID-19 is a global epidemic that demands decisive and robust action.</em></p>\n<p>Following the announcement by the World Health Organization (WHO) to address the <a href=\"https://www.who.int/emergencies/diseases/novel-coronavirus-2019/events-as-they-happen\">coronavirus (COVID-19) threat as a pandemic</a>, organizations across the globe are looking to their Business Continuity Management (BCM) plan to make sure they are covered.</p>\n<p>For LoginRadius, as a SaaS-based customer identity platform,  planning ahead to counter any disruption has always been an essential aspect of its resilience program. </p>\n<p>Consequently, we have put our contingency plan to action to fight the current and future risks to our business, and our customers' businesses, due to the COVID-19 outbreak.</p>\n<h2 id=\"mitigating-risk-by-loginradius\" style=\"position:relative;\"><a href=\"#mitigating-risk-by-loginradius\" aria-label=\"mitigating risk by loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mitigating Risk by LoginRadius</h2>\n<p>As the developing situation changes with respect to world health outlook, we have outlined three key areas to ensure our readiness towards workplace mitigation. They include:</p>\n<ul>\n<li>Employee health and safety</li>\n<li>Service operations</li>\n<li>Business operations</li>\n</ul>\n<p>Thereafter, we are prepared to react accordingly to ensure business continuity. Here’s what our plan looks like:</p>\n<p><strong>Employee Health and Safety</strong></p>\n<p>We are mindful of our employees and are up to date on the officially mandated actions related to hygiene and safety at our workstations. Likewise, we have rolled out the following policies:</p>\n<ul>\n<li>Hand-washing policy and education:  We have trained our staff on proper, effective hygiene practices for reducing the risk of contracting or spreading the virus. </li>\n<li>Travel restrictions, guidelines, and recommendations - We have limited all non-essential business travel and travel to designated high-risk regions. </li>\n<li>Remote Workforce - Phase 1: We have allowed optional, voluntary work from home. This measure is already in place. All staff in all locations have the autonomy and flexibility to work remotely to help mitigate the risk of exposure from public transit and closed communal spaces.</li>\n<li>Remote Workforce - Phase 2: We will impose mandatory work from home. If mandated by the government or regulatory bodies, or implemented by LoginRadius management, we are prepared for mandatory full-time remote work. We have already tested this measure and are to enact it as needed.</li>\n<li>We have installed multiple hand sanitizers within the office premises. </li>\n<li>We ensure frequent cleaning and sanitization of our workplaces. </li>\n<li>We have increased space between employees' workstations.</li>\n</ul>\n<p><strong>Service Operations</strong></p>\n<p>As an automated, fully cloud-based software solution redundantly hosted on industry-leading infrastructure providers like Amazon Web Services and Microsoft Azure, the LoginRadius platform is inherently insulated from the business and commercial impacts of the virus. </p>\n<p>This includes impacts from regional staffing and manpower shortages or disruptions in global supply chains.</p>\n<p>We have been working for several weeks with impromptu and scheduled drills to help ensure that operations run without disruption in the eventuality of an outbreak or other critical event which may impact our organization.</p>\n<p><strong>Business Operations</strong></p>\n<p>Similarly, we have rolled out remote working policies for all LoginRadius team members. Employees can work offsite as they would on-premises, guaranteeing no disruption to business operations, including our customer-facing sales, customer success, support, and account management teams.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>We place the highest value on the partnerships that we've established with our customers and stakeholders. Rest assured, we are committed to ensuring uninterrupted success, even in times of hardship and challenges.</p>\n<p>In the end, we wish our customers health, security, and good fortune.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABWElEQVQY0z2Ru04DMRBF97Oo+QFKUiEoERWUNPANFJSkSMNDQoKCPhJIQSEvFCJIFBQISdin1157nwmXsVew0mjnjjxn5tpWJCVUHCNJU6QUxbKA4ALMcfCzWiEvCmR5jjTLkOcZPCExdkIwGcNjIXgUmd44SUxYGliGogJBqdmxPUjfwzLXkBKoDyulMHUZ7kczdL58dAZDfM7mZiEN1n/rT8xtF37IKZcIGIeiAZJy12cG6PgB6o02mt0+2r0+Hts9tJ4HaPZe8PDUxdt4Yja1JE39t0y2jDWyqbdlPIJUMQrSusboKobvHxhNpnglgIZoPf92qC8tNzR2CRoKAUW2dC6oJmi7hevBDZgZpr+T6jnWNnZQ2TvE9sExtvaPsF7ZxSZpj85pqOWSlYCsBmFoijPbKTXnmC5s0q65v5xs1xstAz27uEH18tbEae0Ktes7cKEfJ8EvgnS3Wjt63B0AAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CTA Graphics for Blogs V03 01 05 3 1024x310\"\n        title=\"CTA Graphics for Blogs V03 01 05 3 1024x310\"\n        src=\"/static/d66987b67542719567f4fddb41b0fe18/e5715/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.png\"\n        srcset=\"/static/d66987b67542719567f4fddb41b0fe18/a6d36/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.png 650w,\n/static/d66987b67542719567f4fddb41b0fe18/e5715/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.png 768w,\n/static/d66987b67542719567f4fddb41b0fe18/2bef9/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 17, 2020","updated_date":null,"description":"COVID-19 is a global epidemic which demands action that is decisive and robust.","title":"LoginRadius Announces Its Business Continuity Plan to Fight COVID-19 Outbreak","tags":["LoginRadius","industry-news"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/0cba9af333c5468f0d2da4b839d4d8da/6051d/loginradius-business-continuity.png","srcSet":"/static/0cba9af333c5468f0d2da4b839d4d8da/69585/loginradius-business-continuity.png 200w,\n/static/0cba9af333c5468f0d2da4b839d4d8da/497c6/loginradius-business-continuity.png 400w,\n/static/0cba9af333c5468f0d2da4b839d4d8da/6051d/loginradius-business-continuity.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"With population growth and municipal services expanding, cities need to get creative on how to provide services to all citizens without…","fields":{"slug":"/identity/unlock-the-future-of-smart-cities/"},"html":"<p>With population growth and municipal services expanding, cities need to get creative on how to provide services to all citizens without compromising the quality of service. A single platform is needed where all services are centralized and customer experience is taken into account. Below, we’ll look at some examples and best practices for municipalities to follow. </p>\n<p>As digital transformation transforms everyday life and interactions, cities are looking for ways to offer their services through online platforms. Cities are becoming “smarter” not to jump onto the technology bandwagon but in order to increase citizen engagement and serve them better. </p>\n<p>Residents are accustomed to 24/7, anywhere access to consumer products and services, and this expectation has bled over into government and municipal services. That’s why utility companies are also adapting their business models to work with new digital technology.</p>\n<p><a href=\"https://www.loginradius.com/registration-and-authentication/\">The LoginRadius Citizen Identity Platform</a> helps cities overcome these obstacles in three ways: </p>\n<ol>\n<li>\n<p>Centralizing online services: Cities need one unified self-service portal so that their constituents have a seamless, efficient experience as they access the services they need. The LoginRadius Identity Platform enables cities to centralize their customer-facing digital applications into one portal.  </p>\n<p>This single locus of access delivers a connected experience across multiple touchpoints and channels. LoginRadius has supported applications such as Account Summary, Customer Profile, Permit Applications and Bill Payment.   </p>\n</li>\n<li>\n<p>Helping maintain one digital identity across all customer service: What good is a centralized portal if citizens have to create multiple identities for individual web and mobile applications? Operating in this way creates identity silos that prevent a thorough view of the customer’s journey and preferences, which means the customer experience can’t be optimized for each individual.  </p>\n<p>Without a seamless user experience, engagement rates drop. But with <a href=\"https://www.loginradius.com/single-sign-on/\">LoginRadius Single Sign-on (SSO),</a> cities and companies can allow customers to access all applications within their platform with a single set of unified credentials, rather than having to separately register and log in to each service.   </p>\n</li>\n<li>\n<p>Integrating with third-party applications: Many public sector organizations have a hard time using customer data to improve the digital experience. The LoginRadius Identity Platform offers prebuilt integrations with over 150 third-party applications such as CRM, email marketing tools, online communities, payment systems and more.  </p>\n<p>This enables organizations to use that customer data to better understand their customers, offer more useful information and deliver that information more directly.</p>\n</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/surrey-case-study\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CS My City MySurrey 1024x310\"\n        title=\"CS My City MySurrey 1024x310\"\n        src=\"/static/74d44f3e4dc15fbc3851fa141c45e104/e5715/CS-My-City-MySurrey-1024x310.png\"\n        srcset=\"/static/74d44f3e4dc15fbc3851fa141c45e104/a6d36/CS-My-City-MySurrey-1024x310.png 650w,\n/static/74d44f3e4dc15fbc3851fa141c45e104/e5715/CS-My-City-MySurrey-1024x310.png 768w,\n/static/74d44f3e4dc15fbc3851fa141c45e104/2bef9/CS-My-City-MySurrey-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>The City of Surrey offers a great real-world example of what our Identity Platform can do. This bustling city in Metro Vancouver, British Columbia welcomes approximately 1,500 new residents per month – all in need of municipal services. The City was not able to expand its physical offices or add staff, so the solution was to move all services online.</p>\n<p>We’ve created a case study to show you how the LoginRadius Identity Platform helped the City of Surrey transform its online services and unlock its future as a smart city.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-demo-loginradius\"\n        title=\"Book-a-demo-loginradius\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/Book-a-demo-1024x310.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/Book-a-demo-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 13, 2020","updated_date":null,"description":"With population growth and the expansion of public services, cities need to be innovative about how to provide services to all people without compromising service quality. There is a need for a single platform where all facilities are centralised and customer experience is considered. Below, for municipalities to follow, we'll look at some examples and best practises.","title":"Unlock the Future of Smart Cities","tags":["digital transformation","digital identity","sso"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/29ce2162a588a4637c77eb9076493282/33aa5/future-of-smart-cities.jpg","srcSet":"/static/29ce2162a588a4637c77eb9076493282/f836f/future-of-smart-cities.jpg 200w,\n/static/29ce2162a588a4637c77eb9076493282/2244e/future-of-smart-cities.jpg 400w,\n/static/29ce2162a588a4637c77eb9076493282/33aa5/future-of-smart-cities.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"As the risk of data abuse is on the rise, more and more companies are seeking to adhere to the existing data privacy and regulatory…","fields":{"slug":"/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/"},"html":"<p>As the risk of data abuse is on the rise, more and more companies are seeking to adhere to the existing data privacy and regulatory compliances. </p>\n<p>From the EU’s General Data Protection Regulation (GDPR) to the recently released California's Consumer Privacy Act (CCPA), each regulation has a unique strategic imperative. </p>\n<ul>\n<li>The European Union’s GDPR came into force on May 25, 2018, to protect the personally identifiable information (PII) of its citizens. </li>\n<li>Likewise, on January 1, 2020, the California Consumer Privacy Act (CCPA) went live, affecting millions of companies with its share of new consumer rights.</li>\n</ul>\n<p>Businesses cannot afford to ignore these new policies. From a financial point of view, the  <a href=\"https://www.itgovernance.co.uk/dpa-and-gdpr-penalties\">European supervisory authorities</a> imposed as many as 133 administrative penalties by the end of 2019, which sums up to a massive fine of approximately €400 million (£337 million).</p>\n<p>Businesses need to understand that customers are the sole drivers of the economy, and a trusted relationship with them will lead to loyalty and boosted revenue generation.</p>\n<p>On a similar note, enterprises are often curious if LoginRadius, as a customer identity and access management (CIAM) platform, meets regulatory requirements of the popular data protection laws.</p>\n<p>Well yes, it does.</p>\n<p>Not just the infamous GDPR, LoginRadius also helps enterprises adhere to the recently active <a href=\"https://www.loginradius.com/blog/2019/05/ccpa-introduction/\">California Consumer Privacy Act (CCPA)</a>.</p>\n<p>But before we go any further, let’s understand a few things about the CIAM platform and the CCPA compliance.</p>\n<h2 id=\"what-does-it-take-to-make-the-perfect-ciam-platform\" style=\"position:relative;\"><a href=\"#what-does-it-take-to-make-the-perfect-ciam-platform\" aria-label=\"what does it take to make the perfect ciam platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What does it take to make the perfect CIAM platform?</h2>\n<p>Well, the driving force of CIAM lies in its ability to use data security as a tool for offering seamless customer experiences. </p>\n<p>Customer Identity and Access Management (CIAM) is a relatively new customer-focused business solution that collects, manages, and provides a secure and seamless access to customer's personal data.</p>\n<p>An ideal <a href=\"https://www.loginradius.com/blog/2019/06/perfect-ciam-platform/\">customer identity management platform</a> should include all the crucial components that drives an enterprise – from customers, suppliers, contractors, partners, employees to systems, applications, and devices.</p>\n<h2 id=\"what-is-the-california-consumer-privacy-act-ccpa\" style=\"position:relative;\"><a href=\"#what-is-the-california-consumer-privacy-act-ccpa\" aria-label=\"what is the california consumer privacy act ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is the California Consumer Privacy Act (CCPA)?</h2>\n<p>The California Consumer Privacy Act is a relatively new consumer privacy right enacted by the State of California. It comprises groundbreaking laws relating to contemporary business practices and the role of citizens in securing their personal data in the Golden State.</p>\n<p><a href=\"https://www.loginradius.com/gdpr-and-privacy/\">Like the GDPR</a>, these new regulations apply not only to California businesses but to all the companies that do business in the state.</p>\n<h3 id=\"what-does-the-ccpa-offer\" style=\"position:relative;\"><a href=\"#what-does-the-ccpa-offer\" aria-label=\"what does the ccpa offer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What does the CCPA offer?</h3>\n<ul>\n<li><strong>Ownership:</strong> Under CCPA, consumers will have the right to know what information businesses collect about them, and if need be, restrict them from sharing or selling their personal data.</li>\n<li><strong>No discrimination:</strong> CCPA does not allow businesses to discriminate against consumers who haven't approved of selling their data. Consequently, enterprises cannot impose additional charges or offer services with low quality to those consumers.</li>\n<li><strong>Security and protection:</strong> Under CCPA, companies are accountable for protecting the personal information of its consumers against potential data breaches.</li>\n</ul>\n<h3 id=\"what-rights-do-consumers-enjoy-under-ccpa\" style=\"position:relative;\"><a href=\"#what-rights-do-consumers-enjoy-under-ccpa\" aria-label=\"what rights do consumers enjoy under ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What rights do consumers enjoy under CCPA?</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"5 consumer rights under ccpa\"\n        title=\"5 consumer rights under ccpa\"\n        src=\"/static/5eb2c2748ed8c8e083580d96d9de4af9/e5715/image2.png\"\n        srcset=\"/static/5eb2c2748ed8c8e083580d96d9de4af9/a6d36/image2.png 650w,\n/static/5eb2c2748ed8c8e083580d96d9de4af9/e5715/image2.png 768w,\n/static/5eb2c2748ed8c8e083580d96d9de4af9/2bef9/image2.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"what-data-is-considered-personal-under-the-ccpa\" style=\"position:relative;\"><a href=\"#what-data-is-considered-personal-under-the-ccpa\" aria-label=\"what data is considered personal under the ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What data is considered personal under the CCPA?</h3>\n<ul>\n<li><strong>Direct identifiers</strong> like name, address, e-mail id, social security numbers, passport information, driver's license, and signature.</li>\n<li><strong>Unique identifiers</strong> like IP addresses, account id, cookies, pixel tags, beacons, and telephone numbers. </li>\n<li><strong>Internet activity identifiers</strong> like search history, advertisement, browsing history, etc.</li>\n<li><strong>Geolocation identifiers</strong> like location history.</li>\n<li><strong>Sensitive data</strong> like financial and medical history, religious or political views, sexual preferences, education data, etc.</li>\n<li><strong>Biometric identifiers</strong> like voice recordings, fingerprints, facial recognition, etc. </li>\n<li><strong>Commercial data</strong> like property records, products or services purchased, purchasing histories, etc.</li>\n</ul>\n<h3 id=\"is-ccpa-a-big-deal\" style=\"position:relative;\"><a href=\"#is-ccpa-a-big-deal\" aria-label=\"is ccpa a big deal permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Is CCPA a big deal?</h3>\n<p>Yes, CCPA is a big deal for companies that collect data from the residents of California – irrespective of where their business is located. </p>\n<p>Non-compliance may lead to hefty fines and rigid enforcements.</p>\n<h3 id=\"what-are-the-ccpa-penalties\" style=\"position:relative;\"><a href=\"#what-are-the-ccpa-penalties\" aria-label=\"what are the ccpa penalties permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the CCPA penalties?</h3>\n<p>The maximum penalty for unintentional violations is $2,500 USD, while for intentional violations, it may go as high as $7,500 USD. Consumers may also take legal action against companies and can sue them individually for each breach.</p>\n<h2 id=\"does-ccpa-apply-to-your-business\" style=\"position:relative;\"><a href=\"#does-ccpa-apply-to-your-business\" aria-label=\"does ccpa apply to your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Does CCPA apply to your business?</h2>\n<p>If your business or organization answers positively to any one of the following criteria, you are required to comply with the CCPA.</p>\n<ul>\n<li>Does your business earn annual gross revenue of more than $25 million USD?</li>\n<li>Do you buy, sell, or share data of 50,000 or more consumers for commercial intent?</li>\n<li>Does your business earn 50% or more of its revenue by selling consumers' personal information?</li>\n</ul>\n<p>Remember: Non-profit or small companies that do not meet the income threshold do not require to comply.</p>\n<h2 id=\"can-ccpa-optimize-user-experience\" style=\"position:relative;\"><a href=\"#can-ccpa-optimize-user-experience\" aria-label=\"can ccpa optimize user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Can CCPA optimize user experience?</h2>\n<p>Today, consumers have a lot of control over how companies shape their brand image and retain their businesses. </p>\n<p>When it comes to CCPA, the Californian data privacy law provides some excellent opportunities to gain an advantage over customer experience. </p>\n<p>Wondering how? Let’s find out.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CCPA optimize user experience\"\n        title=\"CCPA optimize user experience\"\n        src=\"/static/025350e3c90b15c5cbeb9adbf8f3529f/e5715/image3.png\"\n        srcset=\"/static/025350e3c90b15c5cbeb9adbf8f3529f/a6d36/image3.png 650w,\n/static/025350e3c90b15c5cbeb9adbf8f3529f/e5715/image3.png 768w,\n/static/025350e3c90b15c5cbeb9adbf8f3529f/2bef9/image3.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>1. CCPA ensures improved data security.</strong></p>\n<p>The repercussions of not adhering to international compliance protocols aren’t limited to privacy issues. Apart from the apparent loss of customer trust, it results in revenue losses and possible fines. </p>\n<p>A data protection law as stringent as the CCPA gives consumers the confidence and trust to share their sensitive data online. Simply because consumers can easily find out what data is collected, stored, and disclosed to others.</p>\n<p><strong>2. CCPA builds trust with consent management.</strong></p>\n<p>With a plethora of cases on identity theft and data disclosure by big shot conglomerates, consumers find it challenging to trust enterprises with their personal data. </p>\n<p>Enterprises willing to build sustainable relations with their consumers need to understand the importance of privacy. </p>\n<p>Consumers should have the freedom to view or upgrade their consent approval. If the need arises, they should be allowed the right to withdraw their consent too.</p>\n<p>As such, CCPA requires enterprises to display easy-to-understand consent requests, so consumers know what they are getting into.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP The CCPA and Customer Identity Reaping the Benefits of Compliance\"\n        title=\"WP The CCPA and Customer Identity Reaping the Benefits of Compliance\"\n        src=\"/static/f33233280c3b9df57a5a3b7ae3a84b9e/e5715/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.png\"\n        srcset=\"/static/f33233280c3b9df57a5a3b7ae3a84b9e/a6d36/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.png 650w,\n/static/f33233280c3b9df57a5a3b7ae3a84b9e/e5715/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.png 768w,\n/static/f33233280c3b9df57a5a3b7ae3a84b9e/2bef9/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>3. CCPA allows frictionless identity management.</strong></p>\n<p>When it comes to enterprise-class identity management, factors like compliance and security play a critical role. </p>\n<p>In the data-driven world, a CCPA-regulated customer identity and data management solution can seek consent and record permissions before processing any data.</p>\n<h2 id=\"how-loginradius-identity-solution-assists-enterprises-with-ccpa-compliance\" style=\"position:relative;\"><a href=\"#how-loginradius-identity-solution-assists-enterprises-with-ccpa-compliance\" aria-label=\"how loginradius identity solution assists enterprises with ccpa compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius’ Identity Solution assists enterprises with CCPA compliance</h2>\n<p>LoginRadius is a <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> solution that provides a 360-degree view of customers for a seamless collection, storage, management, and protection of personal data.</p>\n<p>It helps companies meet CCPA regulatory requirements without compromising the user experience. Its one-of-a-kind data protection features include client registration, sign-in, authentication, single sign-on, data governance, and consent management, among others.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image4\"\n        title=\"image4\"\n        src=\"/static/8cb2999d48dae5d10fb01ad372737e9f/e5715/image4.png\"\n        srcset=\"/static/8cb2999d48dae5d10fb01ad372737e9f/a6d36/image4.png 650w,\n/static/8cb2999d48dae5d10fb01ad372737e9f/e5715/image4.png 768w,\n/static/8cb2999d48dae5d10fb01ad372737e9f/d0143/image4.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The following capabilities further help enterprises meet privacy compliance regulations.</p>\n<ul>\n<li>Clear and specific statement of consent.</li>\n<li>Registration and progressive profiling. </li>\n<li>Data record and access permissions. </li>\n<li>Deletion of data. </li>\n<li>User identity and access management. </li>\n<li>Management of centralized access control.</li>\n<li>Age verification mechanism.</li>\n</ul>\n<p>There’s more.</p>\n<p>LoginRadius enforces a set of policies, procedures, programs, and standards for effective security management. It aims to offer a risk-free organizational setup by safeguarding customer's data against potential breaches.</p>\n<p>The identity solution is designed with a cloud-native architecture and complies with the <a href=\"https://www.loginradius.com/compliances-list/\">major security assurance programs</a> including:</p>\n<ol>\n<li>OpenID - End-user identity verification supported by OAuth 2.0 protocol</li>\n<li>PCI DSS PCI SSC administered standard for payment transactions</li>\n<li>ISO 27001:2013 - Information security management system</li>\n<li>ISO 27017:2015 - Information security for cloud services</li>\n<li>AICPA SOC 2 (Type II) - System-level controls for Trust Services Criteria - security, availability, process integrity, confidentiality, and privacy </li>\n<li>ISAE 3000 - International attestation standard for assurance over non-financial information </li>\n<li>NIST Cybersecurity Framework - Standardized security framework to manage and reduce cybersecurity risk.  </li>\n<li>CSA CCM Level 1, Level 2 - STAR Self-Assessment, STAR Certification, STAR Attestation, and C-STAR Assessment.</li>\n<li>CIS Critical Security Controls Global standards for internet security</li>\n<li>US Privacy Shield Complaint resolution for EEA citizens</li>\n<li>ISO/IEC 27018:2019 - PII Protection</li>\n</ol>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Consumers expect the privacy and security of their personal data, and it is the responsibility of enterprises to build and maintain a trusted relationship. Recent data breaches and identity thefts highlight the importance of data protection laws and compliance like <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">CCPA and GDPR</a>. </p>\n<p>With an identity solution like LoginRadius, you can eliminate lengthy processes that ruin the user experience, and still maintain international governance over data privacy. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 06, 2020","updated_date":null,"description":"As the risk of data misuse is rising, more and more enterprises are trying to comply with current data protection and regulatory enforcement.","title":"How LoginRadius Helps Enterprises Stay CCPA Compliant in 2020","tags":["data privacy","compliance","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/cf7af05a8ffbcaa4f6b55b5d2150738d/33aa5/ccpa-compliant.jpg","srcSet":"/static/cf7af05a8ffbcaa4f6b55b5d2150738d/f836f/ccpa-compliant.jpg 200w,\n/static/cf7af05a8ffbcaa4f6b55b5d2150738d/2244e/ccpa-compliant.jpg 400w,\n/static/cf7af05a8ffbcaa4f6b55b5d2150738d/33aa5/ccpa-compliant.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Social login, also termed as social sign-in or social sign-on, allows your consumers to login and register with a single click…","fields":{"slug":"/identity/what-is-social-login/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Social login, also termed as social sign-in or social sign-on, allows your consumers to login and register with a single click on a website or mobile application using their existing accounts from various social providers. It simplifies the sign-in and <a href=\"https://www.loginradius.com/authentication/\">registration experiences</a>, providing a convenient alternative method to create an account where it is mandatory.</p>\n<ul>\n<li>For consumers, social login is a single-click login method for accessing the website and mobile application—one that there is no need for excess credentials and allows consumers to skip traditional registration methods.</li>\n<li>Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization.</li>\n</ul>\n<h2 id=\"how-does-social-login-work\" style=\"position:relative;\"><a href=\"#how-does-social-login-work\" aria-label=\"how does social login work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Social Login Work?</h2>\n<p>You may be thinking about how does social login work? Well, social login is a quick and convenient way for users to log into websites using their existing social media accounts. Instead of creating a new account on the website, users can simply click a button to sign in with their Facebook, Google, or other social media account.</p>\n<p>When a user clicks on the social login button, the website will redirect the user to the chosen social media platform's login page. After the user logs in, the social media platform sends back the user's data to the website. This data can include the user's name, email address, profile picture, and any other information the user has authorized the website to access. Let’s understand more about  login with social media and its aspects. </p>\n<h2 id=\"how-do-popular-social-login-platforms-compare\" style=\"position:relative;\"><a href=\"#how-do-popular-social-login-platforms-compare\" aria-label=\"how do popular social login platforms compare permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do Popular Social Login Platforms Compare?</h2>\n<p>Some of the most popular social login platforms include Facebook, Google, Twitter, LinkedIn, and Microsoft. Each platform has its own strengths and weaknesses.</p>\n<p>Facebook is the most popular social login platform, with over 2 billion active users worldwide. It provides a wide range of user data, including the user's name, email address, profile picture, and interests.</p>\n<p>Google is also a popular social login platform, with over 1 billion active users. It provides similar data to Facebook, but also allows users to log in with their Google+ account.</p>\n<p>For detailed information about the login preferences, you can <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">download</a> our <strong>Consumer Digital Identity Trend Report 2022.</strong></p>\n<p>Twitter is popular among younger users, but it provides less user data than Facebook or Google. LinkedIn is popular among professionals, and it provides more detailed professional information about the user.</p>\n<h2 id=\"why-should-businesses-use-social-login\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-social-login\" aria-label=\"why should businesses use social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Use Social Login?</h2>\n<p>Social login and registration provide benefits in various ways:</p>\n<ul>\n<li>Log in via a third-party web page or Facebook or Google accounts can be done with just a few clicks on the button. This is a much faster way to access the sites and mobile applications than filling out the complete registration form as in traditional login.</li>\n<li>Social login reduces the effort to remember passwords, which means people don’t need to create and keep track of more credentials, lessening password fatigue and login failure.</li>\n</ul>\n<p><a href=\"https://www.google.com/url?q=https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABhElEQVQY00WRzS9jURjGb0S42qIxvml9ldL6ihj3akdbtLRhhliQ+orEjqRsrBALK//IxIZkRjKCiQUrGzsbCyS+1k1rOf15782UxS/nvOd9zvO8J0cpaPmGgcU9gLU1gE2wuqU2zlr8ZPsGqsuHxTtEqT7Jl65hCtrDqK1B1GY/6n+NkjUr7xikxO2nyNVPiSdETW+Miu4Idm/IvGCaymrtCOMciuMJz2DRplA7Rz+CDZ2S3dR/jaHHZukMTWGXAJs3QpkvTrHn07BaNE59XMKiVAm1glMbw6GNUyzB+YahOa7QFpjEPzaPFo3jHZjA1f+d5uA0pV3hzwmF8p4RasWkTvoOMa8U00JP8ENjTpjboHPw55xUKsXd/QOPT8+8vLyadWRulZz6PpSaHlY297i5vePw+Jyfv07Y/33KxdU1Z5dX2NsHyWvyoVjkA3IbdY7+XgAZkskkb+k0aSGT+Ud0MYHi6DU12o8lVrb2mF/bZjaxxVxim+WNXRbWd7C1BcwnvwMxVd+jwVpfMQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"sso\"\n        title=\"sso\"\n        src=\"/static/7458970eb16da6d73777c9db1781c155/e5715/sso.png\"\n        srcset=\"/static/7458970eb16da6d73777c9db1781c155/a6d36/sso.png 650w,\n/static/7458970eb16da6d73777c9db1781c155/e5715/sso.png 768w,\n/static/7458970eb16da6d73777c9db1781c155/63ff0/sso.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li>Consumers feel more comfortable sharing the data via the social platform on which they already have trust compared to unknown sites. Social login provides a recognizable, uniform method of account logging.</li>\n<li>Data collection can be automated. Each time a visitor logs in on the site, our APIs retrieve the consumer’s updated profile information.</li>\n</ul>\n<h2 id=\"how-is-social-login-useful-for-business\" style=\"position:relative;\"><a href=\"#how-is-social-login-useful-for-business\" aria-label=\"how is social login useful for business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Social Login Useful for Business?</h2>\n<p>By providing the <a href=\"https://www.loginradius.com/social-login/\">social login on your site</a>, consumers and visitors can experience a better UX/UI. Almost everyone is perpetually logged in on their social accounts, especially to their Facebook and Google accounts, sites, and apps (ecommerce or otherwise).</p>\n<p>The following are a few benefits of social login for businesses:</p>\n<ol>\n<li>Visitors can save time by not requiring them to create yet another profile.</li>\n<li>Increase the chances of converting leads to consumers and speed up the business/sale by doing #1.</li>\n<li>Speed up consumer service and support.</li>\n<li>Data collection of visitors and consumers can be automated to build profiles and personas.</li>\n<li>Personalize the site for visitors and run future promotions using info gathered by doing automation.</li>\n<li>Trust can be created by showing visitors and consumers reviews of your product written by their friends/family on the social network they use to log in.</li>\n<li>Increase reach, generate brand awareness, and build communities by harnessing various social platforms.</li>\n<li>Also, businesses can run loyalty and referral programs with social invites.</li>\n</ol>\n<h2 id=\"how-to-implement-social-login\" style=\"position:relative;\"><a href=\"#how-to-implement-social-login\" aria-label=\"how to implement social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Social Login?</h2>\n<p>Social Login can be implemented with the following method:</p>\n<ul>\n<li>To implement the social login with the UI’s help, you need to configure the Social Provider. For more information on this, visit : <a href=\"https://www.loginradius.com/docs/authentication/quick-start/social-login/#partconfiguration1\">Social Login Configuration</a>.</li>\n<li>If you want to implement the Social Login with the JS interface’s help, the following URL will help you: <a href=\"https://www.loginradius.com/docs/authentication/quick-start/social-login/#partdeployment4\">Deployment</a>.</li>\n</ul>\n<h2 id=\"what-are-the-benefits-of-social-login\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-social-login\" aria-label=\"what are the benefits of social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Benefits of Social Login?</h2>\n<p>There are several benefits to using social login on your website. First, it provides a convenient and quick way for users to log in without having to create a new account. This can increase conversion rates and reduce the number of abandoned carts or forms.</p>\n<p>Second, social login can help you gather more data about your users. This data can be used to personalize the user experience, send targeted marketing messages, and <a href=\"https://www.loginradius.com/blog/growth/how-customer-retention-can-help-businesses-grow/\">improve customer retention</a>.</p>\n<p>Third, when we talk about social security login, social login can increase the security of your website by reducing the number of passwords users have to remember. Users are more likely to choose weak or easy-to-guess passwords if they have to remember multiple passwords for different websites.</p>\n<h2 id=\"how-to-implement-social-login-and-is-it-worth-implementing\" style=\"position:relative;\"><a href=\"#how-to-implement-social-login-and-is-it-worth-implementing\" aria-label=\"how to implement social login and is it worth implementing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Social Login and Is It Worth Implementing?</h2>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\">Implementing social login</a> on your website is relatively easy, especially if you use a third-party service like LoginRadius. LoginRadius provides a range of social login options, including Facebook, Google, Twitter, LinkedIn, and more.</p>\n<p>To implement social login, you will need to add social login buttons to your website and integrate them with your existing login system. You may also need to make some changes to your website's privacy policy and terms of service.</p>\n<p>Whether or not social login is worth implementing depends on your website and your users. If your website is focused on e-commerce or requires users to log in frequently, social login can be a great way to increase conversion rates and improve user experience. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about applying a Social Login on consumers websites and how it will enhance businesses. This feature allows consumers to login via social providers and removes the hassle to remember new passwords for different websites. However, before implementing any functionality on a website, analyze and consider the pros and cons from every possible angle.</p>\n<p>Cheers!</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p>1.<strong>Which is the most popular social login?</strong></p>\n<p>According to the <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">Consumer Identity Trend Report 2022</a>, 26.84% of users prefer social login. And Facebook login is the most popular social login method. </p>\n<p>2.<strong>What is a social login app?</strong></p>\n<p>Social login enables you to authenticate your users on your website or application using their existing social media profiles on your website or application. The most common login using social media are from platforms, including login include Facebook, Gmail, Instagram, etc. </p>\n<p>3.<strong>What data do you get with social login?</strong></p>\n<p>Social login provides you with a deep insight into your customer behavior and preferences that helps you create personalized customer journeys and aggressive <a href=\"https://www.loginradius.com/blog/growth/advantage-social-login-as-marketer/\">marketing campaigns</a>.</p>\n<p><strong>4. Who uses social login?</strong></p>\n<p>Social login is utilized by websites and applications to allow users to log in using their existing social media accounts.</p>\n<p><strong>5.  How to do social login?</strong></p>\n<p>Users can perform social login by clicking on the respective social media button on the website or application's login page and following the authentication prompts provided by the chosen social media platform.</p>\n<p><strong>6. How to use Facebook for social login?</strong></p>\n<p>Facebook login can be integrated with your website or mobile application for seamless login by using the <a href=\"https://www.loginradius.com/social-login/\">LoginRadius CIAM</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 28, 2020","updated_date":null,"description":"Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization.","title":"What is Social Login?","tags":["social login","identity verification","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0f72c20c3978105eb6bcabdc4e0e06d3/33aa5/social-login.jpg","srcSet":"/static/0f72c20c3978105eb6bcabdc4e0e06d3/f836f/social-login.jpg 200w,\n/static/0f72c20c3978105eb6bcabdc4e0e06d3/2244e/social-login.jpg 400w,\n/static/0f72c20c3978105eb6bcabdc4e0e06d3/33aa5/social-login.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vaibhav Jain","github":null,"avatar":null}}}},{"node":{"excerpt":"Identity as a Service (IDaaS) can be a game-changer for your business—but only if you know how to play it right.  Speaking of which, the…","fields":{"slug":"/identity/identity-as-a-service-for-business/"},"html":"<p>Identity as a Service (IDaaS) can be a game-changer for your business—but only if you know how to play it right. </p>\n<p>Speaking of which, the term identity refers to characteristics that make an entity recognizable. Likewise, <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">digital identity refers</a> to attributes that identify people, organizations, or other entities online.</p>\n<p>With more and more businesses migrating to the cloud, the demand for <a href=\"https://www.loginradius.com/authentication/\">seamless authentication of digital identities</a> has reached a critical point.</p>\n<p>Experts predict a massive change in the way enterprises handle <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) within the next decade. </p>\n<p>By 2022, Identity as a Service (IDaaS) solutions is expected to grow the identity and access management space to a <a href=\"https://www.gartner.com/account/signin?method=initialize&#x26;TARGET=http%253A%252F%252Fwww.gartner.com%252Fdocument%252Fcode%252F369430\">$13.42 billion property</a>. Hence, <em>now</em> is the best time to invest in a secure, highly accessible, simplified, low-risk solution like IDaaS.</p>\n<h2 id=\"what-is-identity-as-a-service-idaas\" style=\"position:relative;\"><a href=\"#what-is-identity-as-a-service-idaas\" aria-label=\"what is identity as a service idaas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity as a Service (IDAAS)? </h2>\n<p>Identity as a service (IDaaS) refers to identity and access management services that are offered through the cloud or via SaaS (software-as-a-service) systems. It offers cloud-based authentication delivered and operated by third-party providers on a subscription basis.</p>\n<p>In short, IDaaS helps manage digital identities so that the right users can access the resources that are meant for them.</p>\n<p>IDaaS is a win-win for both businesses and their customers. With modern IDaaS access features, there’s no need for end-users to remember multiple account credentials. Likewise, system administrators can reduce the number of user accounts they have to manage. </p>\n<h2 id=\"3-benefits-of-identity-as-a-service-idaas-for-developers\" style=\"position:relative;\"><a href=\"#3-benefits-of-identity-as-a-service-idaas-for-developers\" aria-label=\"3 benefits of identity as a service idaas for developers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Benefits of Identity as a Service (IDAAS) for Developers</h2>\n<p>As an application developer, you must see features like registration, authentication, and account recovery as opportunities to <a href=\"https://www.loginradius.com/customer-experience-solutions/\">better customer experiences</a>. But, that’s not it. The following are three important benefits of IDaaS for developers.</p>\n<h3 id=\"decentralization-of-identity\" style=\"position:relative;\"><a href=\"#decentralization-of-identity\" aria-label=\"decentralization of identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Decentralization of identity</h3>\n<p>IDaaS allows application developers to decentralize the user identity from the application. This leads to the following advantages for developers.</p>\n<ul>\n<li>If there is no need for the user identity information any longer, there's no point in storing it in their databases.</li>\n<li>The identity of a user does not resonate with the application, and all developers should care about is a unique identifier.</li>\n<li>The <a href=\"https://www.loginradius.com/blog/2019/06/perfect-ciam-platform/\">CIAM platform</a> will also manage the non-feature work like user CRUD, password CRUD, etc. That's another burden of the load.</li>\n</ul>\n<p>By letting an external service handle identity and authentication, developers can focus on bringing more value to the business. </p>\n<h3 id=\"idaas-is-api-based\" style=\"position:relative;\"><a href=\"#idaas-is-api-based\" aria-label=\"idaas is api based permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IDaaS is API-based </h3>\n<p>One of the core competencies of IDaaS is that they are API-first. Interestingly, most of these third parties provide on-demand expertise that would otherwise become more time-consuming and resource-heavy, if developed in-house.</p>\n<p>By leveraging APIs, developers can add them to their existing technology and save a significant amount of time.</p>\n<h3 id=\"bridge-the-gap-between-developer-and-security-teams\" style=\"position:relative;\"><a href=\"#bridge-the-gap-between-developer-and-security-teams\" aria-label=\"bridge the gap between developer and security teams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bridge the gap between developer and security teams</h3>\n<p>With developers constantly bugged to build revenue-generating apps in shorter deadlines, IDaaS allows them to get the job done quickly, and simultaneously create high quality and secure output. </p>\n<p>Furthermore, IDaaS has the potential to deliver a secure, streamlined on-demand identity expertise. Such strategies can also do a great deal to reduce internal tension and eventually bridge the gap between developers and the security workforce.</p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Guide-to-Modern-Customer-Identity-ebook\"\n        title=\"Guide-to-Modern-Customer-Identity-ebook\"\n        src=\"/static/e791aaca3b019b248226fc631382c30c/e5715/EB-Guide-to-Modern-Customer-Identity-1024x310.png\"\n        srcset=\"/static/e791aaca3b019b248226fc631382c30c/a6d36/EB-Guide-to-Modern-Customer-Identity-1024x310.png 650w,\n/static/e791aaca3b019b248226fc631382c30c/e5715/EB-Guide-to-Modern-Customer-Identity-1024x310.png 768w,\n/static/e791aaca3b019b248226fc631382c30c/2bef9/EB-Guide-to-Modern-Customer-Identity-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"3-benefits-of-identity-as-a-service-idaas-for-businesses\" style=\"position:relative;\"><a href=\"#3-benefits-of-identity-as-a-service-idaas-for-businesses\" aria-label=\"3 benefits of identity as a service idaas for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Benefits of Identity as a Service (IDaaS) for Businesses</h2>\n<p>A comprehensive IDaaS solution brings a plethora of benefits to the entire business environment. There's agility, security, and efficiency, to name a few. Some other advantages include:</p>\n<h3 id=\"freedom-to-choose\" style=\"position:relative;\"><a href=\"#freedom-to-choose\" aria-label=\"freedom to choose permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Freedom to choose</h3>\n<p>IDaaS allows businesses the freedom to choose the right IT resources that fit them and their customers. When they have the best tool to get their job done, that leads to better agility and increased speed. The outcome? A competitive position in the market.</p>\n<h3 id=\"increase-in-productivity\" style=\"position:relative;\"><a href=\"#increase-in-productivity\" aria-label=\"increase in productivity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Increase in productivity</h3>\n<p>IDaaS offers the liberty to businesses to manage their IT environment from a single platform. There's less scope for human error too. With a comprehensive identity solution, they can let their customers access multiple web properties with a <a href=\"https://www.loginradius.com/blog/2019/11/benefits-single-sign-on-sso/\">single set of credentials</a>. This leads to increased productivity and better security. </p>\n<h3 id=\"stronger-security\" style=\"position:relative;\"><a href=\"#stronger-security\" aria-label=\"stronger security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stronger security</h3>\n<p>A modern IDaaS solution secures identities and protects your IT environment. With features like MFA, SSO, and password complexity, businesses can control access and increase security. Needless-to-say, with identities being the epicenter of every cyberattack, identity security features such as these are instrumental in <a href=\"https://www.loginradius.com/blog/2019/12/digital-privacy-best-practices/\">safeguarding your digital properties</a>. </p>\n<h2 id=\"7-core-components-of-idaas-in-an-enterprise-environment\" style=\"position:relative;\"><a href=\"#7-core-components-of-idaas-in-an-enterprise-environment\" aria-label=\"7 core components of idaas in an enterprise environment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Core Components of IDaaS in an Enterprise Environment </h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"imgae2 1024x621\"\n        title=\"imgae2 1024x621\"\n        src=\"/static/2bb9d05df8d45cd811e7cc61768996b1/212bf/imgae2-1024x621.jpg\"\n        srcset=\"/static/2bb9d05df8d45cd811e7cc61768996b1/6aca1/imgae2-1024x621.jpg 650w,\n/static/2bb9d05df8d45cd811e7cc61768996b1/212bf/imgae2-1024x621.jpg 768w,\n/static/2bb9d05df8d45cd811e7cc61768996b1/72e01/imgae2-1024x621.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The features and functionalities of an Identity as a Service solution vary across all market segments but generally include digital identity access and management. Here are some of the most common components.</p>\n<h3 id=\"1-cloud-based-and-multi-tenant-architecture\" style=\"position:relative;\"><a href=\"#1-cloud-based-and-multi-tenant-architecture\" aria-label=\"1 cloud based and multi tenant architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Cloud-based and multi-tenant architecture</h3>\n<p>A typical IDaaS vendor will operate a <a href=\"https://www.loginradius.com/multi-tenant-cloud/\">multi-tenant service</a> delivery model. The vendor will issue updates and performance enhancement requests whenever these become available. </p>\n<h3 id=\"2-password-management-and-authentication\" style=\"position:relative;\"><a href=\"#2-password-management-and-authentication\" aria-label=\"2 password management and authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Password management and authentication</h3>\n<p>IDaaS service taps all the points of an ideal identity and access management platform. It includes maintaining features like multi-factor authentication and biometric access across all access points. </p>\n<h3 id=\"3-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#3-single-sign-on-sso\" aria-label=\"3 single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Single Sign-On (SSO)</h3>\n<p>When it comes to customer identity and access management, <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on</a> is a vital feature. </p>\n<p>SSO is designed to maximize the end-user experience while simultaneously maintaining the security of a network. With SSO, users are encouraged to use strong password combinations to access their everyday IT services. </p>\n<p>In an Identity as a service environment, SSO allows <a href=\"https://www.loginradius.com/single-sign-on/\">enterprises to secure authentication</a> for third-party services without requiring an internal IT department’s involvement.</p>\n<h3 id=\"4-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#4-multi-factor-authentication\" aria-label=\"4 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication (MFA)</a> is associated with Identity as a Service and is occasionally referred to as two-factor authentication. Using multiple factors for authentication helps prevent data breaches, making it one of the best ways to protect digital identities.</p>\n<p>Other examples of how MFA works include Google 2-Step Verification and Microsoft Authenticator. Both work on the TOTP (time-based one-time password) mechanism. </p>\n<p>Biometrics uses the \"inheritance\" as a means of verification—meaning something the user is. </p>\n<p>SMS and voice verifications are also popular multi-factor authentication methods. Iris or retina recognition, fingerprint, hand, thumbprints, full facial recognition, and DNA usage are catching up too. </p>\n<h3 id=\"5-automated-approval-workflows\" style=\"position:relative;\"><a href=\"#5-automated-approval-workflows\" aria-label=\"5 automated approval workflows permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Automated approval workflows</h3>\n<p>Identity as a Service also utilizes automated approval workflows. These workflows help IT admins to:</p>\n<ul>\n<li>Offer access privileges to multiple apps.</li>\n<li>Enforce GUI-based configuration capabilities. </li>\n<li>Manage user-account provisioning.</li>\n<li>Follow <a href=\"https://www.loginradius.com/data-governance/\">governance frameworks</a> for risk assessment.</li>\n</ul>\n<h3 id=\"6-analytics-and-intelligence\" style=\"position:relative;\"><a href=\"#6-analytics-and-intelligence\" aria-label=\"6 analytics and intelligence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Analytics and Intelligence</h3>\n<p>Using analytics and intelligence capabilities in IDaaS lets enterprises report misuse related to access privileges. This makes it easier to detect anomalies in user functions and data usage. </p>\n<h3 id=\"7-governance-and-compliance\" style=\"position:relative;\"><a href=\"#7-governance-and-compliance\" aria-label=\"7 governance and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Governance and Compliance</h3>\n<p>Enterprises can leverage the intelligence capabilities of an Identity as a Service platform to manage <a href=\"https://www.loginradius.com/blog/2020/07/data-governance-best-practices/\">governance and compliance</a>-related workflows. Real-world authentication processes can be aligned with governance policies to mitigate security risk.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image 3 1 1024x621\"\n        title=\"image 3 1 1024x621\"\n        src=\"/static/897b6b8863ef02441d99b8a379bf2003/212bf/image-3-1-1024x621.jpg\"\n        srcset=\"/static/897b6b8863ef02441d99b8a379bf2003/6aca1/image-3-1-1024x621.jpg 650w,\n/static/897b6b8863ef02441d99b8a379bf2003/212bf/image-3-1-1024x621.jpg 768w,\n/static/897b6b8863ef02441d99b8a379bf2003/72e01/image-3-1-1024x621.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"some-new-regulations-that-are-protecting-identities-include\" style=\"position:relative;\"><a href=\"#some-new-regulations-that-are-protecting-identities-include\" aria-label=\"some new regulations that are protecting identities include permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Some new regulations that are protecting identities include:</h2>\n<p><strong>1. General Data Protection Regulation (GDPR)</strong></p>\n<p>GDPR is the core of Europe's digital privacy legislation. It requires businesses to safeguard the personally identifiable information (PII) of the European Union citizens for transactions that occur within the member states. Failure to comply may cost dearly. Individual rights include: </p>\n<ul>\n<li>Right to be informed.</li>\n<li>Right of access.</li>\n<li>Right to rectification.</li>\n<li>Right to erasure.</li>\n<li>Right to restrict processing.</li>\n<li>Right to data portability.</li>\n<li>Right to object.</li>\n</ul>\n<p><strong>2. California Consumer Privacy Act (CCPA)</strong></p>\n<p>The CCPA is a state-level law that <a href=\"https://www.loginradius.com/blog/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">mandates that businesses</a> inform customers of their plan to monetize their data, and provide them with a clear means of opting out, whenever required. Any violation can lead to hefty fines. A few other requirements include:</p>\n<ul>\n<li>Businesses must disclose what information they collect.</li>\n<li>Businesses must delete customer data upon request. </li>\n<li>Customers can opt-out of their data being sold.</li>\n</ul>\n<h2 id=\"5-reasons-why-loginradius-idaas-is-the-right-fit-for-your-enterprise\" style=\"position:relative;\"><a href=\"#5-reasons-why-loginradius-idaas-is-the-right-fit-for-your-enterprise\" aria-label=\"5 reasons why loginradius idaas is the right fit for your enterprise permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Reasons Why LoginRadius IDaaS Is the Right Fit for Your Enterprise</h2>\n<p>In a world that’s swiftly migrating to the cloud, the LoginRadius IDaaS provider is positioned to <a href=\"https://www.loginradius.com/security/\">combine both security</a> and ease-of-use in solving emerging business needs for enterprise-level organizations. </p>\n<p>Here’s what LoginRadius IDaaS can do for your digital enterprise. </p>\n<h3 id=\"1-faster-implementation\" style=\"position:relative;\"><a href=\"#1-faster-implementation\" aria-label=\"1 faster implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Faster implementation</h3>\n<p>LoginRadius IDaaS implementation in the cloud is fast and straightforward. Since servers are already <a href=\"https://www.loginradius.com/identity-api/\">installed in the cloud</a>, you only need to configure your chosen platform according to your IT protocols to get it up and running.</p>\n<h3 id=\"2-easy-third-party-integrations\" style=\"position:relative;\"><a href=\"#2-easy-third-party-integrations\" aria-label=\"2 easy third party integrations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Easy third-party integrations</h3>\n<p>A cloud-based Identity as a Service platform like LoginRadius easily integrates with <a href=\"https://www.loginradius.com/cloud-integrations/\">3rd-party apps</a>. You can also add or remove any feature from your existing CIAM environment at any time, such as MFA, SSO, or <a href=\"https://www.loginradius.com/blog/2019/02/presenting-progressive-profiling-loginradius/\">Progressive Profiling</a>.</p>\n<h3 id=\"3-seamless-data-migration\" style=\"position:relative;\"><a href=\"#3-seamless-data-migration\" aria-label=\"3 seamless data migration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Seamless data migration </h3>\n<p>Transferring identity data to a new environment in the cloud may seem daunting to the uninitiated. LoginRadius provides customers with <a href=\"https://www.loginradius.com/blog/2020/07/loginradius-identity-import-manager-data-migration/\">data migration software</a>, and sets up and executes the migration for a seamless, hassle-free transfer.</p>\n<h3 id=\"4-passwordless-authentication\" style=\"position:relative;\"><a href=\"#4-passwordless-authentication\" aria-label=\"4 passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Passwordless Authentication </h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">Passwordless Authentication</a> deters cybercriminals by reducing the risk of password sprawl. With the LoginRadius IDaaS platform, you can set up secure, passwordless authentication and secure password resets.</p>\n<h3 id=\"5-no-need-for-ciam-experts\" style=\"position:relative;\"><a href=\"#5-no-need-for-ciam-experts\" aria-label=\"5 no need for ciam experts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. No need for CIAM experts</h3>\n<p>CIAM experts are an asset to any company when it comes to implementing IDaaS and securing customer identities. Luckily, onboarding a CIAM expert isn’t necessary when using Identity as a Service. With LoginRadius CIAM, we are with you every step of the way in your digital transformation.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>There is a lot of anticipation about Identity as a Service in solving real-world business problems. It is important, and no, you cannot mess it up. Because then, you will be out of business. No wonder, IDaaS has already entered the mainstream and will continue growing from here.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 25, 2019","updated_date":null,"description":"Identity as a service (IDaaS) refers to services provided via the cloud or through SaaS (software-as-a-service) systems for identity and access management. It provides cloud-based authentication provided and managed on a subscription basis by third-party providers.","title":"Identity as a Service (IDAAS): Managing Digital Identities (Updated)","tags":["idaas","digital identity management","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/95a2b0e01482fb960001833820621b4c/33aa5/idaas-business.jpg","srcSet":"/static/95a2b0e01482fb960001833820621b4c/f836f/idaas-business.jpg 200w,\n/static/95a2b0e01482fb960001833820621b4c/2244e/idaas-business.jpg 400w,\n/static/95a2b0e01482fb960001833820621b4c/33aa5/idaas-business.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"These days, businesses have an understanding of security hygiene and the risks of using insecure passwords.  Yet, the password management…","fields":{"slug":"/identity/worst-passwords-list-2019/"},"html":"<p>These days, businesses have an understanding of security hygiene and the risks of using insecure passwords. </p>\n<p>Yet, the <em>password management struggle is real</em> and it is hitting businesses <em>hard</em>. </p>\n<p>Given the fact that stolen or reused passwords are responsible for 80% of <a href=\"https://www.helpnetsecurity.com/2019/10/10/poor-password-hygiene/\">hacking-related breaches</a>, it’s high time for businesses to fix their overall security posture and step up their cybersecurity game. </p>\n<p>While more and more businesses are taking this concern seriously and are implementing security measures like password management, <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a> (MFA), and <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, it is unfortunate that people still cling to poor password habits. </p>\n<p>NordPass came up with a database of 500 million leaked passwords and ranked them based on their usage in its list of worst passwords in 2019. Keep reading for some of the worst of the bunch. </p>\n<h2 id=\"the-top-51-worst-passwords-of-2019\" style=\"position:relative;\"><a href=\"#the-top-51-worst-passwords-of-2019\" aria-label=\"the top 51 worst passwords of 2019 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Top 51 Worst Passwords of 2019</h2>\n<p>In this list, you’ll recognize some old standbys like \"123456\" and \"password\" in the top spots. But there are some unexpected ones here, too. </p>\n<p>For example, passwords like zinch and g_czechout may seem harder to crack, yet they still made it to the 7th and 8th positions, respectively.</p>\n<p>You’ll also see popular female names like Jasmine or Jennifer. Another tactic is using a string of letters that forms a pattern or a line on the keyboard. Popular examples include asdfghjkl and 1qaz2wsx. </p>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"credential stuffing\"\n        title=\"credential stuffing\"\n        src=\"/static/091051c0e36ccf509c9dea986078f13a/e5715/credential-stuffing.png\"\n        srcset=\"/static/091051c0e36ccf509c9dea986078f13a/a6d36/credential-stuffing.png 650w,\n/static/091051c0e36ccf509c9dea986078f13a/e5715/credential-stuffing.png 768w,\n/static/091051c0e36ccf509c9dea986078f13a/63ff0/credential-stuffing.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Here they all are in top ranking order.  </p>\n<table>\n<thead>\n<tr>\n<th><strong>Rank</strong></th>\n<th><strong>Password</strong></th>\n<th><strong>Count</strong></th>\n<th></th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>1</td>\n<td>12345</td>\n<td>2812220</td>\n<td></td>\n</tr>\n<tr>\n<td>2</td>\n<td>123456</td>\n<td>2485216</td>\n<td></td>\n</tr>\n<tr>\n<td>3</td>\n<td>123456789</td>\n<td>1052268</td>\n<td></td>\n</tr>\n<tr>\n<td>4</td>\n<td>test1</td>\n<td>993756</td>\n<td></td>\n</tr>\n<tr>\n<td>5</td>\n<td>password</td>\n<td>830846</td>\n<td></td>\n</tr>\n<tr>\n<td>6</td>\n<td>12345678</td>\n<td>512560</td>\n<td></td>\n</tr>\n<tr>\n<td>7</td>\n<td>zinch</td>\n<td>483443</td>\n<td></td>\n</tr>\n<tr>\n<td>8</td>\n<td>g_czechout</td>\n<td>372278</td>\n<td></td>\n</tr>\n<tr>\n<td>9</td>\n<td>asdf</td>\n<td>359520</td>\n<td></td>\n</tr>\n<tr>\n<td>10</td>\n<td>qwerty</td>\n<td>348762</td>\n<td></td>\n</tr>\n<tr>\n<td>11</td>\n<td>1234567890</td>\n<td>329341</td>\n<td></td>\n</tr>\n<tr>\n<td>12</td>\n<td>1234567</td>\n<td>261610</td>\n<td></td>\n</tr>\n<tr>\n<td>13</td>\n<td>Aa123456.</td>\n<td>212903</td>\n<td></td>\n</tr>\n<tr>\n<td>14</td>\n<td>iloveyou</td>\n<td>171657</td>\n<td></td>\n</tr>\n<tr>\n<td>15</td>\n<td>1234</td>\n<td>169683</td>\n<td></td>\n</tr>\n<tr>\n<td>16</td>\n<td>abc123</td>\n<td>150977</td>\n<td></td>\n</tr>\n<tr>\n<td>17</td>\n<td>111111</td>\n<td>148079</td>\n<td></td>\n</tr>\n<tr>\n<td>18</td>\n<td>123123</td>\n<td>145365</td>\n<td></td>\n</tr>\n<tr>\n<td>19</td>\n<td>dubsmash</td>\n<td>144104</td>\n<td></td>\n</tr>\n<tr>\n<td>20</td>\n<td>test</td>\n<td>139624</td>\n<td></td>\n</tr>\n<tr>\n<td>21</td>\n<td>princess</td>\n<td>122658</td>\n<td></td>\n</tr>\n<tr>\n<td>22</td>\n<td>122658</td>\n<td>116273</td>\n<td></td>\n</tr>\n<tr>\n<td>23</td>\n<td>sunshine</td>\n<td>107202</td>\n<td></td>\n</tr>\n<tr>\n<td>24</td>\n<td>BvtTest123</td>\n<td>106991</td>\n<td></td>\n</tr>\n<tr>\n<td>25</td>\n<td>11111</td>\n<td>104395</td>\n<td></td>\n</tr>\n<tr>\n<td>26</td>\n<td>ashley</td>\n<td>94557</td>\n<td></td>\n</tr>\n<tr>\n<td>27</td>\n<td>00000</td>\n<td>92927</td>\n<td></td>\n</tr>\n<tr>\n<td>28</td>\n<td>000000</td>\n<td>92330</td>\n<td></td>\n</tr>\n<tr>\n<td>29</td>\n<td>password1</td>\n<td>92009</td>\n<td></td>\n</tr>\n<tr>\n<td>30</td>\n<td>monkey</td>\n<td>86404</td>\n<td></td>\n</tr>\n<tr>\n<td>31</td>\n<td>livetest</td>\n<td>83677</td>\n<td></td>\n</tr>\n<tr>\n<td>32</td>\n<td>55555</td>\n<td>83004</td>\n<td></td>\n</tr>\n<tr>\n<td>33</td>\n<td>soccer</td>\n<td>80159</td>\n<td></td>\n</tr>\n<tr>\n<td>34</td>\n<td>charlie</td>\n<td>78914</td>\n<td></td>\n</tr>\n<tr>\n<td>35</td>\n<td>asdfghjkl</td>\n<td>77360</td>\n<td></td>\n</tr>\n<tr>\n<td>36</td>\n<td>654321</td>\n<td>76498</td>\n<td></td>\n</tr>\n<tr>\n<td>37</td>\n<td>family</td>\n<td>76007</td>\n<td></td>\n</tr>\n<tr>\n<td>38</td>\n<td>michael</td>\n<td>71035</td>\n<td></td>\n</tr>\n<tr>\n<td>39</td>\n<td>123321</td>\n<td>69727</td>\n<td></td>\n</tr>\n<tr>\n<td>40</td>\n<td>football</td>\n<td>68495</td>\n<td></td>\n</tr>\n<tr>\n<td>41</td>\n<td>baseball</td>\n<td>67981</td>\n<td></td>\n</tr>\n<tr>\n<td>42</td>\n<td>q1w2e3r4t5y6</td>\n<td>66586</td>\n<td></td>\n</tr>\n<tr>\n<td>43</td>\n<td>nicole</td>\n<td>64992</td>\n<td></td>\n</tr>\n<tr>\n<td>44</td>\n<td>jessica</td>\n<td>63498</td>\n<td></td>\n</tr>\n<tr>\n<td>45</td>\n<td>purple</td>\n<td>62709</td>\n<td></td>\n</tr>\n<tr>\n<td>46</td>\n<td>shadow</td>\n<td>62592</td>\n<td></td>\n</tr>\n<tr>\n<td>47</td>\n<td>hannah</td>\n<td>62394</td>\n<td></td>\n</tr>\n<tr>\n<td>48</td>\n<td>chocolate</td>\n<td>62325</td>\n<td></td>\n</tr>\n<tr>\n<td>49</td>\n<td>michelle</td>\n<td>61873</td>\n<td></td>\n</tr>\n<tr>\n<td>50</td>\n<td>daniel</td>\n<td>61643</td>\n<td></td>\n</tr>\n<tr>\n<td>51</td>\n<td>maggie</td>\n<td>61445</td>\n<td></td>\n</tr>\n</tbody>\n</table>\n<h2 id=\"why-is-password-hygiene-not-taken-seriously\" style=\"position:relative;\"><a href=\"#why-is-password-hygiene-not-taken-seriously\" aria-label=\"why is password hygiene not taken seriously permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is password hygiene not taken seriously?</h2>\n<p>Now that you've seen the worst passwords, you may want to <a href=\"https://www.loginradius.com/blog/2018/05/infographic-poor-password-hygiene-letting-cybercriminals-clean/\">improve the password hygiene</a> of your enterprise.</p>\n<p>But what if your customers don't follow good password hygiene? </p>\n<p>Unfortunately, many don't. The biggest reason is that remembering multiple passwords for multiple accounts is hard work. This leads to people using easy-to-guess passwords or recycled passwords which can lead to a domino effect of attacks on both consumers and companies. </p>\n<p>Another flawed approach is that people may think their information is insignificant, so they assume that no hacker would care about them. However, a ransomware attack can lock users out of their accounts and become quite costly.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image2\"\n        title=\"image2\"\n        src=\"/static/2d0ba915fef0e91be27b9165b68285d6/212bf/image2.jpg\"\n        srcset=\"/static/2d0ba915fef0e91be27b9165b68285d6/6aca1/image2.jpg 650w,\n/static/2d0ba915fef0e91be27b9165b68285d6/212bf/image2.jpg 768w,\n/static/2d0ba915fef0e91be27b9165b68285d6/64175/image2.jpg 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-can-you-improve-password-security\" style=\"position:relative;\"><a href=\"#how-can-you-improve-password-security\" aria-label=\"how can you improve password security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How can you improve password security?</h2>\n<p>As our worst passwords list shows, you can’t stop everyone from using bad passwords. However, you can prevent hackers from accessing passwords by using a Customer Identity and Access Management (CIAM) solution. Here’s how.</p>\n<p>An Identity Platform can help companies implement industry-standard hashing algorithms that protect passwords during transit or at rest. This is an effective way to prevent data from being exposed to hackers. </p>\n<p>With the increase in frequency and complexity of attacks, companies could also utilize additional features like two-factor authentication, risk-based authentication, and <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless login</a>.</p>\n<p>By implementing these features, companies can increase security to customer accounts that will help prevent data breaches and hacks.</p>\n<p>A CIAM solution also saves resources. Your support and development teams can devote their time to growing your business rather than responding to data breaches. </p>\n<p>Overall, bad passwords coupled with smart hackers are a big problem for  businesses. To protect your company from costly hacks and breaches, you need cybersecurity that prevents access to your sensitive data. For state-of-the-art cybersecurity and enhanced customer experience, choose a globally-certified CIAM solution like LoginRadius. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CTA book demo password 1024x310\"\n        title=\"CTA book demo password 1024x310\"\n        src=\"/static/627cc6ea75a5e7740ea1c7fb9d6d737b/e5715/CTA-book-demo-password-1024x310.png\"\n        srcset=\"/static/627cc6ea75a5e7740ea1c7fb9d6d737b/a6d36/CTA-book-demo-password-1024x310.png 650w,\n/static/627cc6ea75a5e7740ea1c7fb9d6d737b/e5715/CTA-book-demo-password-1024x310.png 768w,\n/static/627cc6ea75a5e7740ea1c7fb9d6d737b/2bef9/CTA-book-demo-password-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 23, 2019","updated_date":null,"description":"Overall, a major challenge for corporations is poor passwords combined with smart hackers. You need cybersecurity that prevents access to your confidential data to protect your business from expensive hacks and breaches. Choose a globally-certified CIAM solution like LoginRadius for state-of-the-art safety and increased customer experience.","title":"The Worst Passwords of 2019","tags":["passwordless login","password management","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/ef5c2fb5e81e04465adcb074831f64a5/33aa5/worst-psswrd-list.jpg","srcSet":"/static/ef5c2fb5e81e04465adcb074831f64a5/f836f/worst-psswrd-list.jpg 200w,\n/static/ef5c2fb5e81e04465adcb074831f64a5/2244e/worst-psswrd-list.jpg 400w,\n/static/ef5c2fb5e81e04465adcb074831f64a5/33aa5/worst-psswrd-list.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":366,"currentPage":62,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}