{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/65","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"What is Multi Factor Authentication (MFA)? Multi Factor Authentication (MFA) is a security process that requires users to verify their…","fields":{"slug":"/identity/what-is-multi-factor-authentication/"},"html":"<h2 id=\"what-is-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#what-is-multi-factor-authentication-mfa\" aria-label=\"what is multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Multi Factor Authentication (MFA)?</h2>\n<p>Multi Factor Authentication (MFA) is a security process that requires users to verify their identity using two or more authentication factors before accessing an account, application, or system.</p>\n<p>Unlike traditional password-based logins, MFA adds an extra layer of security by demanding additional verification, reducing the risk of unauthorized access. For instance, a user must complete a second verification process after providing their username and password to access certain platforms or resources.</p>\n<p>MFA is widely used in various industries, including e-commerce, media &#x26; communication, healthcare, and finance, to protect user accounts from cyber threats. Hundreds of organizations have benefited by integrating MFA. See how to <a href=\"https://www.loginradius.com/docs/security/customer-security/multi-factor-authentication/overview/#integration-guide\">integrate MFA into security policies</a> to mitigate risks associated with credential theft and data breaches.</p>\n<h2 id=\"why-is-mfa-important\" style=\"position:relative;\"><a href=\"#why-is-mfa-important\" aria-label=\"why is mfa important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is MFA Important?</h2>\n<p>Cybercriminals are constantly exploiting weak credentials and gaining access to sensitive systems. Here’s where we get an answer to the question- Why is MFA important?</p>\n<ul>\n<li><strong>Enhanced Security</strong>: Even if a password is stolen, unauthorized access is blocked by requiring an additional authentication factor.</li>\n<li><strong>Prevention of Phishing Attacks</strong>: Since MFA requires multiple authentication steps, it significantly reduces the effectiveness of phishing attempts.</li>\n<li><strong>Regulatory Compliance</strong>: Many industries mandate MFA implementation to comply with security regulations such as GDPR, HIPAA, and PCI DSS.</li>\n<li><strong>Reduced Risk of Account Takeover</strong>: Cybercriminals find it harder to breach accounts that require multiple authentication steps.</li>\n<li><strong>Business Continuity</strong>: Companies using MFA can prevent operational disruptions caused by unauthorized access and cyber threats.</li>\n<li><strong>Cost Savings and Avoiding Liability Issues</strong>: Implementing MFA reduces the financial impact of security breaches, lowering potential fines, recovery costs, and helping organizations avoid legal liabilities related to data breaches.</li>\n</ul>\n<h2 id=\"how-does-mfa-work\" style=\"position:relative;\"><a href=\"#how-does-mfa-work\" aria-label=\"how does mfa work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does MFA Work?</h2>\n<p>Since we’ve learned what MFA is and why it’s important, let’s understand how it works. The MFA process is straightforward yet highly effective. Here’s how it works:</p>\n<ol>\n<li><strong>User Enters Credentials</strong>: The user inputs their username and password.</li>\n<li><strong>MFA Triggered</strong>: The system asks for an additional authentication factor if the credentials are correct.</li>\n<li><strong>Verification Step</strong>: The user provides the second factor (e.g., OTP, biometric scan, hardware token, or passkey).</li>\n<li><strong>Access Granted or Denied</strong>: Access is granted if the second factor is valid; otherwise, the login attempt is blocked.</li>\n</ol>\n<p>Understanding how MFA works is crucial for organizations implementing strong security policies.</p>\n<p>MFA can be implemented in various ways, and organizations can choose the most suitable method based on their security needs and user convenience.</p>\n<p><img src=\"/31897617f8cfd303cc4a03b4950ccab7/how-mfa-works.webp\" alt=\"A visual of the multi-factor authentication (MFA) process on a dark background. It shows a user logging in with email and password, then completing an extra security check using OTP, biometrics, or a security key. The final step confirms access with a green checkmark or denies it with a security alert.\"></p>\n<h2 id=\"types-of-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#types-of-multi-factor-authentication\" aria-label=\"types of multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Multi-Factor Authentication</h2>\n<p>Different MFA methods provide varying levels of security and convenience. Here are the most commonly used types of multi-factor authentication:</p>\n<h3 id=\"time-based-one-time-password-totp\" style=\"position:relative;\"><a href=\"#time-based-one-time-password-totp\" aria-label=\"time based one time password totp permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Time-Based One-Time Password (TOTP)</h3>\n<p>A TOTP is a temporary passcode generated by an authentication app (e.g., Google Authenticator or Microsoft Authenticator). The code expires shortly, reducing the risk of unauthorized access.</p>\n<h3 id=\"push-notifications\" style=\"position:relative;\"><a href=\"#push-notifications\" aria-label=\"push notifications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Push Notifications</h3>\n<p>Push notification MFA is one of the convenient MFA factors that allows seamless authentication. It involves sending a push notification to a registered mobile device and asking the user to approve or deny the login attempt.</p>\n<h3 id=\"sms-based-verification\" style=\"position:relative;\"><a href=\"#sms-based-verification\" aria-label=\"sms based verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SMS-Based Verification</h3>\n<p>An SMS-based MFA solution sends a one-time passcode (OTP) to a user’s mobile phone via text message. The user must enter the OTP to complete authentication.</p>\n<h3 id=\"hardware-token\" style=\"position:relative;\"><a href=\"#hardware-token\" aria-label=\"hardware token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hardware Token</h3>\n<p>A hardware token is a physical device that generates OTPs or connects via USB/NFC to authenticate the user.</p>\n<h3 id=\"biometric-authentication\" style=\"position:relative;\"><a href=\"#biometric-authentication\" aria-label=\"biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Authentication</h3>\n<p>This method uses inherent factors like fingerprint scans, facial recognition, or iris scans for verification.</p>\n<p>Biometric authentication is gaining popularity because of its ease of use and strong security. Many modern devices, including smartphones and laptops, integrate biometric authentication as an additional layer of security.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Buyers Guide to Multi-Factor Authentication ebook\"\n        title=\"Buyers Guide to Multi-Factor Authentication ebook\"\n        src=\"/static/4e78e2265f68071219ae6811eafb52ec/e5715/eb-buyers-guide-to-multi-factor-authentication.png\"\n        srcset=\"/static/4e78e2265f68071219ae6811eafb52ec/a6d36/eb-buyers-guide-to-multi-factor-authentication.png 650w,\n/static/4e78e2265f68071219ae6811eafb52ec/e5715/eb-buyers-guide-to-multi-factor-authentication.png 768w,\n/static/4e78e2265f68071219ae6811eafb52ec/2bef9/eb-buyers-guide-to-multi-factor-authentication.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"what-are-the-different-types-of-authentication-factors\" style=\"position:relative;\"><a href=\"#what-are-the-different-types-of-authentication-factors\" aria-label=\"what are the different types of authentication factors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Different Types of Authentication Factors?</h2>\n<p>Authentication factors are categorized into different types based on what the user knows, has, or is. These MFA factors play a key role in strengthening security.</p>\n<h3 id=\"knowledge-factors-something-the-user-knows\" style=\"position:relative;\"><a href=\"#knowledge-factors-something-the-user-knows\" aria-label=\"knowledge factors something the user knows permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Knowledge Factors: Something the User Knows</h3>\n<p>Examples include passwords, PINs, or security questions.</p>\n<h3 id=\"possession-factors-something-the-user-has\" style=\"position:relative;\"><a href=\"#possession-factors-something-the-user-has\" aria-label=\"possession factors something the user has permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Possession Factors: Something the User Has</h3>\n<p>Examples include smartphones, security keys, and smart cards.</p>\n<h3 id=\"inherent-factors-something-unique-to-the-user\" style=\"position:relative;\"><a href=\"#inherent-factors-something-unique-to-the-user\" aria-label=\"inherent factors something unique to the user permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Inherent Factors: Something Unique to the User</h3>\n<p>These involve biometric authentication methods such as fingerprints, voice recognition, or facial scans.</p>\n<h3 id=\"behavioral-factors-something-the-user-does\" style=\"position:relative;\"><a href=\"#behavioral-factors-something-the-user-does\" aria-label=\"behavioral factors something the user does permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Behavioral Factors: Something the User Does</h3>\n<p>These include behavioral patterns like keystroke dynamics and mouse movement patterns.</p>\n<p>Behavioral authentication is an emerging MFA technology that continuously analyzes user behavior to detect anomalies and prevent unauthorized access.</p>\n<h2 id=\"multi-factor-authentication-vs-two-factor-authentication\" style=\"position:relative;\"><a href=\"#multi-factor-authentication-vs-two-factor-authentication\" aria-label=\"multi factor authentication vs two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication vs. Two-Factor Authentication</h2>\n<p>Many people confuse both terms and are unable to <a href=\"https://www.loginradius.com/blog/identity/2fa-mfa-key-differences/\">decide between 2FA and MFA</a>. When it comes to 2FA vs MFA, the difference is quite simple:</p>\n<ul>\n<li>Two-factor authentication (2FA) requires exactly two authentication factors.</li>\n<li>Multi-factor authentication (MFA) requires two or more authentication factors.</li>\n</ul>\n<p>MFA is more secure than 2FA since it provides additional layers of protection. Organizations handling sensitive data or focusing on enterprise security often prefer MFA over 2FA to ensure stronger security.</p>\n<h2 id=\"what-is-adaptive-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-adaptive-multi-factor-authentication\" aria-label=\"what is adaptive multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Adaptive Multi-Factor Authentication?</h2>\n<p>When we talk about an advanced security measure, <a href=\"https://www.loginradius.com/products/adaptive-mfa\">Adaptive MFA</a> is undoubtedly a game-changer that analyzes user behavior and risk levels to determine when to prompt for authentication.</p>\n<p>If a login attempt appears risky (e.g., new device, unusual location), the system triggers additional authentication steps.</p>\n<p>Adaptive MFA helps balance security and user convenience by requiring additional verification only when necessary.</p>\n<h2 id=\"examples-of-multi-factor-authentication-methods\" style=\"position:relative;\"><a href=\"#examples-of-multi-factor-authentication-methods\" aria-label=\"examples of multi factor authentication methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Examples of Multi-Factor Authentication Methods</h2>\n<p>Here are some MFA examples used by businesses and individuals:</p>\n<ul>\n<li><strong>Online Banking</strong>: Banks use MFA for account access and high-value transactions.</li>\n<li><strong>Cloud Applications</strong>: Google, Microsoft, and AWS enforce MFA to secure user accounts.</li>\n<li><strong>Corporate Networks</strong>: Businesses implement MFA for employee access to sensitive data.</li>\n<li><strong>Healthcare Systems</strong>: Medical organizations use MFA to protect patient records and comply with regulations.</li>\n<li><strong>E-commerce Platforms</strong>: Online retailers leverage MFA to prevent fraudulent transactions.</li>\n</ul>\n<h2 id=\"benefits-of-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-multi-factor-authentication\" aria-label=\"benefits of multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Multi-Factor Authentication</h2>\n<p>When it comes to the benefits of MFA, the list is endless; here’s a list of a few benefits that you get:</p>\n<h3 id=\"improving-security\" style=\"position:relative;\"><a href=\"#improving-security\" aria-label=\"improving security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improving Security</h3>\n<p>MFA protects against unauthorized access by adding extra layers of verification beyond passwords. It significantly reduces the risk of credential-based attacks and data breaches.</p>\n<h3 id=\"enabling-digital-initiatives\" style=\"position:relative;\"><a href=\"#enabling-digital-initiatives\" aria-label=\"enabling digital initiatives permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enabling Digital Initiatives</h3>\n<p>Businesses can implement MFA solutions to secure digital transactions, remote work setups, and cloud applications. This allows organizations to safely expand their digital services without compromising security.</p>\n<h3 id=\"reducing-fraud-risks\" style=\"position:relative;\"><a href=\"#reducing-fraud-risks\" aria-label=\"reducing fraud risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reducing Fraud Risks</h3>\n<p>MFA helps businesses prevent fraudulent transactions and unauthorized account access. It is especially crucial for industries like banking and e-commerce, where financial fraud is a major concern.</p>\n<h3 id=\"increasing-user-confidence--trust\" style=\"position:relative;\"><a href=\"#increasing-user-confidence--trust\" aria-label=\"increasing user confidence  trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Increasing User Confidence &#x26; Trust</h3>\n<p>Customers feel more confident using services that implement strong authentication measures. A well-implemented MFA system reassures users that their sensitive information is protected, leading to improved customer retention and brand reputation.</p>\n<h3 id=\"boosting-regulatory-compliance\" style=\"position:relative;\"><a href=\"#boosting-regulatory-compliance\" aria-label=\"boosting regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Boosting Regulatory Compliance</h3>\n<p>Many industries, such as healthcare and finance, require MFA to comply with strict data protection regulations. Implementing MFA ensures that businesses meet compliance standards like GDPR, HIPAA, and PCI DSS.</p>\n<p>See how one of <a href=\"https://www.loginradius.com/resource/case-study-page-safebridge/\">our clients- SafeBridge, leveled up security</a> with LoginRadius MFA.</p>\n<h2 id=\"top-mfa-providers\" style=\"position:relative;\"><a href=\"#top-mfa-providers\" aria-label=\"top mfa providers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Top MFA Providers</h2>\n<h3 id=\"loginradius\" style=\"position:relative;\"><a href=\"#loginradius\" aria-label=\"loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius</h3>\n<p><a href=\"https://www.loginradius.com/platforms/multi-factor-authentication\">LoginRadius Multi-Factor Authentication</a> makes security effortless. With flexible options like OTPs, biometrics, and authenticator apps, you can add an extra layer of protection without disrupting the user experience.</p>\n<p>Moreover, LoginRadius’ adaptive MFA intelligently detects risk—only stepping in when needed, like an unusual login attempt. Best of all, you can integrate LoginRadius MFA into your app or website within minutes, with developer-friendly APIs and seamless workflows. Strong security, easy implementation, and a frictionless login experience—all in one solution.</p>\n<h3 id=\"google-authenticator\" style=\"position:relative;\"><a href=\"#google-authenticator\" aria-label=\"google authenticator permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Google Authenticator</h3>\n<p>Google Authenticator is a mobile app that generates time-based one-time passwords (TOTP) for multi-factor authentication (MFA).</p>\n<p>It provides an additional layer of security by requiring users to enter a unique 6-digit code, which refreshes every 30 seconds, along with their password during login. This method helps protect accounts from unauthorized access and is widely used across various platforms for secure authentication.</p>\n<h3 id=\"yubico\" style=\"position:relative;\"><a href=\"#yubico\" aria-label=\"yubico permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Yubico</h3>\n<p>Yubico provides hardware-based multi-factor authentication (MFA) solutions through its YubiKey devices. YubiKeys enhances security by requiring physical authentication in addition to a password, protecting accounts from phishing and unauthorized access.</p>\n<p>They support multiple authentication methods, including FIDO2, U2F, OTP, and Smart Card authentication, making them compatible with a wide range of platforms. Unlike SMS-based MFA, YubiKeys does not rely on network connectivity and provides strong, passwordless authentication options for improved security and ease of use.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Multi-Factor Authentication is a critical component of modern cybersecurity. By requiring multiple verification steps, MFA enhances security, prevents data breaches, and provides an added layer of protection against cyber threats.</p>\n<p>Businesses should implement MFA by choosing the right multi-factor authentication provider to safeguard sensitive information, reduce fraud risks, and comply with security regulations.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. Why is MFA important to security?</strong></p>\n<p>MFA is crucial to security because it adds an extra layer of protection by requiring multiple forms of verification, reducing the risk of unauthorized access.</p>\n<p><strong>2. What are the benefits of MFA security?</strong></p>\n<p>MFA security offers enhanced protection against cyber threats, mitigates the risk of stolen or weak passwords, and improves overall account security.</p>\n<p><strong>3. What is multi-factor authentication and why is it important to help prevent identity theft?</strong></p>\n<p>Multi-factor authentication (MFA) verifies user identity with multiple factors like passwords, tokens, or biometrics, reducing the risk of identity theft by ensuring only authorized users gain access.</p>\n<p><strong>4. What are the benefits of having an MFA?</strong></p>\n<p>Having MFA provides improved security, reduced vulnerability to password-related attacks, increased trust with consumers, and compliance with security standards.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 28, 2019","updated_date":null,"description":"In today’s digital landscape, cybersecurity threats are evolving rapidly. Businesses and individuals alike need stronger security measures to protect sensitive data. A highly effective method to improve security is through Multi-Factor Authentication (MFA). But what is multi factor authentication, and how does it work? Let’s dive into the details.","title":"What is Multi Factor Authentication (MFA) and How does it Work?","tags":["mfa","authentication","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4598540145985401,"src":"/static/ef2d2108dd2e8e4c8f71c33dd00c5810/ee604/mfa-cover.png","srcSet":"/static/ef2d2108dd2e8e4c8f71c33dd00c5810/69585/mfa-cover.png 200w,\n/static/ef2d2108dd2e8e4c8f71c33dd00c5810/497c6/mfa-cover.png 400w,\n/static/ef2d2108dd2e8e4c8f71c33dd00c5810/ee604/mfa-cover.png 800w,\n/static/ef2d2108dd2e8e4c8f71c33dd00c5810/a8378/mfa-cover.png 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"In January of 2019, Akamai acquired Janrain and rebranded their CIAM solution as “Identity Cloud,” a platform designed to improve security…","fields":{"slug":"/identity/best-janrain-alternative/"},"html":"<p>In January of 2019, Akamai acquired Janrain and rebranded their <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">CIAM solution</a> as “Identity Cloud,” a platform designed to improve security access controls and identity management. Before the purchase price was revealed, Forrester predicted it would be in the $250M–$275M range (based on an estimation of Janrain’s annual revenue). In reality, the sale price was <a href=\"https://www.bizjournals.com/portland/news/2019/03/01/that-sale-price-for-janrain-125.html\">$125M</a>—<em>roughly half of Forrester’s estimate</em>. Since then, perhaps in response to the Janrain acquisition, customers have reached out to LoginRadius seeking a Janrain alternative. Here’s what they told us. </p>\n<h2 id=\"why-customers-want-a-janrain-alternative\" style=\"position:relative;\"><a href=\"#why-customers-want-a-janrain-alternative\" aria-label=\"why customers want a janrain alternative permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why customers want a Janrain alternative</strong></h2>\n<p>LoginRadius has had many conversations with current and former Janrain customers in the last few months. Through these discussions, we’ve learned that the Janrain acquisition is playing out in a similar fashion to the Gigya acquisition. If you’re interested in reading about the pitfalls of the Gigya/SAP merger, you might like our article <a href=\"https://www.loginradius.com/blog/2019/02/looking-gigya-alternative-try-loginradius-superior-modern-identity-platform/\">Looking for a Gigya Alternative?</a>. In it, we explain some of the problems arising from the Gigya/SAP merger. </p>\n<p>Likewise, in this article, I’ll demonstrate that while mergers and acquisitions (M&#x26;A) can be exciting, an acquisition may sometimes be damaging for customers, partners, and employees. To illustrate that, here are some of the reasons customers are seeking a Janrain alternative today.</p>\n<h2 id=\"recent-janrainakamai-complaints\" style=\"position:relative;\"><a href=\"#recent-janrainakamai-complaints\" aria-label=\"recent janrainakamai complaints permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Recent Janrain/Akamai complaints</strong></h2>\n<h3 id=\"we-lost-the-freedom-to-use-our-existing-stack\" style=\"position:relative;\"><a href=\"#we-lost-the-freedom-to-use-our-existing-stack\" aria-label=\"we lost the freedom to use our existing stack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“We lost the freedom to use our existing stack.”</h3>\n<p>One of the chief concerns that companies have shared with us involves service level agreements (SLAs). In particular, we’ve heard that many companies fear that Akamai will not offer the flexibility of custom tech stacks. Their concern is that if they use software or apps not provided by Akamai, they’ll lose the quality, availability, and features that they relied on before the merger. </p>\n<p>To put it into perspective, former Gigya customers complained to us that during the SAP acquisition, they didn’t want to switch their tech stack to SAP. However, in order to get a full SLA and the optimal service and features they had come to expect, it suddenly became necessary. </p>\n<p>The reason for their cold feet is simple: switching software can lead to a massive drain of resources within large companies. Therefore, it’s reasonable for companies to avoid that kind of change. Let’s face it, if you already have a tried-and-true tech stack, wouldn’t you want to choose a CIAM solution that works <em>with</em> it?</p>\n<h3 id=\"we-noticed-a-decline-in-support\" style=\"position:relative;\"><a href=\"#we-noticed-a-decline-in-support\" aria-label=\"we noticed a decline in support permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“We noticed a decline in support.”</h3>\n<p>Anytime a big acquisition or disruption occurs in a company, there’s a high probability that customer service may suffer. In fact, time and again, customers told our consultants that they switched from Akamai/Janrain or Gigya due to a decline in technical assistance and customer support.</p>\n<h3 id=\"what-happened-to-auto-renew\" style=\"position:relative;\"><a href=\"#what-happened-to-auto-renew\" aria-label=\"what happened to auto renew permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“What happened to auto-renew?”</h3>\n<p>Another customer related complaint occurred after Akamai acquired Janrain.  Janrain customers became concerned when their accounts did not auto-renew. Since the Janrain/Akamai merger, Akamai is exercising its right to renegotiate terms. As a result, <em>Janrain customers are reported to be wary of the fine print on these new terms</em>.</p>\n<h3 id=\"we-cant-afford-any-outages\" style=\"position:relative;\"><a href=\"#we-cant-afford-any-outages\" aria-label=\"we cant afford any outages permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“We can’t afford any outages.”</h3>\n<p>Customers revealed that they noticed a <a href=\"https://status.janrain.com/incidents/j66wdht40wmc\">lot of downtime</a> on sites using <a href=\"https://deets.feedreader.com/secure-now.sportsnet.ca\">Akamai Identity Cloud as their provider</a>. Most recently, the <a href=\"https://www.theglobeandmail.com/business/article-i-missed-a-big-chunk-of-the-game-raptors-fans-frustrated-by-rogers/\">NBA Finals game outage</a> on Sportsnet created a lot of heat for Rogers. And since Janrain is the CIAM provider for Rogers, the outage is a result of their inability to handle peak loads. For any business that experiences surges in logins, downloads, or streaming, <a href=\"https://www.the20.com/blog/the-cost-of-it-downtime/\">downtime can cost $300,000</a> (on average) in lost revenue. </p>\n<p><strong>Key Takeaway</strong> </p>\n<p>Akamai is a security company, so its acquisition of Janrain confirms that CIAM is a security platform. Akamai clearly saw Janrain as a missing piece in their security company. </p>\n<p>However, LoginRadius made this pivot sooner than Janrain—in 2016, to be precise. Simply put, we've spent more years innovating and delivering value to enterprises than Janrain has. Here are just some of the reasons why LoginRadius is the best Janrain alternative for your business.</p>\n<h2 id=\"why-loginradius-should-be-your-janrain-alternative\" style=\"position:relative;\"><a href=\"#why-loginradius-should-be-your-janrain-alternative\" aria-label=\"why loginradius should be your janrain alternative permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why LoginRadius Should Be Your Janrain Alternative</strong></h2>\n<p><strong>Our 100% uptime is second to none.</strong></p>\n<p>You don’t have to worry about surges or spikes driving customers away and hurting revenue. <em>LoginRadius is the only identity platform with a 100% uptime.</em></p>\n<p><strong>We’re a global leader in customer identity.</strong> </p>\n<p>LoginRadius was named a <a href=\"https://www.loginradius.com/press/loginradius-named-global-ciam-leader-by-identity-research-firm-kuppingercole/\">global CIAM leader</a> by KuppingerCole and has been <em>positioned ahead of other vendors such as ForgeRock, Okta, and Ping Identity.</em> Recently, <a href=\"https://www.loginradius.com/blog/identity/loginradius-announces-17m-series-funding-forgepoint-microsoft/\">LoginRadius received $17 million Series A funding</a>, led by ForgePoint Capital and Microsoft. <em>W__e may not be enterprise-size, but we’re enterprise grade—meaning you’ll get both dedicated service and an exceptional product from LoginRadius.</em> </p>\n<p><strong>We provide data privacy and consent solutions.</strong></p>\n<p>We follow the strictest government regulations for privacy and consent and offer out-of-the-box solutions for GDPR, CCPA, and COPPA compliance. <em>We also provide the highest industry standards for secure single sign-on, data storage, and customer access management.</em></p>\n<p><strong>We’re 100% CIAM with 24/7 tech support.</strong></p>\n<p>Our product consultants, customer support, and tech teams act quickly to meet your needs. <em>Data migration from your current provider is included, as are customization features and fast deployment.</em></p>\n<p><strong>Simply put, LoginRadius excels at what Akamai/Janrain doesn’t—**</strong><em>giving companies an edge over the competition.</em>** </p>\n<hr>\n<h3 id=\"know-your-audience\" style=\"position:relative;\"><a href=\"#know-your-audience\" aria-label=\"know your audience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Know Your Audience</strong></h3>\n<p><em>“The secret to exceeding customer expectations</em></p>\n<p> <em>is knowing what customers want before they do.”</em></p>\n<hr>\n<h2 id=\"ready-to-switch-to-loginradius\" style=\"position:relative;\"><a href=\"#ready-to-switch-to-loginradius\" aria-label=\"ready to switch to loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Ready to switch to LoginRadius?</strong></h2>\n<p>LoginRadius is a CIAM solution that offers seamless migration from your current provider within days. <em>We also do migration testing on a staging site, so your customers won’t notice a thing.</em></p>\n<p>Want to hear more about making the switch to LoginRadius? Call a LoginRadius digital identity consultant today at 1-844-625-8889. We’ll be happy to give you a product demo so you can compare LoginRadius with your current provider. </p>\n<p><a href=\"https://www.loginradius.com/book-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Janrain alternative\"\n        title=\"Janrain alternative\"\n        src=\"/static/ef9986304bfa7c819b7771a02d207dec/e5715/CTA-Graphics-for-Blogs-V02.01-15.png\"\n        srcset=\"/static/ef9986304bfa7c819b7771a02d207dec/a6d36/CTA-Graphics-for-Blogs-V02.01-15.png 650w,\n/static/ef9986304bfa7c819b7771a02d207dec/e5715/CTA-Graphics-for-Blogs-V02.01-15.png 768w,\n/static/ef9986304bfa7c819b7771a02d207dec/63ff0/CTA-Graphics-for-Blogs-V02.01-15.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 24, 2019","updated_date":null,"description":"Akamai purchased Janrain in January 2019 and renamed its CIAM solution Identity Cloud, a platform designed to strengthen security access controls and identity management.","title":"Why LoginRadius Is the Best Akamai Identity Cloud (Janrain) Alternative","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/6ed926510d078a67b5a69b2baebbb195/0756a/janrain-feature.png","srcSet":"/static/6ed926510d078a67b5a69b2baebbb195/69585/janrain-feature.png 200w,\n/static/6ed926510d078a67b5a69b2baebbb195/497c6/janrain-feature.png 400w,\n/static/6ed926510d078a67b5a69b2baebbb195/0756a/janrain-feature.png 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Today, consumers want to log into one place and access all of their favorite sites and services using their preferred login…","fields":{"slug":"/identity/enterprise-single-sign-on-authentication/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Today, consumers want to log into one place and access all of their favorite sites and services using their preferred login credentials. Single sign-on is a great way to show your consumers that you care about their security and convenience.</p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">Single sign-on authentication</a>, or SSO, is becoming more commonplace as the digital revolution continues to evolve. With numerous benefits for customers and companies alike, SSO helps streamline user experience, aid movement between applications and services, and secure the transfer of pertinent information about customers between organizations.</p>\n<h2 id=\"what-is-single-sign-on-authentication\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on-authentication\" aria-label=\"what is single sign on authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is Single Sign-On Authentication?</h2>\n<p>Single Sign-On (SSO)  is a method of authentication that allows websites to use other trustworthy sites to verify users. Single sign-on allows a user to log in to any independent application with a single ID and password. </p>\n<p>SSO is an essential feature of an Identity and Access Management (IAM) platform for controlling access. Verification of user identity is important when it comes to knowing which permissions a user will have. The LoginRadius Identity platform is one example of managing access that combines user identity management solutions with the following SSO solutions:</p>\n<h3 id=\"web--mobile-sso\" style=\"position:relative;\"><a href=\"#web--mobile-sso\" aria-label=\"web  mobile sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Web &#x26; Mobile SSO</h3>\n<p>Your customers have only one set of login details for all of your services and can switch seamlessly between applications. <a href=\"https://www.loginradius.com/web-and-mobile-sso/\">Mobile SSO</a> allows your customers to switch seamlessly between mobile applications if you have more than one. SSO also allows user access to multiple applications without the need for separate login accounts.</p>\n<h3 id=\"federated-sso\" style=\"position:relative;\"><a href=\"#federated-sso\" aria-label=\"federated sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Federated SSO</h3>\n<p><a href=\"https://www.loginradius.com/federated-sso/\">Federated SSO</a> uses a range of industry-standard protocols including SAML, JWT, OAuth, OpenID Connect, and more to allow the same seamless experience between service applications from a range of providers and sources.</p>\n<h2 id=\"what-are-the-benefits-of-sso\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-sso\" aria-label=\"what are the benefits of sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are The Benefits Of SSO?</h2>\n<p>Single sign on authentication offers endless business opportunities to organizations by offering a seamless customer experience while users switch between multiple applications. </p>\n<p>SSO offers several benefits, including an improved user experience, increased security, reduced support costs, increased productivity, and centralized access management. With SSO, users can sign in once and access all the services they need, leading to a smoother and more efficient user experience. It also improves security by reducing the number of passwords that users need to remember and reducing the risk of password-related security breaches. SSO can save time for both users and IT staff, allowing them to focus on more important tasks and increasing overall productivity. </p>\n<p>Additionally, with SSO, IT teams can manage user access to multiple applications from a central location, making it easier to grant or revoke access when necessary and reducing the risk of unauthorized access. Overall, SSO can provide numerous benefits for both users and IT teams, making it an attractive option for organizations that manage multiple applications and services.</p>\n<h2 id=\"5-reasons-to-use-sso-as-a-part-of-your-customer-authentication-process\" style=\"position:relative;\"><a href=\"#5-reasons-to-use-sso-as-a-part-of-your-customer-authentication-process\" aria-label=\"5 reasons to use sso as a part of your customer authentication process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Reasons To Use SSO As A Part Of Your Customer Authentication Process</h2>\n<h3 id=\"1-consumers-expect-sso\" style=\"position:relative;\"><a href=\"#1-consumers-expect-sso\" aria-label=\"1 consumers expect sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Consumers Expect SSO</h3>\n<p>Today’s customers expect SSO. They might not be able to articulate this expectation in words, but as a matter of course, many customers already use single sign-on authentication in services every day. This means that the customer-facing features of SSO are now considered to be a minimum standard of customer convenience. Simply put, SSO is a service that most customers expect from every online company.</p>\n<p>If you have more than one website or service that requires logging in, you <em>need</em> <a href=\"https://www.loginradius.com/single-sign-on/\">single sign-on</a> if you don’t want to annoy your customers and appear behind the times. With single sign-on, you can eliminate several common roadblocks that can hurt your business.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 97.38461538461539%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"single sign-on authentication\"\n        title=\"single sign-on authentication\"\n        src=\"/static/34d68a4857e6fec6c015d64e11c1473d/e5715/SSO-Blog-02.png\"\n        srcset=\"/static/34d68a4857e6fec6c015d64e11c1473d/a6d36/SSO-Blog-02.png 650w,\n/static/34d68a4857e6fec6c015d64e11c1473d/e5715/SSO-Blog-02.png 768w,\n/static/34d68a4857e6fec6c015d64e11c1473d/f9601/SSO-Blog-02.png 2793w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>For example, we heard from a consumer in the UK that there's a customer experience disconnect between different divisions at Virgin. People getting cable TV and home broadband services from Virgin Media are encouraged to sign up for Virgin Mobile with several competitively priced offers. However, even though the sites look similar, consumers need to have two separate logins for the two Virgin services. They even have different rules for password strength.</p>\n<p>I’m sure you can think of examples of your own, perhaps where (like with Virgin) you can’t even choose to use the same sign-in details if you want to. Maybe others require you to log in to different services from the same company repeatedly.</p>\n<p>Don’t be one of these companies. You probably won’t end up with frustrated customers, since they’ll end up voting with their feet (and leaving you for another provider).</p>\n<h3 id=\"2-sso-makes-companies-smarter\" style=\"position:relative;\"><a href=\"#2-sso-makes-companies-smarter\" aria-label=\"2 sso makes companies smarter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. SSO Makes Companies Smarter</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 51.69230769230769%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"single sign-on authentication\"\n        title=\"single sign-on authentication\"\n        src=\"/static/4522d8b2481f0ba272004d8d491ca822/e5715/SSO-Blog-03.png\"\n        srcset=\"/static/4522d8b2481f0ba272004d8d491ca822/a6d36/SSO-Blog-03.png 650w,\n/static/4522d8b2481f0ba272004d8d491ca822/e5715/SSO-Blog-03.png 768w,\n/static/4522d8b2481f0ba272004d8d491ca822/2176f/SSO-Blog-03.png 3622w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A unified customer profile is the first step to a smarter company. With <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">CIAM</a>, you’ll have a single location for everything about individual customers (including their login and service usage data).</p>\n<p>What’s more, CIAM creates a unified customer profile on which to base all other metrics and predictions. Customer-specific data can be used in marketing, sales, customer support, content planning, product development, customer security, and more. <a href=\"https://www.loginradius.com/blog/growth/improve-customer-experience-ecommerce/\">Unified customer profiles</a> are simply a brilliant resource for rich data, metrics, and analytics that multiple departments can use.</p>\n<h3 id=\"3-single-sign-on-saves-money\" style=\"position:relative;\"><a href=\"#3-single-sign-on-saves-money\" aria-label=\"3 single sign on saves money permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Single Sign-On Saves Money</h3>\n<p>By reducing the number of separate sign-in databases and systems you need to maintain and service, SSO reduces maintenance costs for every application or service that would previously have needed a separate login system.</p>\n<p>A centralized identity solution also streamlines the creation of new apps and services by providing a “drop-in” solution for logging in, and for a multitude of useful data gathering methods. An effective <strong>enterprise SSO solution saves money</strong> in the long term <em>and</em> short term by making it easier than ever to collect customer data and user credentials in one secure spot.</p>\n<h3 id=\"4-sso-improves-conversion-rate\" style=\"position:relative;\"><a href=\"#4-sso-improves-conversion-rate\" aria-label=\"4 sso improves conversion rate permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. SSO Improves Conversion Rate</h3>\n<p>By leveraging Single Sign On (SSO), brands can reduce the barriers to entry for users and bring them onto a single platform. That’s one login, one set of credentials, one consistent experience.</p>\n<p>Easy site navigation is the key to making a site user-friendly. The process should be quick and simple, allowing users to get in and get out without hassle. </p>\n<p>Now busines\nses can link their consumers to their own applications in just one click, making it easy to log in with the service they choose.</p>\n<p>Faster, less cluttered sign-ups result in more loyal users. No wonder, SSO is gradually becoming the new, industry-standard solution to<a href=\"https://www.loginradius.com/blog/growth/9-facts-about-social-login-and-cro/\"> increase conversion rates</a> across web and mobile properties.</p>\n<h3 id=\"5-sso-cuts-down-churn-rate\" style=\"position:relative;\"><a href=\"#5-sso-cuts-down-churn-rate\" aria-label=\"5 sso cuts down churn rate permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. SSO Cuts Down Churn Rate</h3>\n<p>You need to focus fiercely on consumer retention during the initial days of your business. If you’re not in the top 10, you’re nowhere. That means that you need to convince your users to stick around and keep using your service from day one. </p>\n<p>According to <a href=\"https://andrewchen.com/new-data-shows-why-losing-80-of-your-mobile-users-is-normal-and-that-the-best-apps-do-much-better/\">a Localytics study</a>, if you can keep 80% of your users around after Day 1, you're on track to be on top 10. But, if you can't keep 40% around after Day 1, you won't make the top 100. </p>\n<p>Although your frequent users are unlikely to lose their log-in credentials, a third of your user base isn't yet on a daily basis. If they forget their details, there's a good chance you'll never see them again.</p>\n<p>Without any need for passwords, SSO enables your users to come back to your app seamlessly. It's like leaving the porch light on for them: it makes them feel involved.</p>\n<h2 id=\"so-why-does-my-business-need-sso-authentication\" style=\"position:relative;\"><a href=\"#so-why-does-my-business-need-sso-authentication\" aria-label=\"so why does my business need sso authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>So, Why Does My Business Need SSO Authentication?</h2>\n<p>Single sign-on directly benefits your organization by gathering a wealth of customer data and credentials securely in one spot for your services, teams, and applications to use. Failing to use SSO will make your consumers notice you in a bad light as they try to navigate your apps and services. By contrast, leaders who bring an SSO solution to their organization will stand out because of the multitude of benefits that single sign-on provides.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"sso\"\n        title=\"sso\"\n        src=\"/static/7458970eb16da6d73777c9db1781c155/e5715/sso.png\"\n        srcset=\"/static/7458970eb16da6d73777c9db1781c155/a6d36/sso.png 650w,\n/static/7458970eb16da6d73777c9db1781c155/e5715/sso.png 768w,\n/static/7458970eb16da6d73777c9db1781c155/63ff0/sso.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Implementing single sign-on authentication (SSO) for B2C enterprises can bring numerous benefits, making it a wise investment. SSO not only simplifies the login process but also enhances security by reducing the risks of password-related breaches. </p>\n<p>Additionally, it saves time and effort for both customers and IT teams. With the benefits of SSO, B2C enterprises can improve their user experience, increase customer loyalty, and reduce operational costs. </p>\n<p>Therefore, it's a valuable solution that every B2C enterprise should consider. In summary, the benefits of SSO for B2C enterprises are significant, and implementing it can be a game-changer in today's digital age.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 18, 2019","updated_date":null,"description":"Today, consumers want to log into one place and access all of their favorite sites and services using their preferred login credentials. Single sign-on is a great way to show your consumers that you care about their security and convenience.","title":"5 Reasons To Know Why B2C Enterprises Should Use Single Sign-On","tags":["sso authentication","data security","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.2658227848101267,"src":"/static/386f51fb3881dc52d1701e78adfc99da/33aa5/sso-authentication.jpg","srcSet":"/static/386f51fb3881dc52d1701e78adfc99da/f836f/sso-authentication.jpg 200w,\n/static/386f51fb3881dc52d1701e78adfc99da/2244e/sso-authentication.jpg 400w,\n/static/386f51fb3881dc52d1701e78adfc99da/33aa5/sso-authentication.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"If you aren’t already taking advantage of CIAM (customer identity and access management), you should be. But what components do you need to…","fields":{"slug":"/identity/perfect-ciam-platform/"},"html":"<p>If you aren’t already taking advantage of CIAM (customer identity and access management), you should be. But what components do you need to include if you want to implement the perfect CIAM platform? One that meets all of your organization’s needs, both now and in the future?</p>\n<p>The CIAM revolution has taken over the access management landscape in just five years. Winning customer trust by safeguarding their data is becoming a competitive advantage.</p>\n<p><a href=\"https://www2.deloitte.com/content/dam/insights/us/articles/consumer-data-privacy-strategies/DUP_970-Building-consumer-trust_MASTER.pdf\">Research from Deloitte</a> shows that 70% of consumers are more likely to purchase from consumer product companies that they believe protect their personal information.</p>\n<p>Customer identity management goes beyond simply repurposing employee IAM for customers—CIAM’s scalability, scope, and customer focus enable you to go far beyond simple privacy management and access verification. In fact, it forms a <a href=\"https://www.kuppingercole.com/blog/tolbert/ciam-as-a-key-factor-in-the-digital-transformation\">key component</a> of effective digital transformation.</p>\n<p>To succeed in today’s environment, <a href=\"https://www.loginradius.com/blog/2018/03/top-5-business-objectives-that-ciam-solves/\">businesses should consider</a> an all-in-one CIAM platform that manages people, systems, and devices used throughout their organization. Customers, vendors, partners, and more should all be included in a comprehensive framework if you want to enable true digital transformation.</p>\n<p>There are a number of key features that are essential if you want to implement a robust customer identity and access management framework.</p>\n<h3 id=\"1-advanced-frictionless-security\" style=\"position:relative;\"><a href=\"#1-advanced-frictionless-security\" aria-label=\"1 advanced frictionless security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Advanced Frictionless Security</h3>\n<p>The initial seed behind CIAM will always be the need to securely manage access, with many of its advanced functions evolving from this essential starting point. Going beyond old-fashioned access methods, a modern customer identity management solution should enable frictionless security. By enabling seamless authentication between people, systems, and things, CIAM can enable low-friction access for all, while still remaining secure.</p>\n<p>Frictionless security means easy-to-use security. Your customers are presented with a beautifully integrated access solution that works so well they barely notice it.</p>\n<h3 id=\"2-strong-privacy-management\" style=\"position:relative;\"><a href=\"#2-strong-privacy-management\" aria-label=\"2 strong privacy management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Strong Privacy Management</h3>\n<p><a href=\"https://en.wikipedia.org/wiki/Information_privacy_law\">Compliance with local data protection laws</a> can be a chore, especially given their constant evolution. A good customer identity platform should enable you to keep up with local laws anywhere in the world that you do business.</p>\n<p>With country-specific or regional control over how personal data is stored and managed, you’ll always meet legal requirements, saving you compliance management costs each year.</p>\n<p>These aren’t the only potential costs you can save—legal fees can run high when privacy management fails. Presenting customers with easily self-managed privacy choices and a solid privacy policy also shows them that their data is safe and shows your company to be competent and professional in handling these issues.</p>\n<p>This reputation will encourage customer loyalty in the long run.</p>\n<h3 id=\"3-integration-with-apis\" style=\"position:relative;\"><a href=\"#3-integration-with-apis\" aria-label=\"3 integration with apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Integration with APIs</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CIAM Platform\"\n        title=\"CIAM Platform\"\n        src=\"/static/e321b9bb7532e7e7606122e5c1a73584/e5715/integration-graphic.png\"\n        srcset=\"/static/e321b9bb7532e7e7606122e5c1a73584/a6d36/integration-graphic.png 650w,\n/static/e321b9bb7532e7e7606122e5c1a73584/e5715/integration-graphic.png 768w,\n/static/e321b9bb7532e7e7606122e5c1a73584/21b4d/integration-graphic.png 1280w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A perfect CIAM platform needs to be able to integrate more than just people. There are lots of identity-filled business processes and practices, and in the future the number of these is only set to grow.</p>\n<p>A well-designed customer identity solution connects all native and third-party applications that handle customer data.</p>\n<p>APIs let you quickly integrate systems that need to work together across providers, so the APIs available from your CIAM provider need to work with every system that can benefit from <a href=\"https://www.loginradius.com/integrations/\">CIAM integration</a>.</p>\n<p>To make the most of your customer identity and access management solution, it needs to integrate seamlessly with your CRM, business intelligence, analytics, content management, and marketing automation systems. You also need to know that your vendor has the capacity to create effective APIs to let you take advantage of new technology as it comes online.</p>\n<h3 id=\"4-data-access-control-and-aggregation-process\" style=\"position:relative;\"><a href=\"#4-data-access-control-and-aggregation-process\" aria-label=\"4 data access control and aggregation process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Data Access Control and Aggregation Process</h3>\n<p><a href=\"https://www.loginradius.com/blog/2018/10/digital-transformation-safeguarding-customer-experience/\">Customer data needs to be securely protected</a> at all times, yet at the same time be available to those who should be able to use it. A good CIAM solution will let you develop schemas flexibly so you can get the most out of your systems</p>\n<p>Without effective data access control, data governance is useless. You need to know these essentials:</p>\n<ul>\n<li>Where did the data come from?</li>\n<li>Where should it be synchronized?</li>\n<li>Who should have the right and opportunity to access and/or change it?</li>\n</ul>\n<p>All of these things need to be manageable across future system updates without fail. At the same time, there should be no need to mess around with schemas that work well.</p>\n<h3 id=\"5-security-compliance\" style=\"position:relative;\"><a href=\"#5-security-compliance\" aria-label=\"5 security compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Security Compliance</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CIAM Platform\"\n        title=\"CIAM Platform\"\n        src=\"/static/06ca9f520a914d46baf6eca2ecd75ddd/e5715/global-compliance-graphic.png\"\n        srcset=\"/static/06ca9f520a914d46baf6eca2ecd75ddd/a6d36/global-compliance-graphic.png 650w,\n/static/06ca9f520a914d46baf6eca2ecd75ddd/e5715/global-compliance-graphic.png 768w,\n/static/06ca9f520a914d46baf6eca2ecd75ddd/21b4d/global-compliance-graphic.png 1280w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Your CIAM platform must <a href=\"https://secureprivacy.ai/complete-guide-to-international-data-privacy-laws/\">meet compliance requirements on a global scale</a>, even though many of these requirements are constantly changing and evolving. Currently, here’s what your CIAM platform needs to do:</p>\n<ul>\n<li>Offer redundancy practices for protecting data in transit and at rest.</li>\n<li>Store and manage access to customer data.</li>\n<li>Implement multi-factor and enhanced authorization.</li>\n<li>Be regularly certified by third-party security standards like SOC 2, HIPAA, and ISO.</li>\n<li>Be able to meet industry and location-specific needs wherever you do businesses.</li>\n</ul>\n<p>Make sure you aren’t wasting time and money on security compliance—use an up-to-date cloud CIAM system.</p>\n<h3 id=\"6-customer-analytics\" style=\"position:relative;\"><a href=\"#6-customer-analytics\" aria-label=\"6 customer analytics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Customer Analytics</h3>\n<p>One of the best things about an advanced CIAM solution is the ability to tie in <a href=\"https://www.loginradius.com/customer-insights/\">customer analytics</a>, giving you a much deeper and clearer understanding of each customer. Here’s what this data can be used for:</p>\n<ul>\n<li>Monitor and improve customer experience.</li>\n<li>Feed data back to product development teams.</li>\n<li>Hone sales and marketing functions.</li>\n<li>Deliver targeted content effectively.</li>\n</ul>\n<p>CIAM can be used to both extract and store many different data points, feeding them back to your other systems for use.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-case-for-buying-over-building/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buy-vs-build\"\n        title=\"buy-vs-build\"\n        src=\"/static/a1eb981f4ba5aed53fe72afe342872f7/e5715/buy-vs-build.png\"\n        srcset=\"/static/a1eb981f4ba5aed53fe72afe342872f7/a6d36/buy-vs-build.png 650w,\n/static/a1eb981f4ba5aed53fe72afe342872f7/e5715/buy-vs-build.png 768w,\n/static/a1eb981f4ba5aed53fe72afe342872f7/63ff0/buy-vs-build.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"7-scalability-during-high-demand\" style=\"position:relative;\"><a href=\"#7-scalability-during-high-demand\" aria-label=\"7 scalability during high demand permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Scalability During High Demand</h3>\n<p>Your CIAM solution must be not only scalable, but rapidly so, making it possible to meet unexpected demand without faltering. You shouldn’t ever need to worry that a promotion or event could affect the smooth operation of your account features.</p>\n<h3 id=\"8-better-customer-experience\" style=\"position:relative;\"><a href=\"#8-better-customer-experience\" aria-label=\"8 better customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Better Customer Experience</h3>\n<p>All told, your CIAM platform needs to boost customer experience in every possible way. A reduced initial entry threshold that <a href=\"https://www.loginradius.com/blog/identity/reconsidering-social-login-security-privacy-angle/\">leverages social login</a> or passwordless login is just the start.</p>\n<p>Advanced analytics, effective self-service options, and integration with all of your customer-facing functions should all work to improve the way customers access your systems. And storing everything about one customer in the same place—data, analytics, preferences, and browsing/purchase history—will make it much easier for employees to manage customer accounts.</p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>The main thing to remember is that customer IAM is all about customer experience and customer trust. More than just an identity platform, and more than just an access management solution, LoginRadius offers a way to go beyond customer expectations.</p>\n<p>Today that means you need to offer self-service data management and make use of the additional customer data that CIAM platform can give you. Only then can you improve what you offer customers at virtually every point in their journey.</p>\n<p><a href=\"https://www.loginradius.com/book-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CIAM Platform\"\n        title=\"CIAM Platform\"\n        src=\"/static/972149f11a42cafbe490512ce1a71dc0/e5715/CTA-Graphics-for-Blogs-13.png\"\n        srcset=\"/static/972149f11a42cafbe490512ce1a71dc0/a6d36/CTA-Graphics-for-Blogs-13.png 650w,\n/static/972149f11a42cafbe490512ce1a71dc0/e5715/CTA-Graphics-for-Blogs-13.png 768w,\n/static/972149f11a42cafbe490512ce1a71dc0/63ff0/CTA-Graphics-for-Blogs-13.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 10, 2019","updated_date":null,"description":"More than just individuals, a perfect CIAM platform needs to be able to incorporate. There are plenty of business processes and activities loaded with identity, and the number of these is only set to increase in the future. Both native and third-party applications that manage customer data are linked by a well-designed customer identity solution.","title":"8 Key Components of a Perfect CIAM Platform","tags":["ciam platform","compliance","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/59b043bbfdccfbcbb3f1ae1e7586a72d/0756a/fetaure-image-1.png","srcSet":"/static/59b043bbfdccfbcbb3f1ae1e7586a72d/69585/fetaure-image-1.png 200w,\n/static/59b043bbfdccfbcbb3f1ae1e7586a72d/497c6/fetaure-image-1.png 400w,\n/static/59b043bbfdccfbcbb3f1ae1e7586a72d/0756a/fetaure-image-1.png 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Customer identity and access management (CIAM) is taking over the customer login experience. There’s more at stake than just…","fields":{"slug":"/identity/customer-identity-and-access-management/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Customer identity and access management (CIAM) is taking over the customer login experience. There’s more at stake than just registration and authentication. In this article, we have explained how CIAM can help your business face the future head-on.</p>\n<p>CIAM simplifies every business task that deals with your customers on an individual basis, including those that haven’t registered on your site yet. With a single data hub for all identities, CIAM seamlessly links authentication, <a href=\"https://www.loginradius.com/customer-management/\">customer management</a>, sales, marketing, business intelligence, and services.</p>\n<p>Companies that focus on providing an excellent digital experience to their customers should also focus on offering customers personalizing services. To accomplish this, businesses need to build a 360-degree view of the customer profile based on interactions with the company.</p>\n<p><strong><em>“If your business isn’t using CIAM, you stand every chance of lagging behind businesses that are making the most of the technology and the customer data it collects.”</em></strong> </p>\n<p>At the same time, companies need to ensure the <a href=\"https://www.loginradius.com/blog/2020/06/consumer-data-privacy-security/\">safety of these data to secure customer trust</a>. This twin objective of enabling excellent customer experience and reliable security systems can be met by implementing a Customer Identity and Access Management (CIAM) system.</p>\n<p>A CIAM solution usually offers a combination of features including customer registration, self-service account management, consent and preferences management, <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, multi-factor authentication (MFA), access management, directory services, and <a href=\"https://www.loginradius.com/data-governance/\">data access governance</a>.</p>\n<p>At the extreme scale and performance, a customer identity and access management solutions ensure a secure, seamless customer experience regardless of which channels (web, mobile, tablet, etc.) customers use to engage with an organization.</p>\n<h2 id=\"what-is-customer-identity-and-access-management-ciam\" style=\"position:relative;\"><a href=\"#what-is-customer-identity-and-access-management-ciam\" aria-label=\"what is customer identity and access management ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Customer Identity and Access Management (CIAM)?</h2>\n<p><strong>Customer identity and access management</strong> (CIAM) is a digital identity management software solution for businesses that combines login verification with customer data storage. CIAM aims to improve the customer's sign-up and login experience while securely managing customer identities. </p>\n<p>CIAM offers the luxury of a centralized customer database that links all other apps and services to provide a secure and seamless customer experience.</p>\n<h2 id=\"a-recent-market-overview-of-ciam\" style=\"position:relative;\"><a href=\"#a-recent-market-overview-of-ciam\" aria-label=\"a recent market overview of ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Recent Market Overview of  CIAM</h2>\n<p>Let’s start by outlining the scale of the issue. <a href=\"https://www.superoffice.com/blog/customer-experience-statistics/\">Research suggests</a> that B2B companies see customer experience as the most exciting business opportunity in 2020. Over <a href=\"https://www.superoffice.com/blog/customer-experience-statistics/\">85% of buyers</a> say they are willing to pay more for excellent customer experiences. Today, however, <a href=\"https://www.forbes.com/sites/christinecrandell/2013/01/21/customer-experience-is-it-the-chicken-or-egg/#495344eb3557\">only 1% of customers</a> think that companies can deliver a level of customer service that consistently meets their expectations.</p>\n<p>It is clear that consumers want a better experience, but this can’t come at the expense of security. In a recent survey, <a href=\"https://businessinsights.bitdefender.com/businesses-can-lose-up-to-58-of-customers-after-a-data-breach-research-shows\">83% of US customers</a> said that they would stop buying from a company that had experienced a data breach–21% said they would never return. Overall, the survey showed you could lose <a href=\"https://businessinsights.bitdefender.com/businesses-can-lose-up-to-58-of-customers-after-a-data-breach-research-shows\">up to half your customers</a> if you’ve been hacked. </p>\n<p><img src=\"/c002c85bb638b44433d7d4832ccb5a39/Customer-identity-and-access-management-loginradius-1024x456.gif\" alt=\"Customer identity and access management\"></p>\n<h2 id=\"importance-of-ciam\" style=\"position:relative;\"><a href=\"#importance-of-ciam\" aria-label=\"importance of ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Importance of CIAM</h2>\n<p>A secure login experience is a minimum that today’s customers expect from a modern organization. It engenders trust and encourages your customers to come back to you time and again. Hence, the importance of the <a href=\"https://www.loginradius.com/blog/2019/06/perfect-ciam-platform/\">CIAM platform</a> chimes in.</p>\n<h3 id=\"for-customers\" style=\"position:relative;\"><a href=\"#for-customers\" aria-label=\"for customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For Customers:</h3>\n<p>Every company wants to become a technology enterprise today. With the explosion of channels, devices, platforms, and touchpoints, customer needs are changing. And <a href=\"https://www.loginradius.com/security/\">secure experiences with</a> those interactions are of paramount importance. </p>\n<p>CIAM is a fundamental technology that serves increasingly complex consumer needs and enables businesses to deliver stable, seamless digital experiences.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-enterprise-buyers-guide-to-consumer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Enterprise Buyer’s Guide to Consumer Identity Ebook\"\n        title=\"Enterprise Buyer’s Guide to Consumer Identity Ebook\"\n        src=\"/static/6cf3b3c14d1cbec2bf253b24dcd51704/e5715/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity-1024x310.png\"\n        srcset=\"/static/6cf3b3c14d1cbec2bf253b24dcd51704/a6d36/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity-1024x310.png 650w,\n/static/6cf3b3c14d1cbec2bf253b24dcd51704/e5715/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity-1024x310.png 768w,\n/static/6cf3b3c14d1cbec2bf253b24dcd51704/2bef9/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"for-businesses\" style=\"position:relative;\"><a href=\"#for-businesses\" aria-label=\"for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For Businesses:</h3>\n<p>Customer identity and access management have historically been a use case for consumers (B2C). Yet an organization's client may also be a company (B2B). The new way of doing business covers a plethora of markets and use cases as consumers demand more from companies they do business with.</p>\n<p>From an enterprise point of view, a CIAM solution has several useful <a href=\"https://www.loginradius.com/authentication/\">features that can improve security</a>, enhance customer data collation, and provide critical data to the marketing and sales departments.</p>\n<h2 id=\"the-standard-benefits-of-ciam\" style=\"position:relative;\"><a href=\"#the-standard-benefits-of-ciam\" aria-label=\"the standard benefits of ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Standard Benefits of CIAM</h2>\n<p>A fundamental customer identity and access management  (CIAM) system provide the following advantages for businesses and their customers.</p>\n<h3 id=\"1-streamlined-customer-experience\" style=\"position:relative;\"><a href=\"#1-streamlined-customer-experience\" aria-label=\"1 streamlined customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>1. Streamlined Customer Experience</strong></h3>\n<p>A streamlined customer experience delivered by an organization reflects that it’s up-to-date and concerned about providing the easiest login possible.</p>\n<p>By providing a <a href=\"https://blog.loginradius.com/identity/social-authentication/\">smooth login experience</a> for your applications and services, you encourage customers to try out more of your digital offerings. The end result is a customer who is more embedded in your digital ecosystem, without extra effort.</p>\n<p><strong><em>“A streamlined customer experience delivered by an organization reflects that it’s up-to-date and concerned about providing the easiest login possible.”</em></strong></p>\n<p>For example, <a href=\"https://www.loginradius.com/single-sign-on/\">implementing a single sign-on</a> through a customer identity and access management system means a customer only needs one account for all of your digital touchpoints. Whether your customers are signing in from a browser or a mobile device, they’ll benefit from not having to sign in repeatedly to different services again and again—encouraging repeat use of your apps and services.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 43.07692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"customer identity and access management\"\n        title=\"customer identity and access management\"\n        src=\"/static/cf946661e8ee37c9e561d69648cfbe7b/e5715/Medium-post-02.png\"\n        srcset=\"/static/cf946661e8ee37c9e561d69648cfbe7b/a6d36/Medium-post-02.png 650w,\n/static/cf946661e8ee37c9e561d69648cfbe7b/e5715/Medium-post-02.png 768w,\n/static/cf946661e8ee37c9e561d69648cfbe7b/7fac3/Medium-post-02.png 3595w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"2-security-for-data-and-accounts\" style=\"position:relative;\"><a href=\"#2-security-for-data-and-accounts\" aria-label=\"2 security for data and accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>2. Security for Data and Accounts</strong></h3>\n<p>A standard CIAM system provides essential security features that safeguard both data and account access. For example, <a href=\"https://blog.loginradius.com/identity/risk-based-authentication/\">with risk-based authentication</a>, each customer’s usage and login patterns are monitored, making it easy to spot unusual (and therefore potentially fraudulent) activity.</p>\n<p>For use cases where you need an extra layer of security, you can enable <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a> (MFA), which verifies a customer’s identity by requiring a second step, such as entering an SMS code or clicking an email link.</p>\n<p>Your secure login procedures reassure customers that they are safe using your services—something that’s essential with the number of public <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">data breaches reaching the news</a>.</p>\n<h3 id=\"3-scalability-and-uptime\" style=\"position:relative;\"><a href=\"#3-scalability-and-uptime\" aria-label=\"3 scalability and uptime permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>3. Scalability and Uptime</strong></h3>\n<p>With just one customer identity management system that’s fully managed for you, reliability is maximized, and the need for resources is kept to a minimum. A <a href=\"https://blog.loginradius.com/identity/secure-centralized-access-management-without-compromising-cx/\">centralized login system</a> for all of your apps and services makes it easy to add new services as they come online. A cloud implementation can quickly scale up or down depending on your usage, and automated failover can cut downtime to virtually zero.</p>\n<p><strong><em>“As your digital ecosystem grows, a modern CIAM solution reduces the workload for your IT department and makes it easy to expand your business.”</em></strong></p>\n<h3 id=\"4-a-unified-view-of-each-customer\" style=\"position:relative;\"><a href=\"#4-a-unified-view-of-each-customer\" aria-label=\"4 a unified view of each customer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>4. A Unified View of Each Customer</strong></h3>\n<p>By connecting the data gathered from all of your services and websites, you get a complete <a href=\"https://www.loginradius.com/customer-insights/\">overview of each customer</a>. With a full picture of everything a customer has done since the first time they visited your site, you’ll have access to real-world data in startling detail.</p>\n<p><img src=\"/dd20ffd19af3aeb6889383c57a060f77/SearchCustomers_145675b7b2399d905b1.79082854.gif\" alt=\"customer identity and access management\"></p>\n<p>You can use this data to monitor customer journeys across multiple apps and services, create marketing personas that reflect your customers, design new products or special offers, and direct your customers towards choices that will benefit the both of you.</p>\n<p>When you understand your customers more deeply, you can reach them more easily and serve them better. All of this adds up to more revenue and a lower cost of acquisition and retention.</p>\n<h3 id=\"5-compliance-with-privacy-regulations\" style=\"position:relative;\"><a href=\"#5-compliance-with-privacy-regulations\" aria-label=\"5 compliance with privacy regulations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>5. Compliance With Privacy Regulations</strong></h3>\n<p><a href=\"https://www.loginradius.com/compliances/\">Privacy compliance</a> is a critical aspect of any company handling customer data and an essential part of any online business. The EU’s GDPR and the recently rolled out <a href=\"https://www.loginradius.com/blog/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">California’s CCPA</a> are just a few examples of privacy laws that have a global reach, affecting any data flowing into or out of the EU. Most Western countries have similar regulations or are enacting similar laws, and the rest of the world is rapidly catching up.</p>\n<p>If you have an online business that you want to keep viable in 2020 or beyond, you must maintain compliance with these regulations. Here are some of the things you need to provide or be able to do to meet regulations:</p>\n<ul>\n<li>Provide customers with a detailed report of their data that you hold.</li>\n<li>Enable customers to access their data via self-service.</li>\n<li>Allow customers to control which of their data you keep or discard.</li>\n<li>Allow customers to delete data they do not want you to store.</li>\n<li>Provide regulators a report of your user data usage and retention policies.</li>\n<li>Show regulators the steps you take to keep customer data secure.</li>\n<li>Show that you minimize data retention and avoid using data unnecessarily.</li>\n</ul>\n<p>CIAM can also be tailored to meet the regulatory requirements of different regions—essential for global business.</p>\n<p><strong><em>“A modern CIAM solution enables you to meet all of these privacy requirements and more while simplifying the process and reducing the costs associated.“</em></strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 43.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"customer identity and access management\"\n        title=\"customer identity and access management\"\n        src=\"/static/1573d804ff6c1f02c73fed83da30c798/e5715/Medium-post-V01.02-03.png\"\n        srcset=\"/static/1573d804ff6c1f02c73fed83da30c798/a6d36/Medium-post-V01.02-03.png 650w,\n/static/1573d804ff6c1f02c73fed83da30c798/e5715/Medium-post-V01.02-03.png 768w,\n/static/1573d804ff6c1f02c73fed83da30c798/30b42/Medium-post-V01.02-03.png 3553w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"6-advanced-login-options\" style=\"position:relative;\"><a href=\"#6-advanced-login-options\" aria-label=\"6 advanced login options permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>6. Advanced Login Options</strong></h3>\n<p>In the world of CIAM, a business can gain an advantage by implementing new and advanced login options that are not yet widely adopted. These login methods further <a href=\"https://www.loginradius.com/customer-experience-solutions/\">improve customer experience</a>, customer trust, or both.</p>\n<p><strong>Passwordless Login</strong> simplifies and streamlines the login process, while at the same time making it more protected. It also helps you present your company as a modern, secure organization that uses the latest technology to safeguard your customers. <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">Passwordless login</a> uses a customer’s email address or phone number to send them a one-time link that they click to log in.</p>\n<p><strong>One-Touch Login</strong> also allows customers to log in with a generated link sent to their email address or a one-time password sent to their phone. However, unlike Passwordless Login, the customer does not need to be an existing user in the system, and no credentials are submitted. In other words, the customer gets the benefits of secure access without the commitment of account creation.</p>\n<p><strong>Smart Login</strong> gives users a quick and secure login for the internet of things (IoT) and smart devices, which are increasingly becoming a vital part of today’s digital ecosystem. Smart login delegates the authentication process for smart TVs, gaming consoles, and other IoT devices to other devices that are easier and more secure for entering and managing passwords.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50.46153846153846%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"customer identity and access management\"\n        title=\"customer identity and access management\"\n        src=\"/static/1a284e99fe771cbf64a63c092dfde001/e5715/Medium-post-V01.02-04.png\"\n        srcset=\"/static/1a284e99fe771cbf64a63c092dfde001/a6d36/Medium-post-V01.02-04.png 650w,\n/static/1a284e99fe771cbf64a63c092dfde001/e5715/Medium-post-V01.02-04.png 768w,\n/static/1a284e99fe771cbf64a63c092dfde001/d8a88/Medium-post-V01.02-04.png 3677w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"7-optimized-data-collection\" style=\"position:relative;\"><a href=\"#7-optimized-data-collection\" aria-label=\"7 optimized data collection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>7. Optimized Data Collection</strong></h3>\n<p>As customers become more savvy and cautious about handing over their data, businesses can leverage CIAM to collect information in more respectful ways. Here are a few unique ways:</p>\n<p><a href=\"https://www.loginradius.com/blog/2019/02/presenting-progressive-profiling-loginradius/\"><strong>Progressive Profiling</strong></a> allows you to collect customer data over time, as and when needed. You can start by building a basic profile with the simplest login details (like name and email, or a social login request for just these details). You can then ask for more information as needed depending on which of your products customers use.</p>\n<p>Progressive Profiling is a great way to leverage today’s limited social login data and a fantastic way to build trust as you build up a picture of your customer. You can also use progressive profiling to measure how much your customers trust you by offering the opportunity to add more information without making it compulsory.</p>\n<p><strong>Social Login</strong> can be a risk as it is a benefit in today’s digital environment when data leaks and account breaches plague major social providers. With the right precautions in place, <a href=\"https://www.loginradius.com/blog/2018/11/reconsidering-social-login-security-privacy-angle/\">social login can still be a great way</a> for your customers to access your services.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 85.6923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"customer identity and access management\"\n        title=\"customer identity and access management\"\n        src=\"/static/ea983b7e1319818f6b204a4de0d2a855/212bf/progressive-data-gather.jpg\"\n        srcset=\"/static/ea983b7e1319818f6b204a4de0d2a855/6aca1/progressive-data-gather.jpg 650w,\n/static/ea983b7e1319818f6b204a4de0d2a855/212bf/progressive-data-gather.jpg 768w,\n/static/ea983b7e1319818f6b204a4de0d2a855/d165a/progressive-data-gather.jpg 1400w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"8-consent-management\" style=\"position:relative;\"><a href=\"#8-consent-management\" aria-label=\"8 consent management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>8. Consent Management</strong></h3>\n<p>As part of international privacy regulations like the <a href=\"https://www.loginradius.com/blog/2019/09/ccpa-vs-gdpr-the-compliance-war/\">GDPR and CCPA</a>, businesses need to be clear with customers about their consent to data collection and communication.</p>\n<p>CIAM provides tools for <a href=\"https://en.wikipedia.org/wiki/Consent_management\">managing a customer’s consent</a> to give them an understanding and control over their consent. <a href=\"https://www.loginradius.com/blog/2020/05/consent-management/\">Consent management involves</a> requesting consent during registration and authentication and provides the ability to modify existing permissions and apply new consents retroactively.</p>\n<h2 id=\"stay-ahead-of-the-curve-with-ciam\" style=\"position:relative;\"><a href=\"#stay-ahead-of-the-curve-with-ciam\" aria-label=\"stay ahead of the curve with ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stay Ahead of the Curve with CIAM</h2>\n<p>Today, we’re moving away from simple customer access to more complex data monitoring to gain a better understanding of each customer.</p>\n<p>A customer identity access management solution can bridge the gap between your customers and the latest developments in identity and personal data protection—essential in today’s connected world. CIAM helps you take the next step in assuring your customers’ online safety while simplifying their online experience across new digital platforms.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Many companies provide their customers with a <a href=\"https://www.loginradius.com/blog/identity/customer-experience-driving-digital-transformations/\">modern digital experience</a>, thanks to a customer identity management system. If you want to give your customers the same advantages, the time to act is now.</p>\n<p>A CIAM solution like LoginRadius can help you achieve this with customer account information, including data, consent, and activity, accessible from one dashboard.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is the difference between CIAM and IAM?</strong></p>\n<p>A CIAM (consumer identity and access management) solution manages your services’ external consumer identities, whereas an IAM (workforce identity and access management) solution manages your organization's identities. <a href=\"https://www.loginradius.com/blog/identity/iam-vs-ciam/\">Read more</a>.</p>\n<p><strong>2. Why is CIAM important?</strong></p>\n<p>CIAM enables businesses to enable quick, convenient, secure and unified access across multiple channels. Moreover, a CIAM solution allows you to use customer data, including <a href=\"https://www.loginradius.com/customer-insights/\">customer behavior</a>, to understand your target audience better and tailor your service, products, and marketing. </p>\n<p><strong>3. How does CIAM protect customer data?</strong></p>\n<p>A CIAM solution includes various authentication mechanisms like multi-factor authentication (MFA), <a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">risk-based authentication (RBA)</a>, and more to ensure even if the primary layer of protection like passwords is compromised, access is restricted to a particular account. </p>\n<p><strong>4. How much does a CIAM cost?</strong></p>\n<p>Typically, there are <a href=\"https://www.loginradius.com/pricing/\">different plans</a> for enterprises and developers. Businesses can choose monthly, quarterly, or yearly plans depending on the services and needs. </p>\n<p><strong>5. How do I get CIAM?</strong></p>\n<p>You can contact the <a href=\"https://www.loginradius.com/contact-sales/\">LoginRadius sales</a> team to schedule a free personalized demo and learn how the leading cloud-based CIAM works for your business. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 03, 2019","updated_date":null,"description":"The customer login experience is taken over by customer identity and access management (CIAM). There's more than just registration and authentication at stake. You're losing out on a host of advantages if all you get from your clients when they log in is an email address to send newsletters and passwords. We illustrate in this article how CIAM will help the organisation face the future head-on.","title":"What is Customer Identity and Access Management(CIAM)?","tags":["ciam solution","compliance","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4598540145985401,"src":"/static/d93624433155d01d13652a3fa3cad3da/ee604/ciam-cover.png","srcSet":"/static/d93624433155d01d13652a3fa3cad3da/69585/ciam-cover.png 200w,\n/static/d93624433155d01d13652a3fa3cad3da/497c6/ciam-cover.png 400w,\n/static/d93624433155d01d13652a3fa3cad3da/ee604/ciam-cover.png 800w,\n/static/d93624433155d01d13652a3fa3cad3da/a8378/ciam-cover.png 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction First, let’s understand what is SSO (Single Sign-On).  Introducing Single Sign On (SSO) to your customers can offer greater…","fields":{"slug":"/identity/what-is-single-sign-on/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>First, let’s understand what is SSO (Single Sign-On).  Introducing Single Sign On (SSO) to your customers can offer greater security and improved usability. That’s two of the many key <a href=\"https://www.loginradius.com/blog/identity/benefits-single-sign-on-sso/\">benefits of SSO.</a></p>\n<p>Let’s face it. No one likes remembering credentials. They seem like exerting a lot of pressure on the memory. What's worse is many use the same username and password, irrespective of the application they are using.</p>\n<p>This is where the Single Sign On technology comes into focus and works like a champ. To understand this solution, let's consider an analogy: \"Imagine going to the mall, and at each store, you must register with the store for your first purchase. Then, every time after that, you have to prove who you are to buy something.\"</p>\n<p>Unfortunately, this is what happens when you shop online. Each website makes you create a new and unique identity specific to that website. On top of that, you have to login and authenticate each time.</p>\n<p>While some web properties do offer the option to <a href=\"https://www.loginradius.com/social-login/\">sign in using social identity</a>, the majority of customers still have to log in to each web property. This often happens even when the websites are part of the same parent organization. Let’s understand what is SSO and how SSO works. </p>\n<h2 id=\"what-is-single-sign-on\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on\" aria-label=\"what is single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On?</h2>\n<p>Single Sign-On (SSO)  is a method of authentication that allows websites to use other trustworthy sites to verify users. Single sign-on allows a user to log in to any independent application with a single ID and password.</p>\n<p>SSO is an essential feature of an Identity and Access Management (IAM) platform for controlling access. Verification of user identity is important when it comes to knowing which permissions a user will have. Talking about the sso examples, the LoginRadius Identity platform is one example of managing access that combines user identity management solutions with SSO solutions.</p>\n<h2 id=\"how-single-sign-on-works\" style=\"position:relative;\"><a href=\"#how-single-sign-on-works\" aria-label=\"how single sign on works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Single Sign On Works?</strong></h2>\n<p>Single sign-on (SSO) is a system that allows users to access multiple applications and services with just one set of login credentials. </p>\n<p>When we talk about how how SSO works- it does  by authenticating a user's identity once and then granting access to all of the applications and services that the user is authorized to access. When a user attempts to access a resource from a service provider, the SSO system sends a request to the user's identity provider to authenticate the user's identity. </p>\n<p>Once the user is authenticated, the identity provider sends the necessary credentials to the service provider, allowing the user to access the requested resource. This process eliminates the need for users to remember and manage multiple usernames and passwords, streamlining the login process and improving the user experience.</p>\n<p>SSO also simplifies identity management for organizations, reducing the risk of data breaches and improving overall security.</p>\n<h2 id=\"what-is-a-single-sign-on-sso-authentication-token\" style=\"position:relative;\"><a href=\"#what-is-a-single-sign-on-sso-authentication-token\" aria-label=\"what is a single sign on sso authentication token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is a Single Sign-On (SSO) Authentication Token?</h2>\n<p>An SSO authentication token is a crucial aspect of the SSO process. Once a user is successfully authenticated, the Identity Provider (IDP) generates a token. This token contains information about the user's identity and permissions. The Service Provider (SP) then recognizes this token, granting access to the user without the need for re-authentication. Tokens are typically encrypted to ensure secure transmission and storage of user data.</p>\n<h2 id=\"how-are-saml-and-oauth-used-with-single-sign-on\" style=\"position:relative;\"><a href=\"#how-are-saml-and-oauth-used-with-single-sign-on\" aria-label=\"how are saml and oauth used with single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Are SAML and OAuth Used with Single Sign-On?</h2>\n<ul>\n<li><strong>SAML (Security Assertion Markup Language)</strong>: SAML is an XML-based open standard used for exchanging authentication and authorization data between the IDP and SP. It enables seamless SSO by allowing the IDP to send assertions about the user to the SP, which then grants access based on these assertions.</li>\n<li><strong>OAuth (Open Authorization)</strong>: OAuth is another protocol used with SSO, often seen in scenarios where a user wants to grant access to their information without sharing their credentials. It allows the user to authorize a third-party application to access their resources on another service provider. OAuth enhances security and user control in SSO scenarios.</li>\n</ul>\n<h2 id=\"what-makes-a-true-single-sign-on-system\" style=\"position:relative;\"><a href=\"#what-makes-a-true-single-sign-on-system\" aria-label=\"what makes a true single sign on system permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Makes a True Single Sign-On System?</h2>\n<p>A true SSO system offers several key features:</p>\n<ul>\n<li>Centralized Authentication: Users authenticate once, and this authentication is recognized across all connected applications.</li>\n<li>Seamless Experience: Users navigate between applications without the need for repeated logins.</li>\n<li>Token-Based Access: The system uses tokens to securely transmit and store user credentials and permissions.</li>\n<li>Integration with Identity Providers: The system seamlessly integrates with various identity providers, such as Microsoft Active Directory or Google Directory.</li>\n</ul>\n<h2 id=\"what-is-an-sso-software-vs-an-sso-solution\" style=\"position:relative;\"><a href=\"#what-is-an-sso-software-vs-an-sso-solution\" aria-label=\"what is an sso software vs an sso solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is an SSO Software vs. an SSO Solution?</h2>\n<ul>\n<li><strong>SSO Software</strong>: This refers to the technology and tools used to implement SSO, including protocols like SAML, OAuth, and OpenID Connect. It involves the software components that manage user authentication and authorization.</li>\n<li><strong>SSO Solution</strong>: An SSO authentication solution is a comprehensive package that includes SSO software along with additional features like user management, multi-factor authentication (MFA), and identity governance. It provides a complete system for managing user access across applications.</li>\n</ul>\n<h2 id=\"what-is-app-to-app-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#what-is-app-to-app-single-sign-on-sso\" aria-label=\"what is app to app single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is App-to-App Single Sign-On (SSO)?</h2>\n<p>App-to-App SSO authentication, also known as Service-to-Service SSO, enables seamless authentication and access between different applications within an organization's ecosystem. Instead of requiring users to log in multiple times when switching between apps, this approach maintains authentication sessions across the apps. It enhances productivity and user experience by eliminating the need for repeated logins.</p>\n<h2 id=\"what-is-single-sign-on-sso-software-as-a-service-saas\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on-sso-software-as-a-service-saas\" aria-label=\"what is single sign on sso software as a service saas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On (SSO) Software as a Service (SaaS)?</h2>\n<p>SSO Software as a Service (SaaS) is a cloud-based solution that offers SSO functionality to organizations without the need for on-premises infrastructure. With SSO SaaS, organizations can easily implement SSO across their applications and services by subscribing to a third-party provider. This approach simplifies deployment, maintenance, and scalability of SSO, making it accessible to businesses of all sizes.</p>\n<h2 id=\"how-does-single-sign-on-sso-fit-into-an-access-management-strategy\" style=\"position:relative;\"><a href=\"#how-does-single-sign-on-sso-fit-into-an-access-management-strategy\" aria-label=\"how does single sign on sso fit into an access management strategy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Single Sign-On (SSO) Fit into an Access Management Strategy?</h2>\n<p>Integrating SSO authentication into an Access Management Strategy enhances security, user experience, and operational efficiency:</p>\n<ul>\n<li><strong>Enhanced Security</strong>: SSO reduces the risk of password-related vulnerabilities and unauthorized access.</li>\n<li><strong>Streamlined User Experience</strong>: Users enjoy a seamless login experience across applications, boosting productivity.</li>\n<li><strong>Centralized Access Control</strong>: Administrators can manage user access and permissions from a centralized platform, ensuring consistency and compliance.</li>\n<li><strong>Cost Efficiency</strong>: SSO reduces IT costs associated with password resets and support, freeing up resources for other critical tasks.</li>\n</ul>\n<p>Incorporating SSO into an Access Management Strategy strengthens overall security posture while simplifying user access across the organization's digital assets.</p>\n<h2 id=\"what-are-the-benefits-of-single-sign-on\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-single-sign-on\" aria-label=\"what are the benefits of single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Benefits of Single Sign-On?</h2>\n<p>Till now, we’ve learned how SSO works, now let’s understand its benefits. Single Sign-On clearly minimizes the risk of poor password habits. Also, removing login credentials from servers or network storage can help a great deal in <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">preventing a cyber attack</a>. </p>\n<h3 id=\"benefits-for-customers\" style=\"position:relative;\"><a href=\"#benefits-for-customers\" aria-label=\"benefits for customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits for Customers</h3>\n<h4 id=\"1-seamless-user-experience\" style=\"position:relative;\"><a href=\"#1-seamless-user-experience\" aria-label=\"1 seamless user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Seamless user experience</h4>\n<p>Customers can use a single identity to navigate multiple web and mobile domains or service applications.</p>\n<h4 id=\"2-stronger-password-protection\" style=\"position:relative;\"><a href=\"#2-stronger-password-protection\" aria-label=\"2 stronger password protection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Stronger password protection</h4>\n<p>Because users only need to use one password, SSO makes generating, remembering, and using stronger passwords simpler for them.</p>\n<h4 id=\"3-reduces-customer-time\" style=\"position:relative;\"><a href=\"#3-reduces-customer-time\" aria-label=\"3 reduces customer time permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Reduces customer time</h4>\n<p>The time spent on re-entering passwords for the same identity. Users will spend less time logging into various apps to do their work. Ultimately it enhances the productivity of businesses.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Single Sign-on Datasheet\"\n        title=\"LoginRadius Single Sign-on Datasheet\"\n        src=\"/static/41cc8ea16144a85f22b499da107c16bf/e5715/DS-LoginRadius-Single-Sign-on-1-1024x310.png\"\n        srcset=\"/static/41cc8ea16144a85f22b499da107c16bf/a6d36/DS-LoginRadius-Single-Sign-on-1-1024x310.png 650w,\n/static/41cc8ea16144a85f22b499da107c16bf/e5715/DS-LoginRadius-Single-Sign-on-1-1024x310.png 768w,\n/static/41cc8ea16144a85f22b499da107c16bf/2bef9/DS-LoginRadius-Single-Sign-on-1-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"benefits-for-business\" style=\"position:relative;\"><a href=\"#benefits-for-business\" aria-label=\"benefits for business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits for Business</h3>\n<h4 id=\"1-improves-conversions-and-revenue\" style=\"position:relative;\"><a href=\"#1-improves-conversions-and-revenue\" aria-label=\"1 improves conversions and revenue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Improves conversions and revenue</h4>\n<p>Customers can access all domains and services with a single active session.</p>\n<h4 id=\"2-mitigates-risk\" style=\"position:relative;\"><a href=\"#2-mitigates-risk\" aria-label=\"2 mitigates risk permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Mitigates risk</h4>\n<p>Accessing third-party sites (user passwords are not stored or managed externally) becomes risk-free.</p>\n<h4 id=\"3-unifies-customer-profiles\" style=\"position:relative;\"><a href=\"#3-unifies-customer-profiles\" aria-label=\"3 unifies customer profiles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Unifies customer profiles</h4>\n<p>Creating a single instance of the customer data provides a centralized view of the <a href=\"https://www.loginradius.com/customer-profiling\">customer across all channels.</a></p>\n<h4 id=\"4-reduces-it-costs\" style=\"position:relative;\"><a href=\"#4-reduces-it-costs\" aria-label=\"4 reduces it costs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Reduces IT costs</h4>\n<p>Due to fewer help desk calls about passwords, IT can spend less time helping users to remember or reset their passwords for hundreds of applications.</p>\n<h2 id=\"what-are-the-different-types-of-single-sign-on\" style=\"position:relative;\"><a href=\"#what-are-the-different-types-of-single-sign-on\" aria-label=\"what are the different types of single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Different Types of Single Sign-On?</h2>\n<p>Single sign-on (SSO) is not a one-size-fits-all solution, and there are several different types of SSO that organizations can choose from. The most common types of SSO include:</p>\n<ul>\n<li><strong>Web SSO:</strong> This type of SSO allows users to access multiple web-based applications and services with a single set of credentials. When a user logs in to one of the web-based applications, they are automatically logged in to all of the other applications that they are authorized to access.</li>\n<li><strong>Enterprise SSO:</strong> Enterprise SSO is designed for organizations that use a mix of web-based and non-web-based applications. This type of SSO typically involves the use of a desktop client or browser extension that manages the user's credentials and automates the login process.</li>\n<li><strong>Mobile SSO:</strong> Mobile SSO allows users to access mobile applications with a single set of credentials. This type of SSO is becoming increasingly popular as more organizations adopt mobile-first strategies.</li>\n</ul>\n<h2 id=\"how-is-single-sign-on-implemented\" style=\"position:relative;\"><a href=\"#how-is-single-sign-on-implemented\" aria-label=\"how is single sign on implemented permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Single Sign-On Implemented?</h2>\n<p>Implementing single sign-on (SSO) requires careful planning and coordination between the identity provider and the service providers. The first step in implementing SSO is to choose an identity provider that supports the necessary protocols, such as SAML, OAuth, or OpenID Connect. </p>\n<p>Once the identity provider has been selected, the service providers must be configured to accept SSO requests from the identity provider. This typically involves configuring the service providers to trust the identity provider and to use the appropriate SSO protocol. </p>\n<p>The identity provider must also be configured to authenticate users and provide the necessary credentials to the service providers. Finally, the SSO system must be tested to ensure that it is working properly and that users are able to access the resources that they are <a href=\"https://www.loginradius.com/blog/identity/loginradius-m2m-authorization-data-access/\">authorized to access</a>.</p>\n<h2 id=\"how-to-choose-a-secure-sso-solution\" style=\"position:relative;\"><a href=\"#how-to-choose-a-secure-sso-solution\" aria-label=\"how to choose a secure sso solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Choose a Secure SSO Solution?</h2>\n<p>Your SSO solution must meet the basic needs to support IT needs. That means a stable solution and a highly functional one. Today, digital transformation relies on a platform for <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Customer</a> <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\"></a> <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Identity and Access Management</a> (CIAM), which includes SSO and other tools. So, here what you need to keep in mind while narrowing down your SSO solution. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius secure sso solution\"\n        title=\"Loginradius secure sso solution\"\n        src=\"/static/355754f63678ee3d681fff576bd4e865/212bf/Loginradius-secure-sso-solution.jpg\"\n        srcset=\"/static/355754f63678ee3d681fff576bd4e865/6aca1/Loginradius-secure-sso-solution.jpg 650w,\n/static/355754f63678ee3d681fff576bd4e865/212bf/Loginradius-secure-sso-solution.jpg 768w,\n/static/355754f63678ee3d681fff576bd4e865/72e01/Loginradius-secure-sso-solution.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"7-key-points-to-consider-while-choosing-a-secure-single-sign-on-solution\" style=\"position:relative;\"><a href=\"#7-key-points-to-consider-while-choosing-a-secure-single-sign-on-solution\" aria-label=\"7 key points to consider while choosing a secure single sign on solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Key Points to Consider While Choosing a Secure Single Sign-On Solution</h2>\n<h3 id=\"1-support-for-developers\" style=\"position:relative;\"><a href=\"#1-support-for-developers\" aria-label=\"1 support for developers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Support for Developers</h3>\n<p>Make sure your SSO solution provides adequate life-cycle management API support and SDKs for major platforms. </p>\n<h3 id=\"2-authentication\" style=\"position:relative;\"><a href=\"#2-authentication\" aria-label=\"2 authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Authentication</h3>\n<p>What about the extra layer of security? Find out if it supports MFA, adaptive authentication, automatic forced authentication, and more. </p>\n<h3 id=\"3-federation\" style=\"position:relative;\"><a href=\"#3-federation\" aria-label=\"3 federation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Federation</h3>\n<p>Find out if you will be allowed to use any corporate identity provider you prefer. Make sure it supports Microsoft Active Directory, Google Directory, etc. </p>\n<h3 id=\"4-mobile-phones-ready\" style=\"position:relative;\"><a href=\"#4-mobile-phones-ready\" aria-label=\"4 mobile phones ready permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Mobile phones ready</h3>\n<p>Ensure that your identity platform supports SSO for mobile devices and syncs well with various multi-factor authentication tools. </p>\n<h3 id=\"5-flexible-rules-governing-passwords\" style=\"position:relative;\"><a href=\"#5-flexible-rules-governing-passwords\" aria-label=\"5 flexible rules governing passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Flexible rules governing passwords</h3>\n<p>It should support password validation requirements like customizable password expiration limit, password complexity, and expiration notifications. </p>\n<h3 id=\"6-safety-reputation\" style=\"position:relative;\"><a href=\"#6-safety-reputation\" aria-label=\"6 safety reputation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Safety reputation</h3>\n<p>Check out if it meets security standards like ISO 27017, ISO 27018, ISO 27001, SOC 2 Type 2, and global compliances like the <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">GDPR and CCPA</a>, etc.</p>\n<h3 id=\"7-behavioral-analytics\" style=\"position:relative;\"><a href=\"#7-behavioral-analytics\" aria-label=\"7 behavioral analytics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Behavioral analytics</h3>\n<p>Find out if it allows you to blacklist or whitelist IPs, set responses to counter brute force attempts and there are provisions for re-authentication.</p>\n<h2 id=\"how-loginradius-single-sign-on-authentication-works\" style=\"position:relative;\"><a href=\"#how-loginradius-single-sign-on-authentication-works\" aria-label=\"how loginradius single sign on authentication works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Single Sign-On Authentication Works?</h2>\n<p>Since now you know what is an sso login, let’s understand how LoginRadius SSO is superior. Single sign on (SSO) can be implemented in several ways, but typically follows a standard or protocol, as well as several technologies which can enforce the standards/protocols listed below.</p>\n<h3 id=\"1-web-sso\" style=\"position:relative;\"><a href=\"#1-web-sso\" aria-label=\"1 web sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Web SSO</h3>\n<p>Web single sign-on enables your customers to access any of your connected web properties with a single identity. As customers navigate from one site to the next, your systems will be able to recognize who they are on each site.</p>\n<p><a href=\"https://www.loginradius.com/docs/single-sign-on/web-and-mobile-sso/loginradius-web-sso/\">Web Single Sign-On</a> also is known as LoginRadius Single Sign-On, is a browser-based session management system that uses browser storage mechanisms (sessionStorage, localStorage, Cookies) to hold the user session across your assets.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 28.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABC0lEQVQY03WRwU+DMBjF9/9fjVfdzejNeDCeXGKMcRpnIjMzQ5m4IQwcyErLoPTZfoVETHzJC7wefq/f10HJC5RCwEg2CrW2+SplbaXIXSzrBnkpwXbW5l/oM6OBP3tE4E7xn1IhkYgG28qCK6kw8nLsjyMMJzEOtfduQ1x63xYY+S5C/xWm4Oo9x8FkjQs3o8ZAU7yswiLcwF3FWG5rXVDjbsVw7HzhdLYhHz0ldEbAt/E5PpxrCvOEE3S65jSuuV2gIX7K8ZlxREWNopJ4CBhONPDsJSUb+H0HXD7fIF44v3bVF+1UAe2KKI/0eN3Iw78jF4xBCE6h0bfq3H+Utq7N5tF2sunZFBn9AG6px3zVEN4TAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius-web-sso\"\n        title=\"Loginradius-web-sso\"\n        src=\"/static/f284649388e18d83a9e0344429bb3160/e5715/web-sso-1-1024x294.png\"\n        srcset=\"/static/f284649388e18d83a9e0344429bb3160/a6d36/web-sso-1-1024x294.png 650w,\n/static/f284649388e18d83a9e0344429bb3160/e5715/web-sso-1-1024x294.png 768w,\n/static/f284649388e18d83a9e0344429bb3160/2bef9/web-sso-1-1024x294.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>This storage is stored on a centralized domain managed by LoginRadius and can be accessed via our JavaScript Single Sign-On APIs, or directly through a JSONP call. This session is integrated seamlessly into our standard Customer Identity and Access Management scripts.</p>\n<h3 id=\"2-mobile-sso\" style=\"position:relative;\"><a href=\"#2-mobile-sso\" aria-label=\"2 mobile sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Mobile SSO</h3>\n<p>Mobile single sign-on is like web SSO, except that customers can use a single identity to access connected mobile apps.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 24.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAFCAYAAABFA8wzAAAACXBIWXMAAAsTAAALEwEAmpwYAAABAElEQVQY021Qy04CQRDk773rQU8e8OBBj0YTDmiygPERo0ZC1gWXIC66LMK+YOfRU/bORGOilVSmerpT3anGJOhjUxZwMPiGMU4Tv5LMT79WOn6GHp5Dh11H1jR7shONl/seynRhC0XENNakhtCEKJf4KBQWa8VLCKkEqqEH1duDvD1wZK38ljP0b9pIojEyBRw+zrHlRTgLVqgUIVwKTFKFYBrDnyYIVwL8BTnqsMkumzUdfxuOusfIkzcQF6XQyCqNtSR7ZSEI73zdLBOYF8L2Piu+/PUO+uEIqn/iyFqPL53h4KqFfBn/yfB/cJ51FMEFpLcNeb3v2NmBGpzaiS82snbsHYnkRgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius-mobile-sso\"\n        title=\"Loginradius-mobile-sso\"\n        src=\"/static/4e5451c0e88b2b757f0dd0066d7fd9ff/e5715/mobile-sso-1-1024x247.png\"\n        srcset=\"/static/4e5451c0e88b2b757f0dd0066d7fd9ff/a6d36/mobile-sso-1-1024x247.png 650w,\n/static/4e5451c0e88b2b757f0dd0066d7fd9ff/e5715/mobile-sso-1-1024x247.png 768w,\n/static/4e5451c0e88b2b757f0dd0066d7fd9ff/2bef9/mobile-sso-1-1024x247.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><a href=\"https://www.loginradius.com/docs/single-sign-on/web-and-mobile-sso/loginradius-mobile-sso/\">Mobile SSO enables</a> you to unify a user session across multiple apps that are serviced by a single account LoginRadius. It works by storing the LoginRadius access token in a shared session, either shared Android preferences or iOS keychain, which allows you to recognize a currently active session and access current user data sessions to configure your user account with each linked program.</p>\n<h3 id=\"3-federated-sso\" style=\"position:relative;\"><a href=\"#3-federated-sso\" aria-label=\"3 federated sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Federated SSO</h3>\n<p>Federated single sign-on <a href=\"https://datafloq.com/read/what-is-federated-sso-is-it-different-from-sso/2700\">works a little differently</a> than the web and mobile SSO. Rather than connecting websites or mobile apps, you use the login credentials held by partners. This happens by using industry-standard SSO protocols, which allow customers to gain access to web properties without authentication barriers.</p>\n<p>LoginRadius also acts as an IdP that stores and authenticates the identities used by end-users to log in to customer systems, applications, file servers, and more depending on their configuration.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 95.07692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius-Identity-Provider\"\n        title=\"LoginRadius-Identity-Provider\"\n        src=\"/static/b453710ee2d356c72095abd9879b9d86/e5715/LoginRadius-as-an-Identity-Provider-1024x974.png\"\n        srcset=\"/static/b453710ee2d356c72095abd9879b9d86/a6d36/LoginRadius-as-an-Identity-Provider-1024x974.png 650w,\n/static/b453710ee2d356c72095abd9879b9d86/e5715/LoginRadius-as-an-Identity-Provider-1024x974.png 768w,\n/static/b453710ee2d356c72095abd9879b9d86/2bef9/LoginRadius-as-an-Identity-Provider-1024x974.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius serves as a software provider providing end-user services. LoginRadius does not authenticate users but instead requests third-party Identity Provider authentication. LoginRadius relies on the identity provider to verify a user's identity and, if necessary, to verify other user attributes that the identity provider manages.</p>\n<h4 id=\"saml\" style=\"position:relative;\"><a href=\"#saml\" aria-label=\"saml permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SAML</h4>\n<p>Security Assertion Markup Language (SAML) is an open standard enabling identity providers (IdP) to pass credentials for authorization to service providers. In simple terms, it means that you can log into several different websites using one set of credentials.</p>\n<p><a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/saml/overview/\">LoginRadius supports both SAML 1.1 and SAML 2.0</a> flows to support LoginRadius either as an IDP or as a Service Provider (SP). LoginRadius supports SAML flows, both initiated by IDP and initiated by SP. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 40.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius SAML\"\n        title=\"Loginradius SAML\"\n        src=\"/static/4d5a5dc896b12ea7d4b2fb409e32bfe1/e5715/SAML-1024x418.png\"\n        srcset=\"/static/4d5a5dc896b12ea7d4b2fb409e32bfe1/a6d36/SAML-1024x418.png 650w,\n/static/4d5a5dc896b12ea7d4b2fb409e32bfe1/e5715/SAML-1024x418.png 768w,\n/static/4d5a5dc896b12ea7d4b2fb409e32bfe1/2bef9/SAML-1024x418.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The LoginRadius Admin Console allows the SAML settings to be entirely self-service, allowing you to configure statements, keys, and endpoints to suit any SAML provider.</p>\n<h4 id=\"jwt\" style=\"position:relative;\"><a href=\"#jwt\" aria-label=\"jwt permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>JWT</h4>\n<p>JSON Web Token (JWT) is a commonly used Single Sign-On protocol widely used in B2C applications and included in RFC 7519. This protocol helps you to create an encrypted token that is encoded in JSON. In LoginRadius, this can either be created via API or directly requested through the responses to the Login and Social Login interface.</p>\n<p>This token is then transferred and consumed on to the third-party service provider. The data to be collected can be mapped to the <a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/jwt-login/jwt-login-overview/\">LoginRadius Admin Console</a>. You can also configure the token's encryption method based on the service provider's specifications, which will consume the token.</p>\n<h4 id=\"oauth\" style=\"position:relative;\"><a href=\"#oauth\" aria-label=\"oauth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OAuth</h4>\n<p>OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can securely enable authenticated access to their assets without actually sharing the initial, related, single login credential. This is known as safe, third party, user-agent, delegated authorization in authentication parlance.</p>\n<p>LoginRadius may either function as an OAuth 2.0 Identity Provider or as a Service Provider delegating the authentication process to an IDP supporting the OAuth Project. The specifications for OAuth 2.0 are protected in RFC 6749.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 44.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAJCAYAAAAywQxIAAAACXBIWXMAAAsTAAALEwEAmpwYAAABfklEQVQoz42SzUrDQBSF8zDdWAXR/lupWhXcdOPCdaFPoSjoogsfQlAUCgVBly606hO4EdwIQmtKG9NMMtMmTX+Oc6dG2kLRCx+TO5l75s6Z0RJbOYTT25iLpBHfzCGZP0Aqv49oNoflZAbR1SxikmhaklpDdGcP6cIh4rsFxFbWsZjIILQQQWh+CeHEBrSm8YWaXke19inR8VHVoTcM1BtN0D+zZcFibAwbLZvDsh20LEvB5Bxhmi1otGA6DMOA4zjwPA+dTkfhui7aP9+e56q83+9P1DmcQ6MdLq5KOC6e4uikiLPzS/R6PTDbhu1wBaNumCM34RBCqI1I0Pd9DIdDDAYDNdI6KchwX3lCqXyN8vUNHh6f0e12wbgAa7uwhESO76aAL+epcDwoD+ZseSqNfJmOUQejLgjKg66om2mhCcFG01C+0FECgqJZEYiN8yt4e1dRiRBt1QGJ/yU4K8hv7eX1TZrbBedciSrTpVd0MWS67/f+gT+6SPlivgE4kImvEGDPDAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Loginradius OAuth\"\n        title=\"Loginradius OAuth\"\n        src=\"/static/da792cd3fec7cb4d316a031f72ed4630/e5715/Loginradius-OAuth-1024x452.png\"\n        srcset=\"/static/da792cd3fec7cb4d316a031f72ed4630/a6d36/Loginradius-OAuth-1024x452.png 650w,\n/static/da792cd3fec7cb4d316a031f72ed4630/e5715/Loginradius-OAuth-1024x452.png 768w,\n/static/da792cd3fec7cb4d316a031f72ed4630/2bef9/Loginradius-OAuth-1024x452.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Such specs cover the various specifications and <a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/oauth-2-0/oauth-2-0-overview/\">structured processes OAuth embraces</a>. From the authorization of the service provider requesting authentication to the request for authorization from the end-user to the generation of the access token used to request the scoped data from the IDP after authentication.</p>\n<h4 id=\"openid-connect\" style=\"position:relative;\"><a href=\"#openid-connect\" aria-label=\"openid connect permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OpenID Connect</h4>\n<p>OpenID Connect or (OIDC) is an authentication layer standardized by the OpenID Foundation atop the OAuth 2.0 framework. By following the specifications defined in the OpenID Connect specs, LoginRadius provides a way to integrate your <a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/openid-connect/openid-connect-overview/\">OpenID Connect client with our API</a>. These specs cover the various specifications and structured processes adopted by OpenID Link.</p>\n<h4 id=\"multipass\" style=\"position:relative;\"><a href=\"#multipass\" aria-label=\"multipass permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multipass</h4>\n<p>Multipass is one of the most simple forms of authentication with SSO. <a href=\"https://www.loginradius.com/docs/single-sign-on/federated-sso/multipass/\">Multipass is done</a> through the generation of an authenticated JSON hash of the values to be sent to the service provider.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Deciding the best implementation method really depends on your individual situation, technical architecture, and business needs. \nIf you think a <a href=\"https://www.loginradius.com/single-sign-on/\">readymade SSO solution</a> is best for your company, a customer identity provider like LoginRadius will help you achieve fast and easy implementation.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is an example of SSO?</strong></p>\n<p>When we talk about what is an SSO login, the best example of SSO login is Google’s implementation of SSO in its products. For instance, if you’re logged in to Gmail, you automatically gain access to all other products of Google like YouTube, Google Drive, Google Photos, etc.</p>\n<p><strong>2. What is the difference between single sign-on (SSO) and social login?</strong></p>\n<p>SSO offers <a href=\"https://www.loginradius.com/single-sign-on/\">seamless authentication </a>with one credential across multiple connected platforms or systems. On the other hand, social login allows users to access services by authenticating themselves using their social account credentials.</p>\n<p><strong>3. What are the benefits and business advantages of single sign-on (SSO)?</strong></p>\n<p>Businesses can leverage SSO to deliver a seamless user experience at every touchpoint. Moreover, SSO can help online platforms derive more conversions and growth.</p>\n<p><strong>4. What is the difference between SSO and federation?</strong></p>\n<p>The main difference between Identity <a href=\"https://www.loginradius.com/blog/identity/federated-identity-management-vs-sso/\">Federation and SSO</a> lies in the range of access. SSO allows users to use a single set of credentials to access multiple systems within a single organization (a single domain). On the other hand, Federation lets users access systems across federated organizations.</p>\n<p><strong>5. How can I get SSO for my OTT platform?</strong></p>\n<p>What is sso integration and how can i get it for my OTT platform? SSO integration can be done through a cloud-based CIAM solution like LoginRadius. The cutting-edge CIAM helps OTT platforms to deliver a seamless user experience across multiple touchpoints. <a href=\"https://www.loginradius.com/blog/identity/how-ciam-helps-ott-platforms-scale-million-viewers/\">Read more.</a></p>\n<p><strong>6. What is the Single Sign-On (SSO) protocol?</strong></p>\n<p>SSO protocol enables users to access multiple applications with a single set of login credentials using standards like SAML, OAuth, or OpenID Connect.</p>\n<p><strong>7. What are three benefits of Single Sign-On (SSO)?</strong></p>\n<p>Enhanced security, improved user experience, and increased productivity.</p>\n<p><strong>8. What is the difference between Same Sign-On and Single Sign-On?</strong></p>\n<p>Same Sign-On is not a standard term; Single Sign-On (SSO) allows users to log in once and access multiple applications securely.</p>\n<p><strong>9. What is the purpose of Single Sign-On (SSO)?</strong></p>\n<p>Simplify authentication for users and enhance security by allowing access to multiple applications with one login.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-demo\"\n        title=\"Book-a-demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 30, 2019","updated_date":null,"description":"SSO is an essential feature of an Identity and Access Management (IAM) access control platform. User identity authentication is important when it comes to understanding which permissions a user will have. One example of controlling access that integrates user identity management solutions with SSO solutions is the LoginRadius Identity platform.","title":"What is Single Sign-On (SSO) and How it Works?","tags":["sso","identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/a9ebd13642b2b5d88097a552e6facf0e/33aa5/what-is-sso.jpg","srcSet":"/static/a9ebd13642b2b5d88097a552e6facf0e/f836f/what-is-sso.jpg 200w,\n/static/a9ebd13642b2b5d88097a552e6facf0e/2244e/what-is-sso.jpg 400w,\n/static/a9ebd13642b2b5d88097a552e6facf0e/33aa5/what-is-sso.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":384,"currentPage":65,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}