{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/67","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Everyone knows that sinking feeling when you go to log in and realize you’ve forgotten your password. Maybe you haven’t visited the website…","fields":{"slug":"/identity/infographic-the-death-of-passwords/"},"html":"<p>Everyone knows that sinking feeling when you go to log in and realize you’ve forgotten your password.</p>\n<p>Maybe you haven’t visited the website in ages. Or you just changed the password but didn’t record it in your password manager. Or you have five variations for that password and you can’t remember which one you used.</p>\n<p>Passwords are there to make it safe for customers to use their accounts. But often passwords aren’t enough. And when passwords get in the way of customers using their accounts at all, something’s wrong.</p>\n<p><a href=\"https://www.loginradius.com/resource/passwords-are-dead/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"passwords are dead whitepaper\"\n        title=\"passwords are dead whitepaper\"\n        src=\"/static/d4ca18e17738b66575b5f83a8606a96b/e5715/WP-Passwords-are-Dead-1024x310.png\"\n        srcset=\"/static/d4ca18e17738b66575b5f83a8606a96b/a6d36/WP-Passwords-are-Dead-1024x310.png 650w,\n/static/d4ca18e17738b66575b5f83a8606a96b/e5715/WP-Passwords-are-Dead-1024x310.png 768w,\n/static/d4ca18e17738b66575b5f83a8606a96b/2bef9/WP-Passwords-are-Dead-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Forward-thinking companies are hurrying along the death of passwords by adopting login features that are more secure than passwords and easier to use. LoginRadius a <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) platform provides a secure login solution:</p>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication</a> makes doubly sure of a customer’s identity by asking for a second confirmation (such as a one-time passcode) on top of login credentials.</li>\n<li><a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">Passwordless authentication</a> does away with the password altogether in favor of a one-time passcode or magic link.</li>\n<li>Risk-based authentication lets you capture your customer’s login profile and ask for extra confirmation when their device or location changes.</li>\n</ul>\n<p>We’ve put together a few alarming and entertaining facts on the current state of passwords. Customers aren’t going to get any better about using passwords safely, so it’s up to businesses to make those pesky strings of characters obsolete once and for all.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 525.0769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"The Death of Passwords 1\"\n        title=\"The Death of Passwords 1\"\n        src=\"/static/334be19b2b93f58126be020f891e4b97/212bf/The-Death-of-Passwords-1.jpg\"\n        srcset=\"/static/334be19b2b93f58126be020f891e4b97/6aca1/The-Death-of-Passwords-1.jpg 650w,\n/static/334be19b2b93f58126be020f891e4b97/212bf/The-Death-of-Passwords-1.jpg 768w,\n/static/334be19b2b93f58126be020f891e4b97/ad53c/The-Death-of-Passwords-1.jpg 1241w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Curious about learning more about these alternative authentication methods?</p>\n<p>We further dig into the problems businesses face with existing username/password authentication methods. We will then review the new authentication methods that are becoming popular in the marketplace and how in the near future they might very well replace passwords.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-demo-loginradius\"\n        title=\"Book-a-demo-loginradius\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/Book-a-demo-1024x310.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/Book-a-demo-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 19, 2018","updated_date":null,"description":"Are usernames and passwords really the best way to protect your customers? Check out this infographic and learn about the new technologies and authentication methods that are replacing passwords.","title":"The Death of Passwords [Infographic]","tags":["passwordless authentication","ciam solutions","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/daffd7818e5f030c4a71c46ac79bc510/0756a/death-of-passwords.png","srcSet":"/static/daffd7818e5f030c4a71c46ac79bc510/69585/death-of-passwords.png 200w,\n/static/daffd7818e5f030c4a71c46ac79bc510/497c6/death-of-passwords.png 400w,\n/static/daffd7818e5f030c4a71c46ac79bc510/0756a/death-of-passwords.png 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Many security-minded businesses use multi-factor authentication to verify customers’ identities. The most familiar method is to send…","fields":{"slug":"/identity/use-multi-factor-authentication-dont-cell-phone-access/"},"html":"<p>Many security-minded businesses use multi-factor authentication to verify <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management\">customers’ identities</a>. The most familiar method is to send customers a code by SMS text message, which the customer then enters on the website or app.</p>\n<p>But what if you are traveling and don’t have cell phone service? You have a few other options for authenticating yourself. Just make sure to set them up before you travel!</p>\n<h2 id=\"why-use-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#why-use-multi-factor-authentication\" aria-label=\"why use multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Use Multi-Factor Authentication?</h2>\n<p>These days a simple password isn’t always enough to make sure that someone is who they say they are. There are so many ways that passwords can be leaked or stolen:</p>\n<ul>\n<li><strong>Malicious software</strong> such as screen grabbers and keyloggers</li>\n<li><strong>Phishing</strong>, where an illegitimate email directs customers to log in to their account using a genuine-looking but false website</li>\n<li><strong>Shoulder surfing</strong>, either in person or using CCTV</li>\n<li><strong>Social engineering</strong>, where hackers call up tech support lines and reset a customer’s password, possibly using stolen personal information</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication</a> (MFA) makes it harder for hackers to get into customer accounts with a password alone. It protects companies and customers from <a href=\"https://www.loginradius.com/blog/2020/04/marriott-data-breach-2020/\">security breaches</a> by requiring that customers also have physical possession of a verified device, such as a phone or security fob.</p>\n<h2 id=\"the-problem-with-mfa-when-traveling\" style=\"position:relative;\"><a href=\"#the-problem-with-mfa-when-traveling\" aria-label=\"the problem with mfa when traveling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Problem with MFA When Traveling</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image 1\"\n        title=\"image 1\"\n        src=\"/static/ecd43d140c673259f2546d229979db32/212bf/image-1.jpg\"\n        srcset=\"/static/ecd43d140c673259f2546d229979db32/6aca1/image-1.jpg 650w,\n/static/ecd43d140c673259f2546d229979db32/212bf/image-1.jpg 768w,\n/static/ecd43d140c673259f2546d229979db32/64175/image-1.jpg 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>MFA typically uses a code sent via SMS text message as the second verification factor.</p>\n<p>But SMS texts can be problematic if you’re traveling and don’t have mobile phone service outside your city or country. Logging in from unfamiliar devices, locations, and networks can also trigger risk-based authentication, which requires extra verification when you deviate from your typical login profile.</p>\n<p>You could find yourself locked out of vital services and apps at a critical moment, and without your normal phone service, account recovery options may not work either. Not fun.</p>\n<h2 id=\"options-for-mfa-when-you-dont-have-mobile-service\" style=\"position:relative;\"><a href=\"#options-for-mfa-when-you-dont-have-mobile-service\" aria-label=\"options for mfa when you dont have mobile service permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Options for MFA When You Don’t Have Mobile Service</h2>\n<p>Thankfully, there are some great options for alternative second factors that don’t depend on cell phone service. You may even find that they’re more convenient to use at home too.</p>\n<p>For maximum peace of mind, you could set up more than one of these factors to make sure you can log in even if another factor fails or is unavailable. Also make sure that all of your recovery information, such as phone numbers and email addresses, is up to date.</p>\n<h3 id=\"using-an-authenticator-app-for-mfa\" style=\"position:relative;\"><a href=\"#using-an-authenticator-app-for-mfa\" aria-label=\"using an authenticator app for mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Using an authenticator app for MFA</h3>\n<p>An authenticator app runs on your smartphone or tablet, and you don’t need internet access or cell phone service to use it for MFA. You do need internet to set it up, though.</p>\n<p>Both Google and Microsoft offer Android and iOS authenticator apps as part of their MFA ecosystem.</p>\n<p>LoginRadius offers a white-labeled version of Google Authenticator for <a href=\"https://www.loginradius.com/multi-factor-authentication/\">multi-factor authentication</a> to companies that use our customer identity platform.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"multi factor authentication guide loginradius\"\n        title=\"multi factor authentication guide loginradius\"\n        src=\"/static/4e78e2265f68071219ae6811eafb52ec/e5715/EB-Buyer%E2%80%99s-Guide-to-Multi-Factor-Authentication-1024x310.png\"\n        srcset=\"/static/4e78e2265f68071219ae6811eafb52ec/a6d36/EB-Buyer%E2%80%99s-Guide-to-Multi-Factor-Authentication-1024x310.png 650w,\n/static/4e78e2265f68071219ae6811eafb52ec/e5715/EB-Buyer%E2%80%99s-Guide-to-Multi-Factor-Authentication-1024x310.png 768w,\n/static/4e78e2265f68071219ae6811eafb52ec/2bef9/EB-Buyer%E2%80%99s-Guide-to-Multi-Factor-Authentication-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h4 id=\"setting-up-google-authenticator\" style=\"position:relative;\"><a href=\"#setting-up-google-authenticator\" aria-label=\"setting up google authenticator permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Setting up Google Authenticator</h4>\n<p><a href=\"https://www.google.ca/landing/2step/\">Google Authenticator</a> works for MFA wherever you sign into your Google account.</p>\n<p><strong>To set up an authenticator app in Google</strong></p>\n<ol>\n<li>Open your email account on your computer.</li>\n<li>On the top right of your screen, click your avatar, and then click <strong>Google Account</strong>. A new browser tab opens.</li>\n<li>Click <strong>Sign-in &#x26; security</strong>.</li>\n<li>Scroll down and click <strong>2-Step Verification</strong>. Enter your password and click <strong>Next</strong>. Scroll down and, under <strong>Authenticator app</strong>, click <strong>Set Up</strong>.</li>\n<li>Select <strong>Android</strong> or <strong>iPhone</strong>, depending on what kind of phone you have. Then click <strong>Next</strong>. A QR code is displayed.</li>\n</ol>\n<p><strong>To set up an authenticator app on your phone</strong></p>\n<ol>\n<li>On your phone, go to the Play Store or App Store and install Google Authenticator.</li>\n<li>Open the Google Authenticator on your phone and tap the plus button. On Android, you may need to tap the line at the bottom of the screen.</li>\n<li>Tap <strong>Scan barcode</strong>.</li>\n<li>Authorize the app to use your phone camera, so it can scan the QR code.</li>\n<li>Point your camera to the QR Code shown on the screen of your computer. After you scan the QR code, a 6-digit code appears on your phone. A new code is given every few seconds.</li>\n</ol>\n<p><strong>To finish setting up an authenticator app in Google</strong></p>\n<ol>\n<li>On your computer, click <strong>Next</strong>, and then enter the code you generated on your phone.</li>\n<li>After typing the code, click <strong>Verify</strong>.</li>\n<li>A success message displays on your computer.</li>\n</ol>\n<p>Google Authenticator is now your default second-step verification method.</p>\n<h4 id=\"setting-up-microsoft-authenticator\" style=\"position:relative;\"><a href=\"#setting-up-microsoft-authenticator\" aria-label=\"setting up microsoft authenticator permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Setting up Microsoft Authenticator</h4>\n<p>With Microsoft you’ll need to follow slightly different procedures depending on whether you or your organization is an Office 365 customer.</p>\n<p>Office 365 users need their administrators to <a href=\"https://docs.microsoft.com/en-us/office365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide\">enable MFA</a> (there’s a free version of Azure MFA available to subscribers).</p>\n<p>If you just want to use MFA for your personal Microsoft account, you’ll need to set everything up yourself. Just go to <strong>Security Basics</strong> in your account, select <strong>More security options,</strong> and follow the prompts.</p>\n<p>Regardless of which method you use to set up Microsoft 2-factor authentication, you’ll then be able to sign in to your account using the Microsoft Authenticator app. Office 365 users need to go into their <a href=\"https://support.office.com/en-gb/article/use-microsoft-authenticator-with-office-365-1412611f-ad8d-43ab-807c-7965e5155411\">Office 365 account online</a> to do this, and personal account users follow a slightly different set of <a href=\"https://support.microsoft.com/en-gb/help/4026727\">instructions</a>.</p>\n<h3 id=\"using-google-phone-prompt\" style=\"position:relative;\"><a href=\"#using-google-phone-prompt\" aria-label=\"using google phone prompt permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Using Google Phone Prompt</h3>\n<p>If you have a compatible Android, iPhone, or iPad (and your needs fall within Google’s digital ecosystem), Google phone prompt is one of the easiest MFA methods to use.</p>\n<p>Once you’ve enabled 2-factor authentication, follow the instructions for setting up <a href=\"https://support.google.com/accounts/answer/7026266?co=GENIE.Platform%3DiOS&#x26;oco=0\">phone prompts</a>. You’ll then receive a prompt on your mobile device to confirm login when needed, with no separate app required.</p>\n<p>Often Google phone prompt involves putting a two-digit number into either your smart device or your browser when you sign in from a new location. In some cases, though, you may be authenticating yourself with the same device you’re logging in on. So the device also needs to be locked after use to stay secure.</p>\n<h3 id=\"using-a-security-key-or-fob\" style=\"position:relative;\"><a href=\"#using-a-security-key-or-fob\" aria-label=\"using a security key or fob permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Using a Security Key or Fob</h3>\n<p>You have several options for dedicated MFA devices as an alternative to your phone or tablet. </p>\n<p>With Google, you can buy a separate <a href=\"https://support.google.com/accounts/answer/6103523\">security key</a> to help you log in to Google. Like most key-based solutions, you’ll need to get a key that’s compatible with FIDO Universal 2nd Factor (U2F), and that can plug into the USB ports on any devices you may want to use it with. (Watch out for devices that only have USB-C unless you have a suitable connector!)</p>\n<p>If you or your business is at particular risk of online attacks, you’ll need to use a security key and sign up for Google’s <a href=\"https://landing.google.com/advancedprotection/\">Advanced Protection</a> scheme. This service is aimed at journalists, activists, and business leaders who are at high risk of attack, and it’s free. You’ll need at least two compatible keys to register for the service, though.</p>\n<p>There are also a number of third-party authenticator apps out there, from companies like LastPass, Authy, and YubiKey. Some of these require a separate dongle, and because they aren’t the owner of the services they unlock, recovery policies following a lost key or password can vary. (This means that sometimes you will have to go through the full recovery process for each account you’ve secured using a third-party provider.)</p>\n<h2 id=\"balancing-security-and-convenience-with-mfa\" style=\"position:relative;\"><a href=\"#balancing-security-and-convenience-with-mfa\" aria-label=\"balancing security and convenience with mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Balancing Security and Convenience with MFA</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"chad madden 445638 unsplash 1024x683\"\n        title=\"Multi-Factor Authentication\"\n        src=\"/static/ef7a1b5fc7bd2fd08c473a73fe2d5634/212bf/chad-madden-445638-unsplash-1024x683.jpg\"\n        srcset=\"/static/ef7a1b5fc7bd2fd08c473a73fe2d5634/6aca1/chad-madden-445638-unsplash-1024x683.jpg 650w,\n/static/ef7a1b5fc7bd2fd08c473a73fe2d5634/212bf/chad-madden-445638-unsplash-1024x683.jpg 768w,\n/static/ef7a1b5fc7bd2fd08c473a73fe2d5634/72e01/chad-madden-445638-unsplash-1024x683.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>B2C companies that offer MFA for an extra level of security still have their eye on providing a convenient customer experience.</p>\n<p>Travel can make <a href=\"https://www.loginradius.com/integrations/sms-gateway\">SMS-based MFA solutions</a> unreliable, but with the right solution and a little preparation, companies can make it easier for customers to securely log in anywhere.</p>\n<p>Providing travelers with easy-to-use MFA solutions doesn’t just keep your data and their data secure. It improves their digital experience and encourages them not to side-step essential security measures when traveling in potentially risky situations.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 19, 2018","updated_date":null,"description":"To verify the identity of clients, many security-minded organisations use multi-factor authentication. The most popular approach is to send a code via SMS text message to customers, which the customer then enters on the website or app. But what if you drive and have no mobile phone service? For authenticating yourself, you have a few other choices. Before you fly, just make sure to set them up!","title":"How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access","tags":["mfa","data security","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/69d05eab0d5290af87e0a1d6bd966b45/33aa5/use-mfa.jpg","srcSet":"/static/69d05eab0d5290af87e0a1d6bd966b45/f836f/use-mfa.jpg 200w,\n/static/69d05eab0d5290af87e0a1d6bd966b45/2244e/use-mfa.jpg 400w,\n/static/69d05eab0d5290af87e0a1d6bd966b45/33aa5/use-mfa.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"I’m looking forward to my first ocean cruise … someday. Living in Vancouver, I can see the enormous ships docked at Canada Place or heading…","fields":{"slug":"/identity/customer-identity-infrastructure-cruise-line-passengers-dont-see/"},"html":"<p>I’m looking forward to my first ocean cruise … someday. Living in Vancouver, I can see the enormous ships docked at Canada Place or heading out to sea across English Bay.</p>\n<p>I’ve always been more of an adventure traveler, making my own itinerary, researching out-of-the-way spots. The logistics were part of the fun.</p>\n<p>I fantasize about spending a week in one place without having to make any arrangements, ask for directions, or even take out my credit card. (If indie rock star Jonathan Coulton and his 1,848 closest friends are there playing tabletop games, so much the better.)</p>\n<p>Cruise lines are well-known for their innovation in creating enormous ships and fun stuff to do on them. Some of the big players are also doing interesting things around <a href=\"https://www.loginradius.com/resource/customer-identity-your-cruise-brands-next-big-innovation/\">customer experience</a>, both digital and onboard.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"leonardo yip 551140 unsplash 1024x683\"\n        title=\"leonardo yip 551140 unsplash 1024x683\"\n        src=\"/static/d155179808f921a3e7c17c94ca7ae049/212bf/leonardo-yip-551140-unsplash-1024x683.jpg\"\n        srcset=\"/static/d155179808f921a3e7c17c94ca7ae049/6aca1/leonardo-yip-551140-unsplash-1024x683.jpg 650w,\n/static/d155179808f921a3e7c17c94ca7ae049/212bf/leonardo-yip-551140-unsplash-1024x683.jpg 768w,\n/static/d155179808f921a3e7c17c94ca7ae049/72e01/leonardo-yip-551140-unsplash-1024x683.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>MSC Meraviglia and Royal Caribbean are simplifying embarkation so you don’t have to stand in line. Instead, you can upload all your travel documents and download boarding information ahead of time with online check-in (<a href=\"https://www.telegraph.co.uk/travel/cruises/articles/cruise-ship-technology-innovation/\">Telegraph</a>).</p>\n<p>Onboard, cruise brands are using technology to provide better service than you would get from humans alone. The Ocean Medallion from Carnival carries your guest ID, which connects to your encrypted customer profile in the cloud. You can wear it as a pendant or bracelet—Bluetooth Low Energy and NFC mean no swiping required. The Ocean Medallion automatically unlocks your cabin door as you approach, pays for drinks and merch, and locates your travel companions. Fifteen fewer things to worry about? Sign me up!</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Ocean Medallion Pendant 1\"\n        title=\"Ocean Medallion Pendant 1\"\n        src=\"/static/167782bb58571e5bdc647ad350b2ae11/212bf/Ocean-Medallion-Pendant-1.jpg\"\n        srcset=\"/static/167782bb58571e5bdc647ad350b2ae11/6aca1/Ocean-Medallion-Pendant-1.jpg 650w,\n/static/167782bb58571e5bdc647ad350b2ae11/212bf/Ocean-Medallion-Pendant-1.jpg 768w,\n/static/167782bb58571e5bdc647ad350b2ae11/4b190/Ocean-Medallion-Pendant-1.jpg 800w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The Ocean Medallion also connects with the Ocean Compass, which acts like a digital concierge delivered on devices all over the ship. So the interactive screens and even the staff people learn your favourite drink and whether you prefer Broadway shows or dance lessons (<a href=\"https://www.wired.com/2017/01/carnival-ocean-medallion-wearable/\">Wired</a>).</p>\n<p>Innovations like these are certainly attention-getting. But what travelers like me don’t see is the infrastructure that makes them possible: a customer identity solution.</p>\n<p><strong>Online check-in, smart wearables, and interactive screens all depend on a secure and centralized location for <a href=\"https://www.loginradius.com/customer-profiling/\">customer profile data</a>.</strong></p>\n<p><a href=\"https://www.loginradius.com/resource/customer-identity-your-cruise-brands-next-big-innovation/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cruise-brand\"\n        title=\"cruise-brand\"\n        src=\"/static/a51c93d84991bfbee6337672ed6ee39c/e5715/cruise-brand.png\"\n        srcset=\"/static/a51c93d84991bfbee6337672ed6ee39c/a6d36/cruise-brand.png 650w,\n/static/a51c93d84991bfbee6337672ed6ee39c/e5715/cruise-brand.png 768w,\n/static/a51c93d84991bfbee6337672ed6ee39c/63ff0/cruise-brand.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>And finally, we explain how a customer identity and access management (CIAM) platform meets those challenges and makes customer experience innovations possible.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-free-demo-request\"\n        title=\"Book-a-free-demo-request\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 11, 2018","updated_date":null,"description":"In building enormous ships and fun activities to do on them, cruise lines are well-known for their creativity. Some of the major players, both interactive and onboard, are also doing fascinating stuff around customer service.","title":"The Customer Identity Infrastructure that Cruise Line Passengers Don’t See","tags":["travel-and-hospitality"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/65b53a0eafb2830e255d4a04cf91bdfa/14b42/peter-hansen-455710-unsplash-2.jpg","srcSet":"/static/65b53a0eafb2830e255d4a04cf91bdfa/f836f/peter-hansen-455710-unsplash-2.jpg 200w,\n/static/65b53a0eafb2830e255d4a04cf91bdfa/2244e/peter-hansen-455710-unsplash-2.jpg 400w,\n/static/65b53a0eafb2830e255d4a04cf91bdfa/14b42/peter-hansen-455710-unsplash-2.jpg 800w,\n/static/65b53a0eafb2830e255d4a04cf91bdfa/47498/peter-hansen-455710-unsplash-2.jpg 1200w,\n/static/65b53a0eafb2830e255d4a04cf91bdfa/37d86/peter-hansen-455710-unsplash-2.jpg 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"How to Meet Customer Needs and Grow Revenue with Customer Identity Management Is Your Enterprise Ready for a Digital Transformation…","fields":{"slug":"/identity/enterprise-needs-digital-business-transformation-strategy/"},"html":"<h2 id=\"how-to-meet-customer-needs-and-grow-revenue-with-customer-identity-management\" style=\"position:relative;\"><a href=\"#how-to-meet-customer-needs-and-grow-revenue-with-customer-identity-management\" aria-label=\"how to meet customer needs and grow revenue with customer identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Meet Customer Needs and Grow Revenue with Customer Identity Management</h2>\n<h3 id=\"is-your-enterprise-ready-for-a-digital-transformation\" style=\"position:relative;\"><a href=\"#is-your-enterprise-ready-for-a-digital-transformation\" aria-label=\"is your enterprise ready for a digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Is Your Enterprise Ready for a Digital Transformation?</h3>\n<p>Enterprise CIOs and VPs of technology face growing demands to scale their digital platforms. Gartner estimates that 2020 is the sink-or-swim year for mid- and large-sized enterprises—organizations with more than $250 million in annual revenue—to modernize their digital infrastructure.</p>\n<p>Scaling digital platforms can be a daunting task. It involves large-scale efforts to accommodate growing demands in online customer experience, data personalization, and a centralized identity infrastructure for your users. What’s more, these initiatives often rely on comprehensive upheavals to business and operating models.</p>\n<p>By 2020, businesses will have to develop new digital experiences and unique online services just to stay competitive, let alone to get ahead. Top companies across media, telecommunications, and financial industries feel pressure to increase market share and deliver more value to their customers. Executives know they can’t fall too far behind.</p>\n<h4 id=\"digital-capabilities-are-lagging\" style=\"position:relative;\"><a href=\"#digital-capabilities-are-lagging\" aria-label=\"digital capabilities are lagging permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital capabilities are lagging</h4>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 63.230769230769226%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"rawpixel 570911 unsplash e1543257473342\"\n        title=\"rawpixel 570911 unsplash e1543257473342\"\n        src=\"/static/76870718b11e38a035ec095501040dc4/212bf/rawpixel-570911-unsplash-e1543257473342.jpg\"\n        srcset=\"/static/76870718b11e38a035ec095501040dc4/6aca1/rawpixel-570911-unsplash-e1543257473342.jpg 650w,\n/static/76870718b11e38a035ec095501040dc4/212bf/rawpixel-570911-unsplash-e1543257473342.jpg 768w,\n/static/76870718b11e38a035ec095501040dc4/4d663/rawpixel-570911-unsplash-e1543257473342.jpg 3312w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Additional Gartner data highlights the challenges that come with this changing landscape. Over half of all enterprises surveyed have less than expert-level capabilities for implementing or updating critical digital platforms, such as managing data systems for analytics and modernizing technology ecosystems to better serve users.</p>\n<p>Only about 34% of digital technologies are adequately optimized for enterprise businesses in all industries, but enterprise CEOs have identified, on average, a need to drive 11% of growth exclusively from “digital revenue.”</p>\n<h4 id=\"even-digital-optimization-isnt-enough\" style=\"position:relative;\"><a href=\"#even-digital-optimization-isnt-enough\" aria-label=\"even digital optimization isnt enough permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Even digital optimization isn’t enough</h4>\n<p>Tackling this gap requires more than digital optimization. A full business transformation to create new digital services and business models are crucial, especially for customer retention.</p>\n<p>Imagine an online portal and an accompanying mobile app where customers have to log in at each new touchpoint, struggling to remember their passwords. Their customer journey is disjointed and impersonal. Many studies show that not only will customer engagement decrease but churn rates will gradually increase as well.</p>\n<h2 id=\"customer-identity-management-to-drive-revenue-growth\" style=\"position:relative;\"><a href=\"#customer-identity-management-to-drive-revenue-growth\" aria-label=\"customer identity management to drive revenue growth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customer Identity Management to Drive Revenue Growth</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 51.38461538461539%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"damian zaleski 843 unsplash\"\n        title=\"damian zaleski 843 unsplash\"\n        src=\"/static/de35f284f1c4b9747891371a266a0155/212bf/damian-zaleski-843-unsplash.jpg\"\n        srcset=\"/static/de35f284f1c4b9747891371a266a0155/6aca1/damian-zaleski-843-unsplash.jpg 650w,\n/static/de35f284f1c4b9747891371a266a0155/212bf/damian-zaleski-843-unsplash.jpg 768w,\n/static/de35f284f1c4b9747891371a266a0155/1d892/damian-zaleski-843-unsplash.jpg 3588w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>So how can you make sure that your organization stays ahead of the curve with a business digital transformation when faced with resource challenges and competitor pressure?</p>\n<p><strong>1. Go beyond optimization to enterprise-level digital transformation.</strong></p>\n<p>By 2022, just two years after Gartner’s sink-or-swim date, digital platform adoption will create new market leaders in roughly half of all industries.</p>\n<p>Success in the face of such drastic, impending shifts hinges on the foresight of CIOs and tech VPs to build new revenue opportunities for their organizations. <strong>Simply enhancing previous technologies to improve productivity and customer experience will only safeguard bottom lines.</strong> A fully proactive solution also involves creating new revenue streams and transforming business model in the digital era.</p>\n<p><strong>2. Adopt low-risk third-party platforms.</strong></p>\n<p>With third-party platforms, you can optimize resource efficiency and set yourself up for highly customizable solutions that can be applicable for new business-development opportunities across your digital brand. A flexible, cloud-based solution can offer out-of-the-box third-party integrations to meet user demands and build <a href=\"https://www.loginradius.com/blog/growth/unified-identity-ensures-great-customer-interactions/\">unified customer profiles</a>.</p>\n<p>By investing in a cloud-based customer identity platform, for example, you can lay the foundation for a transformative digital business solution to simplify your operations while enabling scalability across markets and customer channels.</p>\n<p><strong>3. Identify what’s important to bring clarity to the task at hand.</strong></p>\n<p>Studies show that a digital identity strategy that enhances the registration experience, authenticates customers, and personalizes the user journey improves the bottom line, streamlines business processes, and ultimately delivers value.</p>\n<p>Specifically, roughly 80% of customers express frustration when their identity and data are lost when switching between channels. Almost as many will not do business with companies whose digital platforms aren’t tailored uniquely for them. Those statistics have nearly doubled in a few short years thanks to popular brands like Amazon, Netflix, Starbucks, and Uber. These providers continually improve their technologies to augment the digital experience for their customers and raise the “expectations game” across the board.</p>\n<p>Focusing on a digital identity strategy will secure and enhance your online services at a broad level. By disrupting your technology landscape to rethink how your organization responds to trends like digital identity convergence, big data and analytics, and “device identity,” you can setup your enterprise business for success in the future.</p>\n<p>But what does this kind of digital identity strategy look like?</p>\n<h4 id=\"identity-convergence-responding-to-the-new-diverse-customer\" style=\"position:relative;\"><a href=\"#identity-convergence-responding-to-the-new-diverse-customer\" aria-label=\"identity convergence responding to the new diverse customer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity convergence: responding to the new, diverse customer</h4>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"daniel gzz 105307 unsplash\"\n        title=\"daniel gzz 105307 unsplash\"\n        src=\"/static/dff7e95d5e900a564764f76f8b78233d/212bf/daniel-gzz-105307-unsplash.jpg\"\n        srcset=\"/static/dff7e95d5e900a564764f76f8b78233d/6aca1/daniel-gzz-105307-unsplash.jpg 650w,\n/static/dff7e95d5e900a564764f76f8b78233d/212bf/daniel-gzz-105307-unsplash.jpg 768w,\n/static/dff7e95d5e900a564764f76f8b78233d/1c449/daniel-gzz-105307-unsplash.jpg 6211w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>In today’s globalized world, your customers are no longer <em>merely</em> customers when they access your digital services. Instead, they converge from multiple persona types:</p>\n<ul>\n<li>An online user of a direct revenue service</li>\n<li>An evangelizing content creator</li>\n<li>A consumer of community information and marketing collateral</li>\n</ul>\n<p>In the past, standalone, online-based revenue streams and information databases could coexist with little need for overlap, let alone integration. However, in today’s burgeoning digital-business ecosystem, you need a management tool for customer identity that recognizes multiple personas and links them to the same online identity.</p>\n<h4 id=\"leverage-data-and-analytics-to-serve-your-users-better\" style=\"position:relative;\"><a href=\"#leverage-data-and-analytics-to-serve-your-users-better\" aria-label=\"leverage data and analytics to serve your users better permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Leverage data and analytics to serve your users better</h4>\n<p>As more operational models among enterprise businesses encounter digital identities and the proliferating number of third-party platforms that host and support them, data and analytics needs become more complex. Companies must increasingly consider how they will:</p>\n<ul>\n<li>manage swaths of data</li>\n<li>connect it across their entire digital landscape</li>\n<li>leverage this information for customer success</li>\n</ul>\n<p>A central, cloud-based solution to handle all of your customer identity needs can help consolidate the digital identities of your users, removing data silos throughout your whole digital ecosystem.</p>\n<h4 id=\"device-identity-growing-when-the-internet-is-everywhere\" style=\"position:relative;\"><a href=\"#device-identity-growing-when-the-internet-is-everywhere\" aria-label=\"device identity growing when the internet is everywhere permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“Device identity”: growing when the internet is everywhere</h4>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"bence boros 573486 unsplash\"\n        title=\"bence boros 573486 unsplash\"\n        src=\"/static/a94a3211a660aeee6d9361626f26e4af/212bf/bence-boros-573486-unsplash.jpg\"\n        srcset=\"/static/a94a3211a660aeee6d9361626f26e4af/6aca1/bence-boros-573486-unsplash.jpg 650w,\n/static/a94a3211a660aeee6d9361626f26e4af/212bf/bence-boros-573486-unsplash.jpg 768w,\n/static/a94a3211a660aeee6d9361626f26e4af/c94d3/bence-boros-573486-unsplash.jpg 6720w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>With the emergence of the internet of things and myriad mobile devices on the market, taking advantage of identity-based opportunities around all of the devices and electronic items can make the difference in leading the pack among your competitors or constantly having to play catch-up.</p>\n<ul>\n<li>Users today might expect a simplified online registration when buying products across web browsers, phones, smartwatches, or their Amazon Echo or Google Home.</li>\n<li>Exercise junkies might expect their fitness devices to sign them in to their account at their local gym’s computer terminal or sync with their online account from home.</li>\n<li>Citizens might expect to be able to conveniently switch between their phone and their tablet when logging in to a city government’s online platform. They want to book an outdoor event and pay their property taxes, all with a single sign-on (SSO).</li>\n</ul>\n<p>Whatever the device and the customer’s need, your organization has to prepare for these expectations as they relate to a plethora of digital devices, now and into the future, if growth and sustainability are part of your enterprise’s long-term roadmap.</p>\n<h2 id=\"customer-identity-and-access-management-ciam\" style=\"position:relative;\"><a href=\"#customer-identity-and-access-management-ciam\" aria-label=\"customer identity and access management ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customer Identity and Access Management (CIAM)</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.92307692307692%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"heidi sandstrom 173946 unsplash\"\n        title=\"heidi sandstrom 173946 unsplash\"\n        src=\"/static/e194047250d0ce76824ca34e6e51fb3c/212bf/heidi-sandstrom-173946-unsplash.jpg\"\n        srcset=\"/static/e194047250d0ce76824ca34e6e51fb3c/6aca1/heidi-sandstrom-173946-unsplash.jpg 650w,\n/static/e194047250d0ce76824ca34e6e51fb3c/212bf/heidi-sandstrom-173946-unsplash.jpg 768w,\n/static/e194047250d0ce76824ca34e6e51fb3c/1db1a/heidi-sandstrom-173946-unsplash.jpg 5313w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Planning for Gartner’s 2020 threshold for digital transformation need not be a daunting task after all. A <a href=\"https://www.loginradius.com/customer-identity-management-b2c-ciam/\">B2C CIAM solution</a> for your company is an example of a cloud-based, holistic solution to store, manage, and secure all of your customer data and identities.</p>\n<p>A customer identity solution provides several benefits ranging from personalized user journeys and seamless SSO capabilities, serving as a strong starting point for a digital transformation strategy.</p>\n<p><strong>Look for a strong, enterprise-grade solution</strong> that offers secure data storage, data encryption, and superior uptime capabilities to easily access and maintain customer information. You’ll be able to protect your customers’ identity and ensure that your services always function reliably so you can scale your organization and stay ahead of market trends.</p>\n<p>With the right CIAM platform, for example, you can track your customer’s entire digital journey and integrate the data with marketing automation tools to cultivate your marketing and upselling campaigns directly within your own platforms. Plus, offering a coherent omnichannel experience via SSO means your customers can browse your digital service, shop online, interact with mobile-first content, and ask support questions on social media, all without having to re-authenticate themselves each time. Seizing on these benefits, you can eliminate data silos and create a single online identity for each one of your customers.</p>\n<p>If you’re interested in learning how a cloud-based CIAM solution can help your enterprise transform your digital infrastructure, download <a href=\"https://www.loginradius.com/resource/4-key-entry-points-to-a-digital-transformation/\">4 Key Entry Points to a Digital Transformation</a>. This e-book features case studies for each specific entry point to help you understand how a best-of-breed identity platform could provide value to you.</p>\n<p><a href=\"https://www.loginradius.com/resource/4-key-entry-points-to-a-digital-transformation/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABXklEQVQY001Ry0rDQBTNx/kHIoi4ki5E3HQh4sZvcOdCwSdikaKIPyBYhNaGUsRSrLRS05Imk/dMkknq8c4UioEDd27mnHvOHSNOEnAhkGYZMkJRFojCCL49w+98DikL5FIu/ucZIp7CCgQsx8PYmsD1fM3jaap1DCW4AIdIiUTkme0iYS5KmS8FFYTgmPkh2j8Bul9jmN13DIbfxBNIuOKnMJRqGMeY2A5YEFKdwPMDcBqQUO0wcpBLMMbw0mjANE2035potZrodDoaqv85GNC9HIZSXkamhoIsCu3WD2OaLFCWpb7DPA/D0UiT+/0+Pno9XVsTC2EU/YtMogE1lGVVR9RTTqeOSzsK9DD1HZ1cYWWtgq3qITZ29rG5e4DVShXr23tglEo7dJhHTkKKG+gFW/QYHkX36WHGU5vOjh4kaYfPry0cX9RwefeIs9t7nNcecHpTx3X9SRtSg/8A3ju21Z+TXbcAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"4 key entry points to digital transformation 1024x310\"\n        title=\"4 key entry points to digital transformation 1024x310\"\n        src=\"/static/e829315531960664415770777a0b5e95/e5715/4-key-entry-points-to-digital-transformation-1024x310.png\"\n        srcset=\"/static/e829315531960664415770777a0b5e95/a6d36/4-key-entry-points-to-digital-transformation-1024x310.png 650w,\n/static/e829315531960664415770777a0b5e95/e5715/4-key-entry-points-to-digital-transformation-1024x310.png 768w,\n/static/e829315531960664415770777a0b5e95/2bef9/4-key-entry-points-to-digital-transformation-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 26, 2018","updated_date":null,"description":"Companies will need to build innovative digital experiences and exclusive online services by 2020 just to remain competitive, let alone to get ahead. Top businesses in the media, telecommunications, and financial sectors are under pressure to grow market share and provide their consumers with more value.","title":"Why Your Enterprise Needs a Digital Business Transformation Strategy","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/c09dbcb0bbc5d806dce830f668bde559/14b42/rawpixel-579231-unsplash-1.jpg","srcSet":"/static/c09dbcb0bbc5d806dce830f668bde559/f836f/rawpixel-579231-unsplash-1.jpg 200w,\n/static/c09dbcb0bbc5d806dce830f668bde559/2244e/rawpixel-579231-unsplash-1.jpg 400w,\n/static/c09dbcb0bbc5d806dce830f668bde559/14b42/rawpixel-579231-unsplash-1.jpg 800w,\n/static/c09dbcb0bbc5d806dce830f668bde559/47498/rawpixel-579231-unsplash-1.jpg 1200w,\n/static/c09dbcb0bbc5d806dce830f668bde559/0e329/rawpixel-579231-unsplash-1.jpg 1600w,\n/static/c09dbcb0bbc5d806dce830f668bde559/ea7dd/rawpixel-579231-unsplash-1.jpg 2500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Login methods may come and go, but customer identity is here to stay. In the aftermath of two massive data exposures at Facebook and Google…","fields":{"slug":"/identity/reconsidering-social-login-security-privacy-angle/"},"html":"<p><strong>Login methods may come and go, but customer identity is here to stay.</strong></p>\n<p>In the aftermath of two massive data exposures at Facebook and Google+ that were amplified by social login, I want to talk about the implications for B2C enterprises.</p>\n<p>Are the privacy and security risks of <a href=\"https://www.loginradius.com/social-login/\">social login</a> still worth the convenience? And what steps should companies take to protect customer data and maintain public trust?</p>\n<p>Let’s start with some history.</p>\n<h2 id=\"social-login-has-been-around-for-about-a-decade\" style=\"position:relative;\"><a href=\"#social-login-has-been-around-for-about-a-decade\" aria-label=\"social login has been around for about a decade permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social login has been around for about a decade.</h2>\n<p>Facebook came out with its first identity service, Facebook Connect, in 2008. Users started logging in with Twitter in 2009 and with LinkedIn in 2010. Google+ launched in 2011 and added its social login to the mix.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 47.53846153846153%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAKCAYAAAC0VX7mAAAACXBIWXMAAAsTAAALEwEAmpwYAAABpUlEQVQoz32RS2/VMBCF88v5MXeJEGwQS1aAhIra8lqxaIE0N078jB0njp0cxs691QWpjPRpbM/M8XFSXdcDHqSF6Ht0XQfOeUEpBT+OGC/oqSfDGHvs41xC/36B47dnkPcHVEwNUGaAVppENLTeUVJRNuVM0jpTLqJs6Dz3GGN2VAfFa8oMFZ4IQwOSM1gjqLGHlh1GZxBjxP+i2rYNGWQo0rpiI5wP+PilwfubGh9uG7y7rvH1R4+VaimlknOc589Uu9CGlXJcN8xLJMEEoRyev/mMw8srHF59Iq7w+u13LMtSBBdiH/1HcDsLRXK1JNgpIMwzQgg0mIdpHzw5ivTcUM4nqrsQERK5Pb/w5LbKYj4mDNQgpgjpJtjBlB/SCg12Iq87aeCshfcjFH0SG1IxktYLwYkOBirIaQEbF7TG49hzNL0A18OOsSULuoQTgva9m6HIgKPZ7HQ9uaxGeqaeI7hf8GADjsOEwc9oyU3DFepeFho54EiXCbfXmZ0hfCxmpguXfwk2JNjQkLQjfrUd7huGOyLnn53EHSdRbaGdR/uE4B8h7P8o89ctVgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"airbnb social login 2012\"\n        title=\"airbnb social login 2012\"\n        src=\"/static/e04ffd23ea87ae34c483b1ea0fe7b6c2/e5715/airbnb_social_login_2012.png\"\n        srcset=\"/static/e04ffd23ea87ae34c483b1ea0fe7b6c2/a6d36/airbnb_social_login_2012.png 650w,\n/static/e04ffd23ea87ae34c483b1ea0fe7b6c2/e5715/airbnb_social_login_2012.png 768w,\n/static/e04ffd23ea87ae34c483b1ea0fe7b6c2/6bfd0/airbnb_social_login_2012.png 1011w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Throwback to the Airbnb login page in March 2012</strong></p>\n<p>LoginRadius got its start in 2012 by giving businesses a simple way to implement one or more social login methods on their digital properties. We saw a significant increase in sign-up rates for B2C websites with low-risk accounts that used our social login tools. Small, medium, and mid-market businesses were quick to adopt the LoginRadius solution.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 640px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.09375%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"1 Content Asset social API\"\n        title=\"1 Content Asset social API\"\n        src=\"/static/30086aa2e7bf5731fcdbf132c823b563/6af66/1-Content-Asset-social-API.png\"\n        srcset=\"/static/30086aa2e7bf5731fcdbf132c823b563/6af66/1-Content-Asset-social-API.png 640w\"\n        sizes=\"(max-width: 640px) 100vw, 640px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>LoginRadius supports 40+ social login providers</strong></p>\n<p>By 2015, social login had became a very popular login method. It appeared to be a win-win-win for all involved. Users liked the convenience, third parties liked the conversion rates and social data, and social networks liked off-site tracking for ad targeting.</p>\n<h3 id=\"but-as-more-businesses-and-customers-used-social-login-its-associated-privacy-issues-hit-the-public-consciousness\" style=\"position:relative;\"><a href=\"#but-as-more-businesses-and-customers-used-social-login-its-associated-privacy-issues-hit-the-public-consciousness\" aria-label=\"but as more businesses and customers used social login its associated privacy issues hit the public consciousness permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>But as more businesses and customers used social login, its associated privacy issues hit the public consciousness.</h3>\n<p>Customers started to notice that companies were collecting many data points from their social accounts, including check-ins, likes, and friend data. They realized that they were trading their private information to get the convenience of social login, and they weren’t happy with the trade-off.</p>\n<p><strong>So social networks started to cut back the functionality of social login.</strong> They made it more difficult to get permissions for collecting social data and publishing on users’ social accounts.</p>\n<p>Businesses in turn cut down their requests for read and publish permissions because they were harder to get and were a turnoff for customers. The Equifax breach in 2017 further sensitized businesses and users to the dangers of personal data leaks.</p>\n<p><strong>The massive scale of social data collection and third-party publishing dropped down to basic data and authentication by 2018</strong>, and social login reached an equilibrium between customer experience and respect for privacy.</p>\n<p>LoginRadius saw this shift coming. That’s why our company isn’t called SocialLoginRadius.</p>\n<h3 id=\"we-knew-that-social-login-would-never-be-sufficient-for-the-identity-needs-of-b2c-enterprises\" style=\"position:relative;\"><a href=\"#we-knew-that-social-login-would-never-be-sufficient-for-the-identity-needs-of-b2c-enterprises\" aria-label=\"we knew that social login would never be sufficient for the identity needs of b2c enterprises permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>We knew that social login would never be sufficient for the identity needs of B2C enterprises.</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 71.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"rawpixel 1062883 unsplash\"\n        title=\"rawpixel 1062883 unsplash\"\n        src=\"/static/0f0b67c8486b51fac893af4a9512ad9d/212bf/rawpixel-1062883-unsplash.jpg\"\n        srcset=\"/static/0f0b67c8486b51fac893af4a9512ad9d/6aca1/rawpixel-1062883-unsplash.jpg 650w,\n/static/0f0b67c8486b51fac893af4a9512ad9d/212bf/rawpixel-1062883-unsplash.jpg 768w,\n/static/0f0b67c8486b51fac893af4a9512ad9d/779b4/rawpixel-1062883-unsplash.jpg 3204w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>From the beginning, LoginRadius had a complete identity product roadmap that started with social login and progressed to a full customer identity platform.</strong></p>\n<p>In 2016 we launched our customer identity and access management solution with multiple login methods and the ability to integrate with any ID provider.</p>\n<p>The LoginRadius Customer Identity Platform still includes social login as an add-on, but it also has these more secure, robust, and specialized login options:</p>\n<ul>\n<li><strong>Standard Login</strong> is the traditional login process, where a user creates an account and logs in with a unique ID (email or username) and password.</li>\n<li><strong>Phone Login</strong> uses a customer's phone number as a unique ID.</li>\n<li><strong>Passwordless Login uses a customer’s email address or phone number to send them a one-time link or one-time passcode that they click to log in.</strong></li>\n<li><strong>One-Touch Login</strong> allows the user to register or log in using a generated link sent to their email address or a one-time password sent to their phone. The user does not need to be an existing user in the system. No credentials are submitted.</li>\n<li><strong>Smart Login</strong> is a login method that allows customers to log in to a device that can’t be accessed as a standard web or mobile device. It takes the authentication process for smartphone apps, smart TVs, gaming consoles, and other IoT devices and delegates the authentication process to another device that is easier and more secure for entering and managing passwords.</li>\n</ul>\n<p>Most of our current customers offer social login for ease of customer experience, but they only collect basic profile information such as name and email address.</p>\n<h3 id=\"loginradius-can-make-social-login-more-secure-for-businesses\" style=\"position:relative;\"><a href=\"#loginradius-can-make-social-login-more-secure-for-businesses\" aria-label=\"loginradius can make social login more secure for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius can make social login more secure for businesses.</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"stephen petrey 613428 unsplash\"\n        title=\"stephen petrey 613428 unsplash\"\n        src=\"/static/f2a93798280fab42b838c29745f4a94f/212bf/stephen-petrey-613428-unsplash.jpg\"\n        srcset=\"/static/f2a93798280fab42b838c29745f4a94f/6aca1/stephen-petrey-613428-unsplash.jpg 650w,\n/static/f2a93798280fab42b838c29745f4a94f/212bf/stephen-petrey-613428-unsplash.jpg 768w,\n/static/f2a93798280fab42b838c29745f4a94f/857b3/stephen-petrey-613428-unsplash.jpg 6000w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Until now, the market has mainly talked about the advantages of social login but hasn’t been as vocal about the risks. LoginRadius is taking a leadership role in advocating for social login practices that protect businesses and their customers better. Our experience facilitating social login for thousands of companies and hundreds of millions of customers over six years has given us expert insight on this login method.</p>\n<p><strong>LoginRadius strongly recommends that Fortune 1000 businesses adopt extra security and privacy measures around social login.</strong></p>\n<p>Our white paper, <a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\">Social Login Reconsidered</a>, puts forward four use cases for social login. These use cases cut the risks of illegitimate access and exposure while maintaining the ease of customer experience.</p>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social login reconsidered\"\n        title=\"social login reconsidered\"\n        src=\"/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-reconsidered.png\"\n        srcset=\"/static/bf408b3bda215542fe05da49cb06b853/a6d36/social-login-reconsidered.png 650w,\n/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-reconsidered.png 768w,\n/static/bf408b3bda215542fe05da49cb06b853/63ff0/social-login-reconsidered.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>The right use case for your business depends on the business model, the target audience, and the level of risk for customer accounts.</p>\n<h3 id=\"the-loginradius-mission-is-much-larger-than-a-single-login-method\" style=\"position:relative;\"><a href=\"#the-loginradius-mission-is-much-larger-than-a-single-login-method\" aria-label=\"the loginradius mission is much larger than a single login method permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The LoginRadius mission is much larger than a single login method.</h3>\n<p>Our mission is to empower businesses to provide secure, delightful experiences for their customers using the most innovative customer identity platform.</p>\n<p>And we will continue to develop and revisit our entire solution, as we have done for social login, to make sure we are fulfilling that mission.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABzUlEQVQY0yWP20uTAQDFv4ceTOziQwoRFF4StqFhc26Frina3BQpJrEJQbUky6jhgjTXWjBHbpUT50RKjSzHps7LLi11a+xC5WoG9eBf8+ujHg4/OIfD4Qh/skkOvib54HPwKfCSbGyJ5VkPme11gu98HPxIM+saRd7Zh1Ah5WiNkpMNGirr2yiVtFN6toWSM3JKTp/nsEghEwnzLbFKccPGhn+EQj6H89lzcjubhOa9RCftDF7tpEHdIxabKK+7QGNHH1KNgXKlgeON3RwRR47VqiirUiA4h+/x9vU4E7YH2B7eZsE9yrj1Bnufg+yn4sSD84xZBmm7ch1FlwmlzoRCa0SlNyHvMNCsvSZ6/WJmpEKmRlgUy65HQ4xZH3O5XcOmf4plj51MNEguESO1m2TON42sVS9eaqJGqaNKof3HWpWe6madqC7KqhX/L0dm7KzOTZAIB5h0OkjH19kKvOFXfpfQgp+f2RSJ0HskLd3UXewhv1cksp1maWWLj2sx1qI7fC/+Rmu8g1ApQyikIixOudj/4iY4PUAkHMLrdpIsrOCdcfDqhYe7ZjP1l3o5IVUzNOJkwOrgpsXGLctTzMN27j9xIWnt5dCpc/wFpYIYc0PBoV0AAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CTA Graphics for Blogs V02 01 14 1024x310\"\n        title=\"CTA Graphics for Blogs V02 01 14 1024x310\"\n        src=\"/static/8f35aa0484e3c7f6abeab3116ff1873e/e5715/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png\"\n        srcset=\"/static/8f35aa0484e3c7f6abeab3116ff1873e/a6d36/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 650w,\n/static/8f35aa0484e3c7f6abeab3116ff1873e/e5715/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 768w,\n/static/8f35aa0484e3c7f6abeab3116ff1873e/2bef9/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 20, 2018","updated_date":null,"description":"Login strategies can come and go, but the identity of the customer is here to stay. In the wake of two major exposures of data on Facebook and Google+ exacerbated by social login, the repercussions for B2C companies can be addressed. Are social login privacy and security threats still worth the convenience? And what steps do businesses take to safeguard consumer data and preserve public confidence? Let 's begin with a bit of history.","title":"Reconsidering Social Login from a Security and Privacy Angle","tags":["social login","data security","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/c15c0249e3d6c7f2888ec285e358c6ab/14b42/reconsidering-social-login.jpg","srcSet":"/static/c15c0249e3d6c7f2888ec285e358c6ab/f836f/reconsidering-social-login.jpg 200w,\n/static/c15c0249e3d6c7f2888ec285e358c6ab/2244e/reconsidering-social-login.jpg 400w,\n/static/c15c0249e3d6c7f2888ec285e358c6ab/14b42/reconsidering-social-login.jpg 800w,\n/static/c15c0249e3d6c7f2888ec285e358c6ab/47498/reconsidering-social-login.jpg 1200w,\n/static/c15c0249e3d6c7f2888ec285e358c6ab/37d86/reconsidering-social-login.jpg 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"When you think of online customer experience, you might not consider it as important in the public sector. But with so many daily services…","fields":{"slug":"/identity/improving-customer-experience-public-sector/"},"html":"<p>When you think of online customer experience, you might not consider it as important in the public sector. But with so many daily services now available online, companies and organizations in the public sector are constantly looking for ways to provide customers with the best experience possible. Not only that, but certain organizations such as government agencies, NGOs, and education systems are often faced with the need to conserve money and limit setup time.</p>\n<p>Implementing a <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management\">customer identity and access management</a> (CIAM) solution can help tackle both issues at once. LoginRadius is currently helping a number of companies in the public sector improve their customer experience in different ways. Here are some examples of how public sector sub-industries improve their customer experience with LoginRadius.</p>\n<h2 id=\"cities-centralizing-municipal-services\" style=\"position:relative;\"><a href=\"#cities-centralizing-municipal-services\" aria-label=\"cities centralizing municipal services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cities: Centralizing Municipal Services</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 42.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"imgae 1\"\n        title=\"imgae 1\"\n        src=\"/static/93448b9cd39f050c86feb15f3479ba66/212bf/imgae-1.jpg\"\n        srcset=\"/static/93448b9cd39f050c86feb15f3479ba66/6aca1/imgae-1.jpg 650w,\n/static/93448b9cd39f050c86feb15f3479ba66/212bf/imgae-1.jpg 768w,\n/static/93448b9cd39f050c86feb15f3479ba66/72e01/imgae-1.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>In an effort to increase citizen engagement, <a href=\"https://www.loginradius.com/resource/how-cities-use-loginradius-identity-platform/\">more and more cities are moving citizen services to their online platforms</a>. Paying taxes, obtaining a business license, getting election information, and more can all be done online through a centralized portal. Simplifying access to these services by creating a one-stop resource for all online applications increases not only citizen engagement, but also satisfaction with government and municipal services in general.</p>\n<p>The <a href=\"https://my.surrey.ca/\">City of Surrey</a>, British Columbia has implemented the LoginRadius CIAM solution to provide a centralized hub for an extensive list of citizen services. They also enable users to access each service with a unified identity through <a href=\"https://www.loginradius.com/single-sign-on-overview/\">single sign on authentication</a>, avoiding the need to register or log in multiple times for different services. SSO further improves customer experience with their digital platform by creating seamless interactions across each different service.</p>\n<h2 id=\"non-profits--ngos-informing-centralized-groups\" style=\"position:relative;\"><a href=\"#non-profits--ngos-informing-centralized-groups\" aria-label=\"non profits  ngos informing centralized groups permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Non-Profits &#x26; NGOs: Informing Centralized Groups</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image 2\"\n        title=\"image 2\"\n        src=\"/static/4c6efe5956627f1f1f3e6f7f492f139b/212bf/image-2.jpg\"\n        srcset=\"/static/4c6efe5956627f1f1f3e6f7f492f139b/6aca1/image-2.jpg 650w,\n/static/4c6efe5956627f1f1f3e6f7f492f139b/212bf/image-2.jpg 768w,\n/static/4c6efe5956627f1f1f3e6f7f492f139b/72e01/image-2.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Much like cities, many NGOs and non-profit groups depend on interacting with citizens in order to inform them about various initiatives. Without the ability to reach and inform large groups of citizens, these organizations are rendered ineffective. With this communication need in mind, a positive customer experience with their digital properties is extremely important, as it can help in extending the reach of these initiatives, as well as turning online visitors into known users. From there, these groups can individually target the various groups of people they need to interact with.</p>\n<p>For example, <a href=\"https://www.youtube.com/watch?v=_11VIYMZh2g&#x26;list=PL3PS687CKFEFv2nlnk6NKrmbg4_zwBImw&#x26;index=3\">Zero Waste Scotland</a> is a government non-profit organization that promotes the government’s policy on waste and resources. With a range of users and stakeholders to reach, they needed a CIAM solution that could easily allow these various identities to interact with their multiple digital touchpoints. LoginRadius was able to build centralized profiles for each user in order to gain a complete view of how people are using their services. Leveraging our User Profiling capabilities has helped Zero Waste Scotland and other organizations understand their users and build informed campaign strategies.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-public-sector-companies-use-the-loginradius-identity-platform/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"public-sector\"\n        title=\"public-sector\"\n        src=\"/static/9bf345eb654ad0555d320005047c6c10/e5715/public-sector.png\"\n        srcset=\"/static/9bf345eb654ad0555d320005047c6c10/a6d36/public-sector.png 650w,\n/static/9bf345eb654ad0555d320005047c6c10/e5715/public-sector.png 768w,\n/static/9bf345eb654ad0555d320005047c6c10/63ff0/public-sector.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Lastly, when it comes to government agencies like Zero Waste Scotland, data security is one of the main priorities, especially with cloud storage. LoginRadius complies with all major security regulations in the industry, including <a href=\"https://www.loginradius.com/resource/loginradius-and-gdpr-compliance/\">GDPR</a>. We also allow customers to choose which of our 29 global data centers they want personal data to be stored in, to comply with company policies.</p>\n<h2 id=\"utilities-bringing-better-information-to-the-customer\" style=\"position:relative;\"><a href=\"#utilities-bringing-better-information-to-the-customer\" aria-label=\"utilities bringing better information to the customer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Utilities: Bringing Better Information to the Customer</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image 3\"\n        title=\"image 3\"\n        src=\"/static/30526524f0a2d7bf6bf7e04e907cfe09/212bf/image-3.jpg\"\n        srcset=\"/static/30526524f0a2d7bf6bf7e04e907cfe09/6aca1/image-3.jpg 650w,\n/static/30526524f0a2d7bf6bf7e04e907cfe09/212bf/image-3.jpg 768w,\n/static/30526524f0a2d7bf6bf7e04e907cfe09/8e1fc/image-3.jpg 900w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>For most people, a utility provider represents just another bill to pay at the end of the month. Customers are often limited in the ways that they can interact with utility companies, making customer experience an afterthought. With a CIAM solution, <a href=\"https://www.loginradius.com/resource/how-utility-companies-use-loginradius-identity-solution/\">utility companies can transform their customer experience</a> by integrating with third-party applications. These integrations help them better understand their customers, offer more useful information, and deliver that information more directly.</p>\n<p>One of the best examples of customer experience innovation for utilities comes from Hydro Ottawa, the largest local electricity distribution company in eastern Ontario. LoginRadius has helped <a href=\"https://www.loginradius.com/blog/identity/customer-spotlight-hydro-ottawa/\">Hydro Ottawa completely disrupt the Canadian utility industry</a> by integrating their platform with Amazon Alexa and Google Home. Customers can receive billing information, insights about usage, and tips on how to conserve energy and reduce spending by talking to their smart home assistant. Now, rather than making customers search for useful information, Hydro Ottawa makes that information directly available through voice commands. By leveraging their identity architecture and the <a href=\"https://www.loginradius.com/federation/\">OAuth 2.0</a> capabilities from LoginRadius, Hydro Ottawa has developed a new and innovative way for their customers to interact with them.</p>\n<p>If you’re ready to see how the LoginRadius CIAM platform can help your company, <a href=\"https://www.loginradius.com/schedule-demo/\">schedule your demo now</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 26, 2018","updated_date":null,"description":"When people think of the experience of online users, they will not consider it relevant in the public sector. LoginRadius is currently helping a variety of public sector organisations enhance their customer service in various ways.","title":"Improving Customer Experience in the Public Sector","tags":["data security","ciam solutions","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/a2df77ed19641dc69e9c69cbc70db0d6/33aa5/customer-experience.jpg","srcSet":"/static/a2df77ed19641dc69e9c69cbc70db0d6/f836f/customer-experience.jpg 200w,\n/static/a2df77ed19641dc69e9c69cbc70db0d6/2244e/customer-experience.jpg 400w,\n/static/a2df77ed19641dc69e9c69cbc70db0d6/33aa5/customer-experience.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":396,"currentPage":67,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}