{"componentChunkName":"component---src-templates-tag-js","path":"/tags/social-login/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":16,"edges":[{"node":{"fields":{"slug":"/identity/ciam-deployment-flexibility/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Suppose you’re a business catering to a vast number of users online. In that case, you can’t escape from the fact that a seamless user experience coupled with security is the minimum to ensure customer trust and satisfaction. </p>\n<p>And here’s where customer identity and access management (CIAM) solutions play a pivotal role in achieving these objectives. Let’s explore the diverse CIAM deployment options offered by LoginRadius, a leading provider in the field. </p>\n<p>Businesses can gain valuable insights into crafting a robust and flexible identity management strategy by delving into essential features such as social login, single sign-on (SSO), passwordless login, and cloud integrations.</p>\n<h3 id=\"understanding-ciam-deployment-a-brief-overview\" style=\"position:relative;\"><a href=\"#understanding-ciam-deployment-a-brief-overview\" aria-label=\"understanding ciam deployment a brief overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding CIAM Deployment: A Brief Overview</h3>\n<p>Customer Identity and Access Management (CIAM) deployment refers to implementing strategies and technologies that enable businesses to manage and authenticate user identities securely. </p>\n<p>With LoginRadius, businesses can choose from various flexible deployment options tailored to their needs.</p>\n<h3 id=\"1-social-login-enhancing-user-convenience-and-engagement\" style=\"position:relative;\"><a href=\"#1-social-login-enhancing-user-convenience-and-engagement\" aria-label=\"1 social login enhancing user convenience and engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Social Login: Enhancing User Convenience and Engagement</h3>\n<p><a href=\"https://www.loginradius.com/social-login/\">Social login</a> simplifies users' registration and login process by allowing them to access your platform using their existing social media credentials. This feature streamlines the user experience and significantly enhances engagement rates. </p>\n<p>LoginRadius offers seamless integration with popular social media platforms, ensuring a hassle-free experience for businesses and users.</p>\n<p>Businesses can add multiple social media authentication platforms, including Facebook, Google, and more, to ensure their customers can authenticate seamlessly. </p>\n<h3 id=\"2-single-sign-on-sso-streamlining-access-across-platforms\" style=\"position:relative;\"><a href=\"#2-single-sign-on-sso-streamlining-access-across-platforms\" aria-label=\"2 single sign on sso streamlining access across platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Single Sign-On (SSO): Streamlining Access Across Platforms</h3>\n<p>Single Sign-On (SSO) is a game-changer for businesses managing multiple applications and platforms. </p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">With LoginRadius, businesses can seamlessly implement SSO</a>, enabling users to access various services with a single set of credentials. This reduces the complexity of managing multiple passwords and enhances security by centralizing access control.</p>\n<h3 id=\"3-passwordless-login-enhancing-security-and-user-experience\" style=\"position:relative;\"><a href=\"#3-passwordless-login-enhancing-security-and-user-experience\" aria-label=\"3 passwordless login enhancing security and user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Passwordless Login: Enhancing Security and User Experience</h3>\n<p>Passwordless login solutions are increasingly replacing traditional password-based authentication methods. By eliminating the need for passwords, businesses can enhance security and provide a frictionless user experience. </p>\n<p>LoginRadius offers robust passwordless login options, including biometric authentication and one-time passcodes, ensuring top-notch security while enhancing user satisfaction.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABgElEQVQY00VRS0sCURgdejmORcFUUJZYPprKR5jo5KRlTeqQkdGil0bQTnqs2mWbVvVDgjZBtOgFQbSI2rRsEVFQtMkWKYm7071Xswsfl/N9h3O+B6e3D4OG0DMMgxREvRRiv0BzdgV/dRq8NQChfxzN8gxE1zj0DhW8NAK9TQFf5nAlsSBanGGIvUE0WGU02gNoH4yhdWACTY5R8DalImhwqugMz6NPnYPgn4XOGWGCrG4rC+pIwuzToEyl4I3Nw+RRUds9BMGtodE59i9YFhVJrs2rEdMIGsg0pXqJw1FAQwolEIgn4dMW4ArPwKQkYIkuo8UTZSKUXGchHZJpOvxxmOQpGH2TEN3E3DJUMWUd1nTLODq9Qj6fx/PLK97eP/CZ/cJPoQB1MY0qsw+c0YO1zD4en14Y9+D4HIcnF7i5f8DlzR1ZTZgZcvQY1V1+nF3fgr5sNotc7hvFYpHhaGodXKeXmfqnV5De3kNyM4PFjW0sbWSwurVL8A47Jl3dLwii3ouAZWc1AAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-passwordless-login\"\n        title=\"DS-passwordless-login\"\n        src=\"/static/f4798092ec43235616eb2638cc648d3f/e5715/DS-pswrdless-login.png\"\n        srcset=\"/static/f4798092ec43235616eb2638cc648d3f/a6d36/DS-pswrdless-login.png 650w,\n/static/f4798092ec43235616eb2638cc648d3f/e5715/DS-pswrdless-login.png 768w,\n/static/f4798092ec43235616eb2638cc648d3f/63ff0/DS-pswrdless-login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"4-cloud-integrations-seamlessly-integrating-ciam-with-existing-systems\" style=\"position:relative;\"><a href=\"#4-cloud-integrations-seamlessly-integrating-ciam-with-existing-systems\" aria-label=\"4 cloud integrations seamlessly integrating ciam with existing systems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Cloud Integrations: Seamlessly Integrating CIAM with Existing Systems</h3>\n<p>Integrating CIAM seamlessly with existing cloud-based systems is crucial for businesses. LoginRadius offers flexible cloud integrations that allow businesses to connect their CIAM solution with various cloud-based platforms and applications. </p>\n<p>This integration ensures data consistency, enhances efficiency, and provides a unified view of customer identities across the organization.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Incorporating flexible CIAM deployment options from LoginRadius empowers businesses to create a seamless and secure online environment for their users. By embracing features such as social login, single sign-on, passwordless login, and cloud integrations, businesses can enhance user convenience, streamline access management, and bolster overall security.</p>\n<p>In a world where user experience and security are paramount, investing in a robust CIAM solution like LoginRadius is not just a choice but a strategic necessity. Stay ahead of the curve by implementing these advanced CIAM deployment options and ensure your users enjoy a hassle-free, secure, and engaging online experience.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 06, 2023","updated_date":null,"title":"Comprehensive Guide to Flexible CIAM Deployment Options with LoginRadius","tags":["single sign-on","social login","passwordless login","ciam solutions"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/7c0555c17c998cca6cb653b765b0c211/33aa5/ciam-deployment.jpg","srcSet":"/static/7c0555c17c998cca6cb653b765b0c211/f836f/ciam-deployment.jpg 200w,\n/static/7c0555c17c998cca6cb653b765b0c211/2244e/ciam-deployment.jpg 400w,\n/static/7c0555c17c998cca6cb653b765b0c211/33aa5/ciam-deployment.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/growth/ecommerce-social-login-success/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>A great user experience attracts potential customers and eventually ensures your current customers keep returning.</p>\n<p>However, a little friction in authenticating your users may offer a competitive advantage to your competitors since most platforms have already worked on streamlining their user authentication experience. </p>\n<p>E-commerce social login is undeniably the need of the hour for businesses since traditional username and password combinations have been the go-to method. <a href=\"https://www.loginradius.com/social-login/\">Social login</a> has gained significant popularity, allowing users to log in with their social media profiles. </p>\n<p>This approach simplifies the e-commerce login process and enhances the user experience.</p>\n<p>However, the entire process of incorporating social login into your e-commerce business requires a proper roadmap along with a strategy that can thrive in business success in the long run. </p>\n<p>Let’s explore seven essential insights to consider when enabling e-commerce social login for your online platform. </p>\n<h3 id=\"1-offer-multiple-social-login-options\" style=\"position:relative;\"><a href=\"#1-offer-multiple-social-login-options\" aria-label=\"1 offer multiple social login options permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Offer Multiple Social Login Options</h3>\n<p>Variety is key. Users have preferences regarding social media platforms, so offering a selection of login options like Facebook, Google, Twitter, and even niche networks caters to a wider audience. This inclusivity can result in higher user engagement and registration rates.</p>\n<h3 id=\"2-data-privacy-and-security\" style=\"position:relative;\"><a href=\"#2-data-privacy-and-security\" aria-label=\"2 data privacy and security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Data Privacy and Security</h3>\n<p>While convenience is paramount, it's crucial to <a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">prioritize data privacy and security</a>. Inform users about how their data will be used and ensure your application complies with data protection regulations like GDPR. Utilize OAuth protocols to maintain a secure connection between your app and the user's social media account.</p>\n<h3 id=\"3-transparent-data-usage\" style=\"position:relative;\"><a href=\"#3-transparent-data-usage\" aria-label=\"3 transparent data usage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Transparent Data Usage</h3>\n<p>Your privacy policy and terms of service clearly outline how user data obtained through social login will be utilized. Be transparent about data protection measures and assure users that their information will not be misused or shared without consent. This transparency builds trust and encourages users to embrace social login.</p>\n<p><a href=\"https://www.loginradius.com/resource/whitepaper/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-social-login-reconsidered\"\n        title=\"WP-social-login-reconsidered\"\n        src=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-social-login-reconsidered.png\"\n        srcset=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/a6d36/WP-social-login-reconsidered.png 650w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-social-login-reconsidered.png 768w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/81501/WP-social-login-reconsidered.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"4-streamline-checkout\" style=\"position:relative;\"><a href=\"#4-streamline-checkout\" aria-label=\"4 streamline checkout permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Streamline Checkout</h3>\n<p>One-click checkout is the holy grail of e-commerce. For users who opt for social login, design a checkout process where their saved information, such as shipping addresses and payment methods, is pre-populated. This expedites the checkout process, reduces friction, and increases the likelihood of completing the purchase.</p>\n<h3 id=\"5-ab-testing\" style=\"position:relative;\"><a href=\"#5-ab-testing\" aria-label=\"5 ab testing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#5. A/B Testing</h3>\n<p>Continuously refine your social login strategy through A/B testing. Experiment with different button placements, messaging, and even the order of social login options. Analyze the data to determine which configurations<a href=\"https://www.loginradius.com/blog/growth/sign-up-tips-conversion-rate/\"> yield the highest conversion rates</a>. Regular testing keeps your platform optimized for user preferences.</p>\n<h3 id=\"6-mobile-optimization\" style=\"position:relative;\"><a href=\"#6-mobile-optimization\" aria-label=\"6 mobile optimization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#6. Mobile Optimization</h3>\n<p> With the prevalence of mobile shopping, ensure your social login is seamlessly optimized for mobile devices. Responsive design and mobile-friendly interfaces are essential for providing a consistent and user-friendly experience across all screen sizes.</p>\n<h3 id=\"7-user-consent-management\" style=\"position:relative;\"><a href=\"#7-user-consent-management\" aria-label=\"7 user consent management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#7. User Consent Management</h3>\n<p>Empower users to customize their data-sharing preferences during social login. Offer granular controls that allow them to choose what information they're comfortable sharing with your e-commerce platform. This empowers users to maintain control over their data.</p>\n<h3 id=\"8-personalized-recommendations\" style=\"position:relative;\"><a href=\"#8-personalized-recommendations\" aria-label=\"8 personalized recommendations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#8. Personalized Recommendations</h3>\n<p>Leverage the user data obtained through social login to provide tailored product recommendations. Analyze user preferences, past purchases, and browsing behavior to suggest items that align with their interests. Personalization <a href=\"https://www.loginradius.com/blog/growth/improve-customer-experience-ecommerce/\">enhances the shopping experience</a> and can drive higher conversion rates.</p>\n<h2 id=\"to-conclude\" style=\"position:relative;\"><a href=\"#to-conclude\" aria-label=\"to conclude permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>To Conclude</h2>\n<p>Enabling social media profile login for users can be a game-changer for your e-commerce application/platform, enhancing user convenience and providing valuable data. However, balancing this convenience with robust data privacy and security measures is essential. By implementing these eight aspects, you can create a seamless experience for your customers for your e-commerce store. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 20, 2023","updated_date":null,"title":"8 Essential Insights for Enabling E-Commerce Social Login","tags":["ecommerce","social login","data privacy","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/76b10e218cf72d65911821e0016e148a/33aa5/ecommerce-social-login.jpg","srcSet":"/static/76b10e218cf72d65911821e0016e148a/f836f/ecommerce-social-login.jpg 200w,\n/static/76b10e218cf72d65911821e0016e148a/2244e/ecommerce-social-login.jpg 400w,\n/static/76b10e218cf72d65911821e0016e148a/33aa5/ecommerce-social-login.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/growth/power-of-login-box-for-seamless-user-experience/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>A great user experience is what everyone seeks. No matter your excellent services or products, you'll lose the game if your platform fails to impress users in the first interaction! </p>\n<p>Whether it’s a mobile app or a web platform, users expect a seamless experience from the moment they first interact with the platform until checkout. And this entire <a href=\"https://www.loginradius.com/blog/identity/seamless-customer-journey-identity-management/\">customer journey</a> must be smooth, flawless, and harmonious. </p>\n<p>Although businesses emphasize building great customer experiences by considering specific aspects, including website loading speed, ease of access, and quick payments, they often ignore their login box, perhaps the most crucial element of crafting a seamless UX.</p>\n<p>Most users switch platforms because they can’t authenticate quickly and easily. And here’s where the crucial role of social login comes into play! </p>\n<p>Brands have been using social login for years to create seamless user journeys that could engage customers and ensure they convert. Hence, every business must emphasize building a great customer experience. Let’s dig deeper into this. </p>\n<h2 id=\"the-overlooked-element-the-login-box\" style=\"position:relative;\"><a href=\"#the-overlooked-element-the-login-box\" aria-label=\"the overlooked element the login box permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Overlooked Element: The Login Box</h2>\n<p>The log-in box, often overlooked in pursuing a seamless user experience, is a crucial element that can significantly impact user engagement and retention. </p>\n<p>Many businesses prioritize aspects like website loading speed, accessibility, and payment processing but fail to recognize the login box as a make-or-break moment for potential customers. </p>\n<p>However, the login box serves as the gateway for users to access your platform, and it is their first interaction with your brand. If the login process is cumbersome, time-consuming, or confusing, users will likely abandon your platform and seek alternatives.</p>\n<p>On the other hand, a well-designed login box coupled with a quick authentication mechanism like social login, which is visually appealing, user-friendly, and streamlined, can enhance user satisfaction and encourage them to continue engaging with your platform.</p>\n<p><a href=\"https://www.loginradius.com/resource/unified-login-box-for-customers\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-Login-Box\"\n        title=\"EB-Login-Box\"\n        src=\"/static/c1e41fe2e82dcec46441ba91c9f04b73/e5715/EB-Login-Box.png\"\n        srcset=\"/static/c1e41fe2e82dcec46441ba91c9f04b73/a6d36/EB-Login-Box.png 650w,\n/static/c1e41fe2e82dcec46441ba91c9f04b73/e5715/EB-Login-Box.png 768w,\n/static/c1e41fe2e82dcec46441ba91c9f04b73/81501/EB-Login-Box.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"the-role-of-social-login-in-seamless-user-experiences\" style=\"position:relative;\"><a href=\"#the-role-of-social-login-in-seamless-user-experiences\" aria-label=\"the role of social login in seamless user experiences permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Social Login in Seamless User Experiences</h2>\n<p><a href=\"https://www.loginradius.com/social-login/\">Social login</a>, also known as social sign-in, allows users to log in to your platform using their existing social media credentials, such as Facebook, Google, or Twitter. It offers a streamlined and simplified registration process, reducing friction and increasing conversion rates.</p>\n<p>Picture this: a user visits your platform, eager to explore what you have to offer. But wait, they're greeted by a lengthy registration form demanding a new username and password. Frustrated, they contemplate abandoning the ship before they even set sail. Enter social login, the secret ingredient to creating seamless user experiences that captivate and convert.</p>\n<p>With social login, the power of convenience lies at your users' fingertips. By leveraging their existing social media credentials, such as Facebook, Google, or Twitter, you can whisk them away from the tediousness of traditional registration processes. </p>\n<p>In just a few clicks, they can gain instant access to your platform without creating another account.</p>\n<p>But the <a href=\"https://www.loginradius.com/blog/identity/what-is-social-login/\">benefits of social login</a> don't end there. It catalyzes engagement, driving users deeper into your platform. You gain valuable insights into their interests, preferences, and connections by tapping into their social media profiles. </p>\n<p>Armed with this treasure trove of information, you can curate personalized experiences that resonate with your users profoundly.</p>\n<h2 id=\"benefits-for-businesses-and-users\" style=\"position:relative;\"><a href=\"#benefits-for-businesses-and-users\" aria-label=\"benefits for businesses and users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits for Businesses and Users</h2>\n<p>The benefits of social login are significant for both businesses and users. For businesses, it eliminates the need for users to fill out lengthy registration forms or remember yet another set of login credentials. </p>\n<p>This frictionless experience enhances user satisfaction and reduces the likelihood of user abandonment. From a user perspective, social login offers convenience and saves time.</p>\n<h2 id=\"leveraging-user-data-for-personalization\" style=\"position:relative;\"><a href=\"#leveraging-user-data-for-personalization\" aria-label=\"leveraging user data for personalization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Leveraging User Data for Personalization</h2>\n<p>By implementing social login, businesses can also tap into valuable user data. With <a href=\"https://www.loginradius.com/consent-management/\">user consent</a>, you can access demographic information, interests, and social connections, enabling you to personalize the user experience and target your marketing efforts more effectively. </p>\n<p>This data-driven approach enhances user engagement and allows you to gain insights into user behavior and preferences.</p>\n<h2 id=\"striking-the-right-balance-offering-options\" style=\"position:relative;\"><a href=\"#striking-the-right-balance-offering-options\" aria-label=\"striking the right balance offering options permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Striking the Right Balance: Offering Options</h2>\n<p>However, it is crucial to strike the right balance when implementing social login. While it offers numerous benefits, it should not be the sole option for user authentication. </p>\n<p>Some users may prefer traditional registration methods, as they value their privacy or do not have social media accounts. Therefore, offering alternative registration options, such as email sign-up and social login, is essential.</p>\n<h2 id=\"to-conclude\" style=\"position:relative;\"><a href=\"#to-conclude\" aria-label=\"to conclude permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>To Conclude</h2>\n<p>Your platform’s login is critical to crafting a seamless user experience. And social login offers significant benefits for businesses and users, simplifying the registration process, saving time, and leveraging user data for personalization. </p>\n<p>However, offering alternative registration options and prioritizing user privacy and data security is essential. By striking the right balance, businesses can boost their brand and retain users, ensuring a positive and engaging customer journey from the first interaction. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 29, 2023","updated_date":null,"title":"Login Box Dilemma: Is it Boosting Your Brand or Driving Users Away?","tags":["social login","authentication","compliance","mfa","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/6fbddd43147fe920261ba6315069e4b4/33aa5/login-box.jpg","srcSet":"/static/6fbddd43147fe920261ba6315069e4b4/f836f/login-box.jpg 200w,\n/static/6fbddd43147fe920261ba6315069e4b4/2244e/login-box.jpg 400w,\n/static/6fbddd43147fe920261ba6315069e4b4/33aa5/login-box.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/growth/boosting-ecommerce-marketing-social-login/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>As e-commerce continues to grow and evolve, companies constantly search for ways to streamline the checkout process, build customer relationships, and increase user engagement. </p>\n<p>While user experience remains one of the top preferences for customers across the globe, renowned brands are constantly putting their users first and setting goals that can improve the overall experience. And one of the most effective methods to achieve these goals is incorporating social login into e-commerce websites.</p>\n<p><a href=\"https://www.loginradius.com/social-login/\">Social login</a> is a seamless authentication process that allows users to sign in to an e-commerce site using their existing social media credentials, such as Facebook, Google, Twitter, and LinkedIn. By offering social login options, e-commerce sites can offer customers a more personalized, streamlined, and engaging shopping experience. </p>\n<p>Let’s explore the benefits of using social login for e-commerce and why it has become a must-have for businesses today.</p>\n<h2 id=\"why-shouldnt-e-commerce-platforms-ignore-social-login\" style=\"position:relative;\"><a href=\"#why-shouldnt-e-commerce-platforms-ignore-social-login\" aria-label=\"why shouldnt e commerce platforms ignore social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Shouldn’t E-Commerce Platforms Ignore Social Login?</h2>\n<h3 id=\"1-seamless-user-experience\" style=\"position:relative;\"><a href=\"#1-seamless-user-experience\" aria-label=\"1 seamless user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Seamless User Experience</h3>\n<p>The main <a href=\"https://www.loginradius.com/blog/growth/advantage-social-login-as-marketer/\">benefit of social login</a> for e-commerce is that it enhances the user experience by simplifying the login process. Instead of filling out long registration forms, users can quickly sign in using their social media accounts. </p>\n<p>This process saves users time, reduces the risk of user error, and eliminates the need for users to remember yet another password. By providing a quick and easy way for users to log in, e-commerce sites can significantly reduce the abandonment rate and increase customer satisfaction.</p>\n<h3 id=\"2-increased-conversion-rates\" style=\"position:relative;\"><a href=\"#2-increased-conversion-rates\" aria-label=\"2 increased conversion rates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Increased Conversion Rates</h3>\n<p>Decreasing conversion rates is undoubtedly the most significant challenge among e-commerce platforms since there are several competitors in the market. Hence, the brands that aren’t able to cater to the exact needs of their target users would indeed lag behind the competition. </p>\n<p>Social login can lead to increased conversion rates on e-commerce sites. When users are presented with a social login option, they are more likely to complete the registration process and continue with their purchase.</p>\n<h3 id=\"3-richer-user-data\" style=\"position:relative;\"><a href=\"#3-richer-user-data\" aria-label=\"3 richer user data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Richer User Data</h3>\n<p>Social login allows e-commerce sites to collect richer user data, which can be used to personalize the shopping experience and build customer relationships.</p>\n<p>By logging in with social media, users permit e-commerce sites to access their social profile data, such as their name, email address, location, interests, and social connections. </p>\n<p>This data can be used to personalize product recommendations, targeted marketing campaigns, and <a href=\"https://blog.loginradius.com/identity/sso-integration-secure-cx/\">loyalty programs</a>. It also helps e-commerce businesses better understand their customers and their preferences, which can be used to tailor marketing strategies to meet their needs better. </p>\n<h3 id=\"4-improved-security\" style=\"position:relative;\"><a href=\"#4-improved-security\" aria-label=\"4 improved security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Improved Security</h3>\n<p>Social login is a more secure authentication method than traditional usernames and passwords. Social media platforms have robust security measures to protect users' accounts, including multi-factor authentication and advanced encryption techniques. </p>\n<p>By relying on social login, e-commerce sites can leverage these security features and minimize the risk of data breaches, which can cause irreparable damage to the e-commerce site and its customers.</p>\n<h3 id=\"5-increased-engagement\" style=\"position:relative;\"><a href=\"#5-increased-engagement\" aria-label=\"5 increased engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Increased Engagement</h3>\n<p>Social login can increase user engagement on e-commerce sites by creating a more personalized and interactive experience. </p>\n<p>With social login, e-commerce sites can access users' social media profiles and use that information to offer personalized content and product recommendations. This customized experience can increase engagement, loyalty, and repeat business.</p>\n<h2 id=\"in-a-nutshell\" style=\"position:relative;\"><a href=\"#in-a-nutshell\" aria-label=\"in a nutshell permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In a Nutshell</h2>\n<p>Social login for e-commerce is a robust authentication mechanism that can enhance the user experience, increase conversion rates, collect richer user data, improve security, and increase engagement. </p>\n<p>By incorporating social login into e-commerce sites, businesses can improve the overall shopping experience for their customers, build stronger relationships with their customers, and ultimately increase sales and revenue. </p>\n<p>With these benefits in mind, it's easy to see why social login has become a must-have for businesses in the digital age.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 28, 2023","updated_date":null,"title":"Why Should Social Login Be a Part of Your E-Commerce Marketing?","tags":["ecommerce","social login","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.550387596899225,"src":"/static/052800f1d4e6c951ef09188d2e076868/33aa5/ecommerce-mrktng.jpg","srcSet":"/static/052800f1d4e6c951ef09188d2e076868/f836f/ecommerce-mrktng.jpg 200w,\n/static/052800f1d4e6c951ef09188d2e076868/2244e/ecommerce-mrktng.jpg 400w,\n/static/052800f1d4e6c951ef09188d2e076868/33aa5/ecommerce-mrktng.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/difference-sso-social-login/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In the modern digital world, where customer experience decides the overall growth of a business, crafting a <a href=\"https://www.loginradius.com/blog/growth/consumer-journey-from-sign-up-to-purchase/\">frictionless customer journey</a> holds the most significant importance. </p>\n<p>Moreover, when a business embarks on a digital transformation journey, secure and seamless authentication becomes an integral part of its customer success journey. </p>\n<p>However, most enterprises aren’t sure whether they need social login on their platform or single sign-on (SSO) to improve user experience and security. </p>\n<p>Social login and SSO are both different ways of authentication and can be used together or individually, depending on the business requirements. </p>\n<p>Let’s understand the differences between the two terms and how enterprises can make wiser decisions to incorporate a seamless and secure authentication mechanism into their platforms. </p>\n<h2 id=\"what-is-social-login\" style=\"position:relative;\"><a href=\"#what-is-social-login\" aria-label=\"what is social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Social Login?</h2>\n<p>Social login, also known as social sign-in or social sign-on, allows your consumers to log in and register with a single click on a website or mobile application using their existing accounts from various social providers like Facebook, Google, etc. </p>\n<p>Social login simplifies the sign-in and registration experiences, providing a convenient alternative method to create an account where it is mandatory.</p>\n<p>Social login reduces the effort to remember passwords, which means people don’t need to create and keep track of more credentials, lessening password fatigue and login failure. Log in via a third-party web page or Facebook or Google accounts can be done with just a few clicks on the button.</p>\n<h2 id=\"what-is-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on-sso\" aria-label=\"what is single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On (SSO)?</h2>\n<p>Single Sign-On (SSO)  is an authentication method that allows websites to use other trustworthy sites to verify users. Single sign-on enables users to log in to any independent application with a single ID and password.</p>\n<p>Verifying user identity is vital to knowing which permissions a user will have. SSO is an essential feature of an Identity and Access Management (IAM) platform for controlling access. The LoginRadius Identity platform is one example of managing access that combines user identity management solutions with SSO solutions. </p>\n<p>Customers can use a single identity to navigate multiple web and mobile domains or service applications since they only need to use one password. Also,  SSO makes generating, remembering, and using stronger passwords simpler for users.</p>\n<h2 id=\"sso-vs-login---understanding-the-difference\" style=\"position:relative;\"><a href=\"#sso-vs-login---understanding-the-difference\" aria-label=\"sso vs login   understanding the difference permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SSO vs. Login - Understanding the Difference</h2>\n<p>While both authentication mechanisms are widely used for securely and seamlessly authenticating users, many differences can help better understand their core functionality. </p>\n<p>To learn more about the Social Login vs. SSO - concept, differences, and techniques, check out the infographic created by LoginRadius.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 459.38461538461536%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social-login-sso\"\n        title=\"social-login-sso\"\n        src=\"/static/defe8e479919e1128141d8cfed2029d4/e5715/social-login-sso.png\"\n        srcset=\"/static/defe8e479919e1128141d8cfed2029d4/a6d36/social-login-sso.png 650w,\n/static/defe8e479919e1128141d8cfed2029d4/e5715/social-login-sso.png 768w,\n/static/defe8e479919e1128141d8cfed2029d4/7a4b2/social-login-sso.png 1240w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"implementing-social-login-and-sso-with-loginradius-ciam\" style=\"position:relative;\"><a href=\"#implementing-social-login-and-sso-with-loginradius-ciam\" aria-label=\"implementing social login and sso with loginradius ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Social Login and SSO with LoginRadius CIAM</h2>\n<p>LoginRadius' cloud-based CIAM offers endless possibilities to businesses seeking digital transformation by adopting cutting-edge authentication techniques, including social login and SSO. </p>\n<p>With <a href=\"https://www.loginradius.com/social-login/\">LoginRadius’ social login</a> and <a href=\"https://www.loginradius.com/single-sign-on/\">SSO</a>, businesses can quickly bridge the gap between users and brands since the leading CIAM offers world-class security and a rich consumer experience that increases user engagement, retention rates, and conversion. </p>\n<p>If you wish to witness the future of CIAM and how it works for your business, schedule a free personalized demo today! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius-banner\"\n        title=\"book-a-demo-loginradius-banner\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 31, 2022","updated_date":null,"title":"SSO vs. Social Login: What’s the Difference? [Infographic]","tags":["sso","social login","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3888888888888888,"src":"/static/c1e91fba5af538f6c6d72cff947c5e57/33aa5/sso-social-login.jpg","srcSet":"/static/c1e91fba5af538f6c6d72cff947c5e57/f836f/sso-social-login.jpg 200w,\n/static/c1e91fba5af538f6c6d72cff947c5e57/2244e/sso-social-login.jpg 400w,\n/static/c1e91fba5af538f6c6d72cff947c5e57/33aa5/sso-social-login.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/social-media-privacy-threats-2022/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Privacy is a growing concern for many private board users. While there is no such thing as “complete privacy” or “true anonymity” — especially in a digital world where websites and social platforms keep track of what we do online — there is plenty you can do to protect your personal data and secure your important privates accounts against unlawful entry and theft.</p>\n<p>Unfortunately, though, security risks are becoming more prevalent on social media and other digital platforms. From the scammers that are trying to <a href=\"https://www.loginradius.com/blog/identity/stop-scammers-getting-email-address/\">get a hold of your email address</a> to the social media trackers, identity theft, and automated bots, there’s a very real chance that someone is trying to steal your data on social media.</p>\n<p>Now, if you are a business leader, it is imperative that you’re able to protect all business and consumer data that might be passing through your social media accounts. That said, it’s equally important to leverage the cybersecurity best practices to educate your employees and your audience on how they can <a href=\"https://www.loginradius.com/blog/identity/what-is-identity-security/\">protect their data and identities online</a>.</p>\n<p>Let’s take a look at most pressing social media privacy threats and what you can do to minimize risk.</p>\n<h3 id=\"ads-and-popups-that-know-too-much\" style=\"position:relative;\"><a href=\"#ads-and-popups-that-know-too-much\" aria-label=\"ads and popups that know too much permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Ads and popups that know too much</h3>\n<p>Advertisers are pouring a lot of money into their ad campaigns on social media, so it’s only natural that they should want to target their ideal customers as accurately as possible. Social networks like Facebook and Instagram provide specialized advertisement tools, solutions, and dashboards that allow marketers to maximize their advertising dollars as much as possible.</p>\n<p>This kind of hyper-targeting has its benefits and drawbacks, of course. For one, customers are increasingly using ad blockers to counteract intrusive ads and popups. The same goes for the mobile audience, as customers are encouraged more and more to use an <a rel=\"nofollow\" href=\"https://adlock.com/adlock-for-android/\"> ad blocker </a> for android or a similar solution for iOS devices to prevent intrusive ads from popping up on every website.</p>\n<p>This doesn’t mean that you shouldn’t invest in social media ads, but you need to keep in mind that running too many campaigns can backfire easily. If your chosen social networks are increasingly mining data to boost your ad campaigns, it’s important that you educate your audience on how they can opt out of third-party cookies and protect their data.</p>\n<p>Yes, it is important to target the right people, but you don’t want your ads to turn your followers against you - after all, people don’t like ads that seem to “know” too much.</p>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-social-login-rec\"\n        title=\"WP-social-login-rec\"\n        src=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-social-login-rec.png\"\n        srcset=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/a6d36/WP-social-login-rec.png 650w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-social-login-rec.png 768w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/81501/WP-social-login-rec.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"identity-theft-and-impersonation\" style=\"position:relative;\"><a href=\"#identity-theft-and-impersonation\" aria-label=\"identity theft and impersonation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity theft and impersonation</h3>\n<p>Another very real privacy threat on social media nowadays is identity theft and impersonation. Securing consumer identity is paramount for modern businesses, and that also means educating your audience on how to stay safe online and <a href=\"https://www.loginradius.com/blog/identity/identity-theft-frauds/\">avoid identity theft</a>. This is especially important for companies operating in high-risk industries where identity theft or impersonation might be a more common occurrence.</p>\n<p>If you don’t have a reason to educate your audience, then you should focus on educating your employees on how to protect themselves on social platforms - in order to protect your business. For example, someone might try to steal their image to impersonate them, either for personal purposes or with malicious intent, which can lead to data breaches.</p>\n<p>Make sure to help your employees avoid identity theft by boosting their social media security, leveraging safe logins, and educating them on phishing scams, suspicious links, and more.</p>\n<p>By the way, bad actors can steal your company’s product photos as well in an attempt to impersonate your brand. This related theft often violates copyright laws, so it benefits you to learn about the rules for <a rel=\"nofollow\" href=\"https://cherrydeck.com/blog/2021/08/27/copyrights-is-it-legal-to-take-photos-from-the-internet/\"> taking photos from the internet </a>. You want to protect your brand as well as your customers and employees. </p>\n<h3 id=\"unsecure-logins-via-social-media\" style=\"position:relative;\"><a href=\"#unsecure-logins-via-social-media\" aria-label=\"unsecure logins via social media permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Unsecure logins via social media</h3>\n<p>Nowadays, many websites allow you to log in or create an account simply by connecting your social media account, which is convenient, but it can create various security risks. What companies can do here to keep their customers safe and offer a seamless experience is to use a tool like <a href=\"https://www.loginradius.com/social-login/\">social Login</a> to provide a safe login with a social media ID. This will also allow you to seamlessly gather profile data without exposing the user to any risk.</p>\n<p>Enabling users to connect with your website, app, or software solution via their social accounts is a great way to boost your social media marketing strategy as a whole, but it is imperative to do it through a unified social API in order to ensure data security and privacy protection. This also allows you to instill trust in your social followers by showing them that logging in with their social accounts is safer than ever before.</p>\n<h3 id=\"data-mining-and-ip-tracking\" style=\"position:relative;\"><a href=\"#data-mining-and-ip-tracking\" aria-label=\"data mining and ip tracking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data mining and IP tracking</h3>\n<p>Social networks are notorious for their attempts to mine data and sell it to third-party companies. Every time you create an account on a social network, you willingly relinquish some of your personal data, such as your name, address, occupation, and more. However, companies also tend to mine for more specific data, such as behavioral trends, social contacts and interactions, and various personal interests.</p>\n<p>If you want to elevate your privacy and prevent companies from tracking you around the web, you might want to secure your business with a VPN. There’s no denying that antivirus and VPNs can dramatically improve your security in the online world, and a <a href=\"https://cybernews.com/best-vpn/free-vpn-for-android/\">VPN for Android</a> or iOS can ensure your privacy while shopping, banking, and surfing online.</p>\n<p>These tools are great for companies as well as individuals, particularly on dubious social networks like Facebook that have already come under fire for their data mining and data reselling activities over the years.</p>\n<h3 id=\"bots-and-botnet-attacks\" style=\"position:relative;\"><a href=\"#bots-and-botnet-attacks\" aria-label=\"bots and botnet attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bots and botnet attacks</h3>\n<p>Bots are automated social media accounts used to spam people, send out malicious links, and perform all kinds of malicious activities. When these bots are grouped together, they become a bot network, or a botnet, which can launch DDoS attacks and enable cyber criminals to access accounts and devices.</p>\n<p>It should go without saying that this can be disastrous for your company, which is why it’s important to leverage <a href=\"https://www.loginradius.com/blog/fuel/future-customer-authentication-market-needs/\">consumer authentication</a> and other advanced security solutions to protect your employees and customers on social media. Bots and botnets will continue to operate on social networks, but you can use cybersecurity solutions and built-in security features on social media to keep your accounts safe.</p>\n<p>Make sure to:</p>\n<ul>\n<li>Use two-factor authentication</li>\n<li>Use account authentication</li>\n<li>Use strong passwords</li>\n<li>Use a social media management platform</li>\n<li>Delete old and unused accounts</li>\n<li>Conduct security audits</li>\n<li>Manage access for all employees</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Securing your sensitive data on social media and minimizing cybersecurity risks should be a top priority for companies and consumers in 2022. Make sure to keep these privacy threats in mind and use these tips to keep your business, your employees, and your customers safe in an increasingly dangerous online world.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 11, 2022","updated_date":null,"title":"5 Privacy Threats in Social Media You Should Know in 2022","tags":["social login","data security","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9047619047619047,"src":"/static/d3ec0bd2b286c3ae2683810f0098bbe2/33aa5/social-privacy.jpg","srcSet":"/static/d3ec0bd2b286c3ae2683810f0098bbe2/f836f/social-privacy.jpg 200w,\n/static/d3ec0bd2b286c3ae2683810f0098bbe2/2244e/social-privacy.jpg 400w,\n/static/d3ec0bd2b286c3ae2683810f0098bbe2/33aa5/social-privacy.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Nikola Sekulic","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/growth/4-tips-secure-frictionless-ux/"},"html":"<p>The question of online privacy and security seems to only attract attention when a major cybersecurity threat occurs. Most people don’t spend too much time considering the safety of their data – not even when shopping online. </p>\n<p>Sadly, many online stores and mobile apps also fail to take it into proper account. There’s a delicate balance they need to achieve between <a href=\"https://www.loginradius.com/blog/identity/balancing-security-cx/\">data security and user experience</a>. While one does not necessarily negatively impact the other, ensuring that both are addressed equally well can be difficult. </p>\n<p>Let’s examine this intricate relationship and its importance. Read on to learn how you can improve it on your own website and within your own product. </p>\n<h2 id=\"why-is-the-balance-important\" style=\"position:relative;\"><a href=\"#why-is-the-balance-important\" aria-label=\"why is the balance important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is the Balance Important?</h2>\n<p>Cybersecurity is now more important than ever. Cybercrime is <a href=\"https://www.packetlabs.net/cybersecurity-statistics-2021/\">expected to cost the globe $6 trillion by the end of 2021</a>. A ransomware attack occurs every 11 seconds – up from one every 40 seconds just five short years ago. That being said, it’s clear we need to rethink the way we protect our data and the data of our clients and customers. </p>\n<p>Just recently, <a href=\"https://www.reuters.com/technology/kaseya-ransomware-attack-sets-off-race-hack-service-providers-researchers-2021-08-03/\">the Kaseya ransomware attack</a> has shaken up the small business world yet again, proving that no one is safe. Apparently, cybercriminals are able to threaten your security in ways you wouldn’t previously have thought of. </p>\n<p>When it comes to user experience, we can safely say it has become the most important underrated ranking factor. Additionally, it is _the _factor that can impact your user retention rates the most. In fact, <a href=\"https://websitebuilder.org/blog/user-experience-stats/\">over 50% of internet users</a> will leave a website if: </p>\n<ul>\n<li>it doesn’t load fast enough</li>\n<li>it’s not mobile-friendly</li>\n<li>they are not able to navigate it as intuitively as they would expect</li>\n</ul>\n<p>The same rates apply to app abandonment as well. </p>\n<p><a href=\"https://skillcrush.com/blog/high-paying-remote-tech-jobs/\">UX designers are also among the highest-paid</a> on the tech marketplace, which goes to show how invaluable their role for any online business has become. </p>\n<p>As important as these two facets of online business are, they do often clash. Implementing added security measures can severely impact user experience. Likewise, trying to please a user (or providing what we think a user wants) can compromise data security. </p>\n<p>Here’s what you can do to ensure the two don’t trip each other up: </p>\n<h3 id=\"1-let-ux-and-security-teams-work-together\" style=\"position:relative;\"><a href=\"#1-let-ux-and-security-teams-work-together\" aria-label=\"1 let ux and security teams work together permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Let UX and security teams work together</h3>\n<p>During the initial product design phase, ensure that your UX design team and your security team are actually working together. Instead of having one team work on the product and then hand it over to the other, have these people in the same (virtual) room. Give them the resources they need to come up with solutions that will cater to both aspects. </p>\n<p>This approach can also help you design a better product, as the solutions will be much more organic. There will be less friction, and every element can be developed so that the user is satisfied and protected.</p>\n<p>Make sure you implement proper security measures _during _the design phase as well. You need to protect your designs and code long before it gets to the consumer. So, have your security team devise an encrypted (or at least a completely protected) way to share files. </p>\n<p>Cybercriminals can even take advantage of something as seemingly harmless as a Slack chat, using the information that has been shared to further break your product. Teach your teams about the importance of data privacy and security, and ask them to only communicate in secure ways. </p>\n<h3 id=\"2-make-use-of-social-logins\" style=\"position:relative;\"><a href=\"#2-make-use-of-social-logins\" aria-label=\"2 make use of social logins permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Make use of social logins</h3>\n<p>Users love to be able to sign in using one of their social accounts. It eliminates the hassle of registering a new account and remembering yet another password, saving overall time and effort. </p>\n<p>As they also enable you to personalize the experience a user has with your product, <a href=\"https://www.loginradius.com/social-login/\">social logins</a> seem to provide a win-win scenario. However, you need to ask yourself how safe they actually are and whether you may inadvertently be opening the door to some serious harm.</p>\n<p>If you allow users to log in with their Google, Windows, or Facebook accounts, you don’t have to worry. They’re perfectly safe, as these huge companies are on the cutting edge of data security. You can rest assured that they’re working very hard to ensure account security.</p>\n<p>The only issue that often arises is password reuse. Many users tend to come up with one good password and then use it for their most secure and their least secure accounts. When one of them is breached (and you can guess which one that is likely to be), the other one is compromised as well.</p>\n<p>All you can do is educate your users about the importance of strong, varied passwords. If you do offer social login, know that you are reaching for the most pleasant UX available. </p>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-Social-Login-rec\"\n        title=\"WP-Social-Login-rec\"\n        src=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-Social-Login-rec.png\"\n        srcset=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/a6d36/WP-Social-Login-rec.png 650w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-Social-Login-rec.png 768w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/81501/WP-Social-Login-rec.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-make-use-of-single-sign-on\" style=\"position:relative;\"><a href=\"#3-make-use-of-single-sign-on\" aria-label=\"3 make use of single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Make use of Single Sign-on</h3>\n<p>If you have more than one product and request that your users use a different account to log in everywhere, you’ll be significantly reducing the quality of their experience. It’s a hassle, to say the least, and you are likely to lose a fair share of your client base.</p>\n<p>Multiple logins also mean you will end up with incomplete data silos, and you won’t have a complete understanding of your customer’s journey. Plus, maintaining and securing these multiple accounts will only cost you more. </p>\n<p><a href=\"https://www.loginradius.com/single-sign-on/\">By providing a single sign-on</a>, you can eliminate all of these issues. You’ll both improve user experience and make data protection simpler. Consider all of your customer touchpoints, whether they’re web- or app-based, and ensure one account is all they need to access your products or services. </p>\n<h3 id=\"4-implement-frequent-testing\" style=\"position:relative;\"><a href=\"#4-implement-frequent-testing\" aria-label=\"4 implement frequent testing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Implement frequent testing</h3>\n<p>Finally, to ensure both your UX and your security are as they should be, you need to implement frequent usability and security testing. Building it right once does not mean you won’t need to tweak, improve, and upgrade – so regularly scheduled testing is simply mandatory. </p>\n<p>Start by coming up with a <a href=\"https://www.optimalworkshop.com/learn/101s/usability-testing/\">detailed usability testing plan and checklist</a>. The steps you map out will ensure each test targets the same aspects of UX and that you can measure and track results over longer periods of time. </p>\n<p>You can also outsource security testing, as it makes uncovering a potential threat more likely. Those who have worked on implementing initial security protocols aren’t always able to uncover any potential risks, so a fresh pair of eyes can do the trick. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>By striking the right balance between UX and security, you can provide a product that consumers trust and enjoy using. If, on the other hand, you compromise one for the other, customer churn is a more likely scenario. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 24, 2021","updated_date":null,"title":"How to Blend Security with Frictionless User Experience","tags":["data security","social login","cybersecurity","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/06951ab1ef4916d0cab7ff614d758260/14b42/ux-cover.jpg","srcSet":"/static/06951ab1ef4916d0cab7ff614d758260/f836f/ux-cover.jpg 200w,\n/static/06951ab1ef4916d0cab7ff614d758260/2244e/ux-cover.jpg 400w,\n/static/06951ab1ef4916d0cab7ff614d758260/14b42/ux-cover.jpg 800w,\n/static/06951ab1ef4916d0cab7ff614d758260/16310/ux-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Shivangini Yadav","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/growth/advantage-social-login-as-marketer/"},"html":"<p>The goal of any digital business is to boost its conversion rates and increase sales. However, with the plethora of authentication tools available, it is not easy to select one.  <a href=\"https://www.loginradius.com/social-login/\">Social login</a> is one of the most common and preferred ways to achieve the target. It simplifies the login process for the user which directly results in boosted conversion rate. </p>\n<h2 id=\"what-is-social-login\" style=\"position:relative;\"><a href=\"#what-is-social-login\" aria-label=\"what is social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Social Login?</h2>\n<p>Social login is an authentication process that uses social networks to authenticate a user on the website. It is designed for making user registration easier, faster, and more efficient.  Social login can provide enterprises with new ways to deepen relationships with their customers, improve conversion rates, reduce abandonments, etc.</p>\n<p>Social login is good for your business because it saves the trouble of registering every single time your customer wants to utilize your digital property. </p>\n<h2 id=\"5-ways-how-social-login-boosts-conversion-rates\" style=\"position:relative;\"><a href=\"#5-ways-how-social-login-boosts-conversion-rates\" aria-label=\"5 ways how social login boosts conversion rates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Ways How Social Login Boosts Conversion Rates</h2>\n<p>Users look at social login as a simple and quick way to log in to a website. However, marketers must notice how successful organizations have been implementing it to maximize their sales conversion rates at every step of the <a href=\"https://www.loginradius.com/blog/fuel/consumer-journey-from-sign-up-to-purchase/\">customer journey</a>. </p>\n<p>The companies pull the user information to create a wholesome experience for the user. Thus, the notifications are more personalized and attractive to the users. Below are a few reasons as to what attracts the customers to social login:</p>\n<ol>\n<li><strong>It quickens the process of signing up for the website:</strong> Implementation of social login makes the registration and login process fast. It can lower the time from around two minutes to around two seconds. As brand managers, you will notice the impact on your sign-up conversion rate for the website.</li>\n<li><strong>It enables the usage of social media functionalities.</strong> Social login enables users to like, share, comment, subscribe, play online games, and much more without having to create an account or waste time by typing their login credentials over and over again.</li>\n<li><strong>It doesn't force the users to create a new password:</strong> The process utilizes the information of social media accounts of the users. Thus, they have one less password to remember. It is something they might appreciate and hence visit the website more frequently.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-social-login-rec\"\n        title=\"WP-social-login-rec\"\n        src=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-social-login-rec.png\"\n        srcset=\"/static/f7be1d9898f76d7c7aec73a1e5df1b7f/a6d36/WP-social-login-rec.png 650w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/e5715/WP-social-login-rec.png 768w,\n/static/f7be1d9898f76d7c7aec73a1e5df1b7f/81501/WP-social-login-rec.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ol start=\"4\">\n<li>\n<p><strong>It results in fewer unsuccessful logins:</strong> The users only need to click on the social media account they want to log in with. Thus, they will not have the scope of making mistakes while entering their login credentials. </p>\n<p>The feature might prove to be the most helpful for smartphone users. The reason is that sometimes it might be uncomfortable to type in info while you are traveling or are outside. Thus, you minimize the chance of losing customers<a href=\"https://www.loginradius.com/blog/identity/best-practices-choosing-good-security-questions/\"> who have forgotten their password</a> or choose not to log in as it would be inconvenient to type at the moment.</p>\n</li>\n<li><strong>You can expand your database and personalize your services</strong>: With the help of <strong>social login</strong>, you can get access to valuable data about the customer's preferences. Thus, you can personalize the content you share with them.</li>\n</ol>\n<p>The easier and more convenient it is for a user to log in to a website, the higher your conversion chances. Thus, as a marketer, you should be aware of how to utilize social login to improve the conversion rates for your company. Once you get the email IDs of the users, you can use them to send prospective customers push and email notifications as well.</p>\n<h2 id=\"how-to-drive-3x-engagement-with-push-and-email-notifications\" style=\"position:relative;\"><a href=\"#how-to-drive-3x-engagement-with-push-and-email-notifications\" aria-label=\"how to drive 3x engagement with push and email notifications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Drive 3X Engagement With Push and Email Notifications</h2>\n<p>The users who have enabled push notifications usually have approx three times the engagement rate than those who disabled the push notification. Thus, the push on mobile or email notifications plays a good role in engagement and re-engagement. </p>\n<p>What is the role of push notifications in our lives? There are many benefits that make it so popular. It keeps you in the know of what’s happening on your social media, or the latest offers on your eCommerce application. </p>\n<p>For example, you get a notification when someone likes or comments on your Facebook post or Instagram feed or when you get mentioned on Twitter. </p>\n<p>A significant impact of these notifications can be created when they engage inactive users too. </p>\n<h2 id=\"how-can-marketers-make-use-of-personalized-emails-to-boost-sales\" style=\"position:relative;\"><a href=\"#how-can-marketers-make-use-of-personalized-emails-to-boost-sales\" aria-label=\"how can marketers make use of personalized emails to boost sales permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How can Marketers Make Use of Personalized Emails to Boost Sales?</h2>\n<p>Marketers can use personalized emails to <a href=\"https://www.loginradius.com/blog/fuel/customer-relationship-business/\">build relationships with customers</a>. You can provide an engaging environment to the users by presenting notifications based on the knowledge of the relevant connections of the user. These notifications will let the users go back to the app again and reactivate. </p>\n<p>Thus, if used properly, <strong>social logins</strong> can boost conversion rates like no other authentication tool. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 12, 2021","updated_date":null,"title":"Can Social Login Boost Conversion Rates? 5 Things Marketers Should Know","tags":["social login","cx","data privacy"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.941747572815534,"src":"/static/3884b20ce59ecdd0e8d9b0ebde60e117/14b42/social-login-marketer.jpg","srcSet":"/static/3884b20ce59ecdd0e8d9b0ebde60e117/f836f/social-login-marketer.jpg 200w,\n/static/3884b20ce59ecdd0e8d9b0ebde60e117/2244e/social-login-marketer.jpg 400w,\n/static/3884b20ce59ecdd0e8d9b0ebde60e117/14b42/social-login-marketer.jpg 800w,\n/static/3884b20ce59ecdd0e8d9b0ebde60e117/16310/social-login-marketer.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/growth/authentication-tools-boost-sales/"},"html":"<p>The e-commerce industry is seeing a trend: it's getting harder and harder to convert first-time visitors into paying customers. Such a problem is not new and it’s high time you should have an effective solution to induce online sales. </p>\n<p>When talking about conversion optimization, the key priority is to discover any factors influencing the difficulty for users to complete the conversion process. </p>\n<p>Authentication can help you convert sales if done right. Authentication tools provide the overall protection and security of users' assets and personal information. The investment in such tools can help improve business security and greatly reduce fraud. It also improves the efficiency and effectiveness of the business and reduces labor costs.</p>\n<p>To move ahead of cut-throat competition, below are a few <strong>authentication tools</strong> that will help you in offering a more secure login experience for your customers. </p>\n<h2 id=\"4-authentication-tools-that-every-retailer-should-know-about\" style=\"position:relative;\"><a href=\"#4-authentication-tools-that-every-retailer-should-know-about\" aria-label=\"4 authentication tools that every retailer should know about permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4 Authentication Tools that Every Retailer Should Know About</h2>\n<h3 id=\"1-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#1-multi-factor-authentication\" aria-label=\"1 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-factor authentication</a> or <strong>MFA</strong> is one of the most preferred authentication methods to increase the security of your web applications. Most customers are aware of that. </p>\n<p>However, experts believe that the MFA tool enables businesses to win more customers. Imagine yourself as one of the decision-makers in a Fortune 500 firm. As your organization has a huge brand name and reputation, you would have a lot to lose in case of a security breach. </p>\n<p>If your organization invests in security measures such as MFA, the customers would feel that that organization has the data-security as a priority. Till a decade back, MFA wasn't as popular as it is now where most leading organizations are implementing MFA as their authentication tool for security purposes. </p>\n<p>Without proving that you provide top-notch security, it might be difficult for you to win the trust of your customers. Once you have implemented MFA, you can start pitching it to your customers. The higher the coverage of MFA within the organization, the more trustworthy your brand becomes.</p>\n<h3 id=\"2-biometrics-authentication\" style=\"position:relative;\"><a href=\"#2-biometrics-authentication\" aria-label=\"2 biometrics authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Biometrics Authentication</h3>\n<p>Biometrics use human behavior or characteristics to confirm the user's identity. Performing biometric verification of customers through various channels (in-person or at the store; and remote, such as on a call or using an app) minimize the possibility of <a href=\"https://www.loginradius.com/blog/identity/identity-theft-frauds/\">identity theft</a>. </p>\n<p>Additionally, it reduces the need to create digital contracts and also the waiting time of customers. Moreso, biometrics minimizes the possibility of fraud and also the risk of impersonation for in-person channels. Other advantages include: </p>\n<ul>\n<li>A major minimization of time required to complete a process.</li>\n<li>End-to-end digitization of the consumer interaction process.</li>\n<li>More satisfactory and smooth customer experience.</li>\n<li>Storing highly confidential data and documents securely.</li>\n<li>Stricter and stronger control over access to data and various processes.</li>\n<li>Reduction of manual errors by human beings. </li>\n<li>Improvement in the customer experience at various stages of the sales lifecycle.</li>\n</ul>\n<p>As a result of the above advantages, customers are more likely to engage with your brand and be loyal to you. Additionally, with more customers, you are more likely to get more data. Proper analysis of it can lead to a further high conversion rate. </p>\n<p><a href=\"https://www.loginradius.com/resource/mobile-biometric-authentication-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-Mob-Bio-Auth\"\n        title=\"DS-Mob-Bio-Auth\"\n        src=\"/static/14db6f55eea842818c721e59969c9e8c/e5715/DS-Mob-Bio-Auth.png\"\n        srcset=\"/static/14db6f55eea842818c721e59969c9e8c/a6d36/DS-Mob-Bio-Auth.png 650w,\n/static/14db6f55eea842818c721e59969c9e8c/e5715/DS-Mob-Bio-Auth.png 768w,\n/static/14db6f55eea842818c721e59969c9e8c/81501/DS-Mob-Bio-Auth.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-social-logins\" style=\"position:relative;\"><a href=\"#3-social-logins\" aria-label=\"3 social logins permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Social Logins</h3>\n<p>Gradually, <a href=\"https://www.loginradius.com/blog/identity/what-is-social-login/\">social logins</a> are becoming one of the most preferred authentication tools for businesses. It is one of the most popular ways to drive the growth of your business and increase sales. Social logins increase the interaction with the customers. </p>\n<p>The option to collect user data using social logins can help businesses eliminate promotions that are not relevant to them. Personalization of content can go a long way in converting sales. Additionally, several users trust the security offered by social login. Thus, the combination of security and personalization can boost the conversion rates considerably.</p>\n<h3 id=\"4-passwordless-authentication\" style=\"position:relative;\"><a href=\"#4-passwordless-authentication\" aria-label=\"4 passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Passwordless Authentication</h3>\n<p>Recently, passwords have not been as effective as they were before. They have been considered inefficient in protecting a customer's confidential data. Additionally, they prove to be unintended inhibitors in terms of the user experience. Thus, it is not surprising that several organizations are exploring <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> tools as a more secure, user-friendly medium.</p>\n<p>If your business is in direct contact with the customers, you want their experience to be as smooth and hassle-free as possible. As a leader, you will not want to compromise on the security bit either. </p>\n<p>Moving away from traditional <strong>authentication tools</strong> such as standard authentication would mean adopting other tools that the users can easily use. Passwordless technologies can simplify the authentication process and protect your customers from unwarranted phishing attacks. For instance, <a href=\"https://www.loginradius.com/blog/identity/passwordless-magic-links/\">email magic links</a> can be used for applications where users don't have to log in regularly. It enables the users to enter the application with a single click. </p>\n<p>There is no doubt that using an authentication tool can improve your website's conversion rate. This is because you will protect your customers better while keeping out hackers, fraudsters and other malicious individuals. However, you should take the time to look for the best authentication solutions in the market today. <a href=\"https://www.loginradius.com/contact-sales\">Contact us</a> for more information on how we can help! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 08, 2021","updated_date":null,"title":"Can Authentication Convert Sales? 4 Authentication Tools for Every Retailer","tags":["biometric authentication","social login","passwordless authentication"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.1052631578947367,"src":"/static/cd4fb7075642ac410da6eae7d9489273/14b42/auth-tools.jpg","srcSet":"/static/cd4fb7075642ac410da6eae7d9489273/f836f/auth-tools.jpg 200w,\n/static/cd4fb7075642ac410da6eae7d9489273/2244e/auth-tools.jpg 400w,\n/static/cd4fb7075642ac410da6eae7d9489273/14b42/auth-tools.jpg 800w,\n/static/cd4fb7075642ac410da6eae7d9489273/16310/auth-tools.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/google-one-tap-login/"},"html":"<h1 id=\"all-about-google-one-tap-loginexplained\" style=\"position:relative;\"><a href=\"#all-about-google-one-tap-loginexplained\" aria-label=\"all about google one tap loginexplained permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>All About Google One Tap Login—Explained!</h1>\n<p>Google has recently launched a new secure, frictionless, easy to implement sign-up and sign-in experience by exposing the \"googleyolo\" API in Google IO 2k18. It comes with more security features to authorize consumers with more control. </p>\n<p>The beta version was launched in 2018, and after a lot of feedback and deliberations, Google finally decided to launch its stable version so developers can implement it using HTML/JS.</p>\n<p>What is Google One Tap Login </p>\n<p>Google One Tap is a new feature that allows users to create an account or log in to the website with a single click. It is also known as <strong>YOLO (You Only Login Once)</strong>.</p>\n<p>The login widget appears as a popup, and it will prompt the users to sign in or sign up with the existing Google account when any of these conditions are true:</p>\n<ul>\n<li>You are logged in to your Gmail account,</li>\n<li>You've signed in to your Chrome browser.</li>\n</ul>\n<p><img src=\"https://apidocs.lrcontent.com/images/google-onetap_2382160c344fde5f388.16537804.jpg\" alt=\"google one tap login\" title=\"google one tap login\"></p>\n<p>At first glance, it seems like a convenient feature: you click the web widget and sign in to a site with your existing Google account. There is no need to create a new user, no need to remember the email and password you used to log in before. Just click on a button, and you are good to go.</p>\n<h2 id=\"how-does-it-work\" style=\"position:relative;\"><a href=\"#how-does-it-work\" aria-label=\"how does it work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does It Work</h2>\n<p>A JavaScript library is included on your website. HTML or JavaScript is used to customize the look and feel of the personalized button and, on one tap, control the automatic sign-in and sign-out behaviors.</p>\n<p>The Users who are signing in for the first time are prompted for consent to share their Google Account profile information. After providing the consent, a <a href=\"https://www.loginradius.com/blog/engineering/jwt/\">JSON Web Token</a> (JWT) credential containing the user's name, email, and profile picture is shared using a callback handler. </p>\n<p>Now you can create a new account on your platform or allow the verified user to continue using your site. If the user is already signed in on a Google device, a personalized button will appear; otherwise, a default button will appear.</p>\n<h2 id=\"benefits-of-google-one-tap-login\" style=\"position:relative;\"><a href=\"#benefits-of-google-one-tap-login\" aria-label=\"benefits of google one tap login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Google One Tap Login</h2>\n<p>The benefits can be massive, especially for businesses that struggle with engagement. Customers skip a tedious registration process, <a href=\"https://www.loginradius.com/customer-experience-solutions/\">get a more customized experience</a>, and at the same time create more opportunities for site owners to engage with them through different marketing channels.</p>\n<h2 id=\"use-cases\" style=\"position:relative;\"><a href=\"#use-cases\" aria-label=\"use cases permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Use cases</h2>\n<p>Some of the main reasons to add <strong>Sign In With Google</strong> to your site are:</p>\n<ul>\n<li>Add a visibly trusted and secure Sign In With Google button to an account creation or settings page.</li>\n<li>Pre-populate new accounts with consensually shared data from a Google Account profile.</li>\n<li>Sign in once to a Google Account without re-entering usernames or passwords on other sites.</li>\n<li>On return visits, sign in automatically or with one click across an entire site.</li>\n<li>Use verified Google Accounts to protect comments, voting, or forms from abuse while allowing anonymity.</li>\n</ul>\n<h2 id=\"how-one-tap-makes-the-android-sign-in-process-easy\" style=\"position:relative;\"><a href=\"#how-one-tap-makes-the-android-sign-in-process-easy\" aria-label=\"how one tap makes the android sign in process easy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How One Tap Makes the Android Sign-in Process Easy</h2>\n<p>The consumers will have a better experience using their favorite apps, or websites, as they will have a seamless authentication with Google's One Tap sign-in and sign-up APIs.</p>\n<p>One Tap sign-up prompts consumers to register for an account using a dialog that conforms to the app's content. </p>\n<p>So, consumers do not feel that they are doing the sign-up process. Once they are finished, they get an account that does not require a password and their Google Account protects it.</p>\n<p>Consumers will remain signed in with One Tap, even after switching devices or apps. The consumers will not only sign-up on Android faster, but they can also sign back in with just one click, using the account they are already registered with. </p>\n<p>Hence, they <a href=\"https://www.loginradius.com/blog/identity/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">no longer need to memorize passwords</a> or usernames they use for their account.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this blog, we have learned how the Google one-tap login can be helpful for consumers and how it could remove the efforts required to create an account and simplify the login process. We have also covered how Google one tap works, and it gives a better experience to Android consumers.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 11, 2021","updated_date":null,"title":"All About Google One Tap Login—Explained!","tags":["social login"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8181818181818181,"src":"/static/916e3264a89d4071fbd3e41301a30804/14b42/google-onetaplogin-cover.jpg","srcSet":"/static/916e3264a89d4071fbd3e41301a30804/f836f/google-onetaplogin-cover.jpg 200w,\n/static/916e3264a89d4071fbd3e41301a30804/2244e/google-onetaplogin-cover.jpg 400w,\n/static/916e3264a89d4071fbd3e41301a30804/14b42/google-onetaplogin-cover.jpg 800w,\n/static/916e3264a89d4071fbd3e41301a30804/47498/google-onetaplogin-cover.jpg 1200w,\n/static/916e3264a89d4071fbd3e41301a30804/6da7e/google-onetaplogin-cover.jpg 1437w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Manish Tiwari","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/social-authentication/"},"html":"<p>Did you know adding social login to your website can drastically enhance engagement and bump-up registrations?</p>\n<p>If you’re a business with an online platform that has a significant amount of traffic but unable to generate a good amount of leads, you probably need to rework your website’s authentication process.</p>\n<p>Yes, nobody wishes to squander their precious time when it comes to registrations on a website. Or we can say, no one wants to juggle separate passwords and ids for different platforms.</p>\n<p>Social login enables users to use existing login credentials from a social networking platform including Facebook, Google, Twitter, and more enabling simplified logins and registrations.</p>\n<p>Let’s learn how LoginRadius’ social authentication helps to scale business growth and how to implement social login.</p>\n<h2 id=\"why-social-login\" style=\"position:relative;\"><a href=\"#why-social-login\" aria-label=\"why social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Social Login?</h2>\n<p>While social login bypasses the conventional registration forms that eventually eat up a lot of time, it also builds credibility on an online service provider that is not asking for your details in a single go.</p>\n<p>Moreover, another hurdle for businesses seeking business growth through online platforms is the overall security of user data while the information is being collected, stored, and retrieved.</p>\n<p>One needs to follow the necessary compliances while collecting PII to ensure that the data is securely collected and managed.</p>\n<p>Apart from this, maintaining compliance with enhanced user experience is yet another uphill battle for businesses, especially when all it takes is a couple of seconds to decide whether you have a lead or an increase in the bounce rate of the site.</p>\n<p>Here’s the place where you need a smart and efficient social login in place.</p>\n<p>LoginRadius’ social authentication not only offers compliance to international privacy and data security regulations but eventually provides a smooth login experience.</p>\n<p>Users can quickly sign up for a platform in just a couple of seconds through LoginRadius’ social authentication solution.</p>\n<h2 id=\"why-loginradius-social-login\" style=\"position:relative;\"><a href=\"#why-loginradius-social-login\" aria-label=\"why loginradius social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why LoginRadius Social Login?</h2>\n<p>LoginRadius is the leading <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">consumer identity and access management (CIAM) </a>solution provider that has woven a trust among global clients ranging from startups to Fortune 500 enterprises.</p>\n<p>Our social authentication solution is helping diverse businesses securely manage millions of identities along and offering quick sign-ups without hampering user experience.</p>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social-login-wp\"\n        title=\"social-login-wp\"\n        src=\"/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-wp.png\"\n        srcset=\"/static/bf408b3bda215542fe05da49cb06b853/a6d36/social-login-wp.png 650w,\n/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-wp.png 768w,\n/static/bf408b3bda215542fe05da49cb06b853/63ff0/social-login-wp.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Let’s learn why LoginRadius is the one-stop-solution for your online platform:</p>\n<p><strong>1. Endless Connection Options - One Unified Social API</strong></p>\n<p>With LoginRadius, businesses can enjoy the benefits of social login and experience seamless connectivity with our unified social API.</p>\n<p>Our social authentication solution flawlessly combines the APIs of over 40 social networks that create a unified social API fully equipped to handle all the specific features of these platforms.</p>\n<p>This not only saves the time and efforts of the developers while they learn each network’s API but ultimately delivers a smooth implementation experience.</p>\n<p><strong>2. Maintenance - Free Solution</strong></p>\n<p>Since every social media platform keeps on rolling updates in their APIs, LoginRadius ensures every API is up-to-date.</p>\n<p>This enhances security and ensures that our clients and their consumers need not worry regarding any issues.</p>\n<p>LoginRadius’ social authentication is completely maintenance-free.</p>\n<p><strong>3. More than Just Login - A Wealth of First-Party Consumer Data</strong></p>\n<p>Enhance your marketing reach with complete access to your consumers’ social profile data that also includes verified email addresses, their interests, contacts, and much more.</p>\n<p>With LoginRadius’ <a href=\"https://www.loginradius.com/blog/identity/2021/02/social-login-infographic/\">social login</a>, you get endless marketing opportunities through which you can convert your visitors into buyers by leveraging real-time data with behavior analysis.</p>\n<p>Moreover, the data is collected from the user after their consent and you can have access to their contacts, addresses, interests, likes, and much more.</p>\n<p>Here’s the list of social profile data points that you can access through LoginRadius’ advanced social login platform.  </p>\n<p><strong>4. Easy to Manage Admin Console</strong></p>\n<p>LoginRadius not only offers the finest user experience to your clients while they sign-up but eventually delivers rich experience to the site owners through an intuitive admin console.</p>\n<p>With LoginRadius Admin Console, you get a single dashboard for social login, data gathering, and other social permissions. You can quickly set configurations through the dashboard and make changes including, but not limited to:</p>\n<p>· Add/remove social ID providers</p>\n<p>· Configure social ID</p>\n<p>· Choose which social data to gather from social networks</p>\n<p>· Quickly enable profile access and permissions</p>\n<p>· Set token expiration for each social id</p>\n<p><strong>5.Native Mobile Support and Responsive Apps</strong>   </p>\n<p>LoginRadius works harmoniously with mobile platforms and integrates natively. The smart login solution quickly detects consumer’s mobile app and authenticates without the need for any social credentials.</p>\n<p>This enables users to quickly sign-up for your application without the hassle of entering credentials for their social profiles.  </p>\n<p><strong>Final Thoughts</strong></p>\n<p>While social login inches towards the verge of becoming an industry standard for <a href=\"https://www.loginradius.com/blog/identity/2020/12/login-security/\">secure and quick login</a>, businesses need to understand its true potential in improving business growth.</p>\n<p>LoginRadius’ social authentication, driven by cutting-edge technology and backed by the highest level of security ensures clients get a seamless user experience that further improves conversion rate.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 07, 2021","updated_date":null,"title":"Implementing Effective Social Authentication Solution with LoginRadius","tags":["social authentication","social login","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/63597f5ae5a331ddd6f0bdcc93b52fa6/14b42/social-authentication-cover.jpg","srcSet":"/static/63597f5ae5a331ddd6f0bdcc93b52fa6/f836f/social-authentication-cover.jpg 200w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/2244e/social-authentication-cover.jpg 400w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/14b42/social-authentication-cover.jpg 800w,\n/static/63597f5ae5a331ddd6f0bdcc93b52fa6/16310/social-authentication-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/growth/instagram-vs-facebook-which-one-is-better-for-your-business-in-2021/"},"html":"<p>Social media presence is a necessity for digital businesses in this era, especially when the global average <a href=\"https://www.statista.com/statistics/433871/daily-social-media-usage-worldwide/\">daily social media usage amounts to 145 minutes</a>.</p>\n<p>While <a href=\"https://www.entrepreneur.com/article/366240\">97% of marketers use social media</a> for building brand image; businesses need to quickly understand the importance and role of social media marketing in 2021 and beyond.</p>\n<p>Now let’s just talk about the two social media giants-Facebook and Instagram as most of the time marketers aren’t sure which one to rely on.</p>\n<p>It doesn’t matter whether you’re a startup or an entrepreneur who just stepped into the market, or an enterprise, you must quickly put your best foot forward to decide &#x26; learn facts about both, Instagram vs. Facebook marketing.</p>\n<p>Both of these platforms are powerful and influential with endless opportunities to engage with potential clients and build a brand image.</p>\n<p>So, let’s take a quick look at both of these platforms and learn the differences and advantages so that you can understand where to focus attention.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Social Login\"\n        title=\"Social Login\"\n        src=\"/static/f2945ee3c14ddb03e7f77a5db0f15b1f/e5715/Product-Social-Login.png\"\n        srcset=\"/static/f2945ee3c14ddb03e7f77a5db0f15b1f/a6d36/Product-Social-Login.png 650w,\n/static/f2945ee3c14ddb03e7f77a5db0f15b1f/e5715/Product-Social-Login.png 768w,\n/static/f2945ee3c14ddb03e7f77a5db0f15b1f/63ff0/Product-Social-Login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"instagram-vs-facebook-audience-demographics\" style=\"position:relative;\"><a href=\"#instagram-vs-facebook-audience-demographics\" aria-label=\"instagram vs facebook audience demographics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Instagram vs. Facebook: Audience Demographics</h2>\n<p>While Instagram clutches a younger base with a majority of users under 30, businesses striving to target teenagers and younger populations can leverage this social media platform to the fullest.</p>\n<p>It has been seen that the younger generation, especially teenagers, are inching towards new platforms that not only offer them out-of-the-box ways to socialize but eventually make them addicted to a particular functionality.</p>\n<p>On the other hand, Facebook doesn’t disappoint either. With an audience base of young, adults, and the elderly, Facebook can help businesses target the ones with higher incomes in the diverse parts of the globe.</p>\n<p>This can be quite advantageous for brands that are targeting people regardless of their age, profession, and other demographics.</p>\n<p>Apart from this, marketers are leveraging <a href=\"https://www.loginradius.com/social-login/\">social logins to get more specific consumer data</a> that can be further utilized to send personalized content to enhance lead generation.</p>\n<h2 id=\"instagram-vs-facebook-functionality\" style=\"position:relative;\"><a href=\"#instagram-vs-facebook-functionality\" aria-label=\"instagram vs facebook functionality permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Instagram vs. Facebook: Functionality</h2>\n<p>It’s essential to first understand how both of these platforms function. Besides the fact that Instagram is exclusively for video/image sharing, there’s a lot more to discuss.</p>\n<p>Talking about Facebook, which is quite an informational platform, you may always find things about individuals, complete information about businesses, business history, and probably about upcoming events.</p>\n<p>Moreover, any person can easily get an idea about the services offered by a business, its operational hours, and contact details in a single place.</p>\n<p>This is perhaps the reason why it takes a lot more time to create an account on Facebook when compared with <a href=\"https://www.loginradius.com/authenticate/angular/instagram/\">Instagram</a>.</p>\n<p>So what do we learn here?</p>\n<p>Both Instagram and Facebook serve different purposes. People find you on Instagram and follow your business account to get engaged with a brand. While Facebook enables a lot more informational or somehow professional platform that can cater to a large number of audiences with different expectations.</p>\n<p>People who use Instagram are well-versed with the fact that they’ll get limited but crisp information that they need in a couple of seconds, which somehow isn’t in the case of <a href=\"https://www.loginradius.com/blog/engineering/login-with-facebook/\">Facebook</a>.</p>\n<p>Your audience logs in to Facebook to watch videos, stories, new posts, and you can expect they can be engaged in playing games as well.</p>\n<h2 id=\"instagram-vs-facebook-brand-engagement\" style=\"position:relative;\"><a href=\"#instagram-vs-facebook-brand-engagement\" aria-label=\"instagram vs facebook brand engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Instagram vs. Facebook: Brand Engagement</h2>\n<p>With Facebook having millions of business pages and billions of people, it’s undoubtedly a great platform to market your business.</p>\n<p>But besides what it seems, only a few users engage with a brand regularly. This small proportion of the audience leaves comments and even asks questions related to the product and services.</p>\n<p>Now, when we look at Instagram, the numbers are slightly higher as compared to Facebook. The engagement and communication rate of consumers is quite bigger.</p>\n<p>Although you may be thinking and would have already believed that Instagram has higher brand engagement; things aren’t like that.</p>\n<p>As per stats, Facebook has <a href=\"https://www.statista.com/statistics/346167/facebook-global-dau/\">1.85 billion daily active users (DAU)</a> as of the 2020 fourth quarter report. Surprising, isn’t it? Yet most of the engagement is derived from videos.</p>\n<p>Again, don’t just underestimate Instagram yet. Instagram has almost similar stats and the key reason behind engagement is through images.</p>\n<p>The idea is crisp, if you wish to share a video for engagement, you can rely on <a href=\"https://www.visme.co/ad-maker/\">Facebook Ads</a>. On the other hand, the same goes for Instagram Ads in the case of images. But again, it entirely depends on your industry and targeted audience.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Social media platforms help you understand what your targeted audience really needs and as a marketer, one can analyze user behavior through these platforms.</p>\n<p>When it comes to choosing between Facebook and Instagram, both platforms have their own importance in engaging relevant audiences.</p>\n<p>We can’t say Facebook > Instagram or vice-versa. It’s just the fact that as a marketer, one needs to understand its audience and their behavior. This will help in building a winning social media marketing strategy.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 28, 2021","updated_date":null,"title":"Instagram vs Facebook – Which One is Better for Your Business in 2021?","tags":["social media","social login","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/9cfbe5cfe9932f12a73466e667aa3660/14b42/Facebook-Instagram.jpg","srcSet":"/static/9cfbe5cfe9932f12a73466e667aa3660/f836f/Facebook-Instagram.jpg 200w,\n/static/9cfbe5cfe9932f12a73466e667aa3660/2244e/Facebook-Instagram.jpg 400w,\n/static/9cfbe5cfe9932f12a73466e667aa3660/14b42/Facebook-Instagram.jpg 800w,\n/static/9cfbe5cfe9932f12a73466e667aa3660/7e27d/Facebook-Instagram.jpg 848w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/social-login-infographic/"},"html":"<p>Social login allows consumers to authenticate with their existing login information from a social network provider like Facebook, or Google. It means the consumer can simply sign into a third party website without having to create a new account for the website. </p>\n<p>Social login simplifies registration and login for consumers. For this primary reason, social login is gaining popularity among ecommerce brands and retailers looking to turn visitors into buying customers. </p>\n<p>By allowing users to register and verify themselves with a simple click through their existing social media profile eliminates the need for long registration forms, and password recovery. </p>\n<p>Infact, 70.69% of 18-25 year-olds prefer social login in the LoginRadius' <a href=\"https://www.loginradius.com/resource/digital-identity-trends-2020/\">Consumer Identity Trend Report 2020</a>. </p>\n<h2 id=\"how-does-social-login-work\" style=\"position:relative;\"><a href=\"#how-does-social-login-work\" aria-label=\"how does social login work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Social Login Work</h2>\n<p>You don't need to do a lot for work to implement social login. Here's how it works. </p>\n<p><strong>Step 1:</strong> The consumer chooses the desired social network provider upon entering an application.</p>\n<p><strong>Step 2:</strong> A login request is sent to the social network provider.</p>\n<p><strong>Step 3</strong>: The consumer gets access to the app once the social provider confirms the identity.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social-login-datasheet\"\n        title=\"social-login-datasheet\"\n        src=\"/static/f2945ee3c14ddb03e7f77a5db0f15b1f/e5715/social-login-datasheet.png\"\n        srcset=\"/static/f2945ee3c14ddb03e7f77a5db0f15b1f/a6d36/social-login-datasheet.png 650w,\n/static/f2945ee3c14ddb03e7f77a5db0f15b1f/e5715/social-login-datasheet.png 768w,\n/static/f2945ee3c14ddb03e7f77a5db0f15b1f/63ff0/social-login-datasheet.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"benefits-of-social-login\" style=\"position:relative;\"><a href=\"#benefits-of-social-login\" aria-label=\"benefits of social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Social Login</h2>\n<p><strong>Easy registration</strong>: Social login offers simplified, quick and easy registration. It provides the convenience to consumers to register in a single click mitigating the time-consuming process of creating a new account. </p>\n<p><strong>Increases consumer sign-up</strong>: Since social login offers hassle-free registration, there is a higher possibility of successful sign-up. Also, it induces <a href=\"https://www.loginradius.com/blog/fuel/2020/05/customer-experience-retail-industry/\">enhanced consumer experience</a> on a platform. </p>\n<p><strong>Reduces cart abandonment</strong>: Online shoppers often need to go through mandatory registration during checkout. With social login, it is easier to ensure that consumers are logging in with a single click, leading to reduced cart abandonment. </p>\n<p><strong>Reduces bounce rate</strong>: It is one of the best options for people who <a href=\"https://www.loginradius.com/blog/identity/2021/01/user-onboarding-revamp-application/\">hate filling up the registration form</a>. These consumers do not think twice before exiting from a website. Implementing social login can reduce bounce rate and increase the average site time simultaneously. </p>\n<p><strong>Fewer login fails</strong>: When consumers do not need to remember usernames and passwords, there is a lesser possibility of login fails. </p>\n<p>To learn more about Social login – how it works and advantages, check out the infographic created by LoginRadius.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 353.84615384615387%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social-login-infographic\"\n        title=\"social-login-infographic\"\n        src=\"/static/e060422f711bb6532f0737ddc86029bb/e5715/social-login-infographic.png\"\n        srcset=\"/static/e060422f711bb6532f0737ddc86029bb/a6d36/social-login-infographic.png 650w,\n/static/e060422f711bb6532f0737ddc86029bb/e5715/social-login-infographic.png 768w,\n/static/e060422f711bb6532f0737ddc86029bb/4fa52/social-login-infographic.png 1241w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 24, 2021","updated_date":null,"title":"Why Do Consumers Prefer Social Login [Infographic]","tags":["ciam","social login","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/baed9f5b86cca0f315ea6cc2d120aff3/14b42/social-login.jpg","srcSet":"/static/baed9f5b86cca0f315ea6cc2d120aff3/f836f/social-login.jpg 200w,\n/static/baed9f5b86cca0f315ea6cc2d120aff3/2244e/social-login.jpg 400w,\n/static/baed9f5b86cca0f315ea6cc2d120aff3/14b42/social-login.jpg 800w,\n/static/baed9f5b86cca0f315ea6cc2d120aff3/16310/social-login.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/what-is-social-login/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Social login, also termed as social sign-in or social sign-on, allows your consumers to login and register with a single click on a website or mobile application using their existing accounts from various social providers. It simplifies the sign-in and <a href=\"https://www.loginradius.com/authentication/\">registration experiences</a>, providing a convenient alternative method to create an account where it is mandatory.</p>\n<ul>\n<li>For consumers, social login is a single-click login method for accessing the website and mobile application—one that there is no need for excess credentials and allows consumers to skip traditional registration methods.</li>\n<li>Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization.</li>\n</ul>\n<h2 id=\"how-does-social-login-work\" style=\"position:relative;\"><a href=\"#how-does-social-login-work\" aria-label=\"how does social login work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Social Login Work?</h2>\n<p>You may be thinking about how does social login work? Well, social login is a quick and convenient way for users to log into websites using their existing social media accounts. Instead of creating a new account on the website, users can simply click a button to sign in with their Facebook, Google, or other social media account.</p>\n<p>When a user clicks on the social login button, the website will redirect the user to the chosen social media platform's login page. After the user logs in, the social media platform sends back the user's data to the website. This data can include the user's name, email address, profile picture, and any other information the user has authorized the website to access. Let’s understand more about  login with social media and its aspects. </p>\n<h2 id=\"how-do-popular-social-login-platforms-compare\" style=\"position:relative;\"><a href=\"#how-do-popular-social-login-platforms-compare\" aria-label=\"how do popular social login platforms compare permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do Popular Social Login Platforms Compare?</h2>\n<p>Some of the most popular social login platforms include Facebook, Google, Twitter, LinkedIn, and Microsoft. Each platform has its own strengths and weaknesses.</p>\n<p>Facebook is the most popular social login platform, with over 2 billion active users worldwide. It provides a wide range of user data, including the user's name, email address, profile picture, and interests.</p>\n<p>Google is also a popular social login platform, with over 1 billion active users. It provides similar data to Facebook, but also allows users to log in with their Google+ account.</p>\n<p>For detailed information about the login preferences, you can <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">download</a> our <strong>Consumer Digital Identity Trend Report 2022.</strong></p>\n<p>Twitter is popular among younger users, but it provides less user data than Facebook or Google. LinkedIn is popular among professionals, and it provides more detailed professional information about the user.</p>\n<h2 id=\"why-should-businesses-use-social-login\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-social-login\" aria-label=\"why should businesses use social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Use Social Login?</h2>\n<p>Social login and registration provide benefits in various ways:</p>\n<ul>\n<li>Log in via a third-party web page or Facebook or Google accounts can be done with just a few clicks on the button. This is a much faster way to access the sites and mobile applications than filling out the complete registration form as in traditional login.</li>\n<li>Social login reduces the effort to remember passwords, which means people don’t need to create and keep track of more credentials, lessening password fatigue and login failure.</li>\n</ul>\n<p><a href=\"https://www.google.com/url?q=https://www.loginradius.com/resource/loginradius-single-sign-on/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"sso\"\n        title=\"sso\"\n        src=\"/static/7458970eb16da6d73777c9db1781c155/e5715/sso.png\"\n        srcset=\"/static/7458970eb16da6d73777c9db1781c155/a6d36/sso.png 650w,\n/static/7458970eb16da6d73777c9db1781c155/e5715/sso.png 768w,\n/static/7458970eb16da6d73777c9db1781c155/63ff0/sso.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li>Consumers feel more comfortable sharing the data via the social platform on which they already have trust compared to unknown sites. Social login provides a recognizable, uniform method of account logging.</li>\n<li>Data collection can be automated. Each time a visitor logs in on the site, our APIs retrieve the consumer’s updated profile information.</li>\n</ul>\n<h2 id=\"how-is-social-login-useful-for-business\" style=\"position:relative;\"><a href=\"#how-is-social-login-useful-for-business\" aria-label=\"how is social login useful for business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Social Login Useful for Business?</h2>\n<p>By providing the <a href=\"https://www.loginradius.com/social-login/\">social login on your site</a>, consumers and visitors can experience a better UX/UI. Almost everyone is perpetually logged in on their social accounts, especially to their Facebook and Google accounts, sites, and apps (ecommerce or otherwise).</p>\n<p>The following are a few benefits of social login for businesses:</p>\n<ol>\n<li>Visitors can save time by not requiring them to create yet another profile.</li>\n<li>Increase the chances of converting leads to consumers and speed up the business/sale by doing #1.</li>\n<li>Speed up consumer service and support.</li>\n<li>Data collection of visitors and consumers can be automated to build profiles and personas.</li>\n<li>Personalize the site for visitors and run future promotions using info gathered by doing automation.</li>\n<li>Trust can be created by showing visitors and consumers reviews of your product written by their friends/family on the social network they use to log in.</li>\n<li>Increase reach, generate brand awareness, and build communities by harnessing various social platforms.</li>\n<li>Also, businesses can run loyalty and referral programs with social invites.</li>\n</ol>\n<h2 id=\"how-to-implement-social-login\" style=\"position:relative;\"><a href=\"#how-to-implement-social-login\" aria-label=\"how to implement social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Social Login?</h2>\n<p>Social Login can be implemented with the following method:</p>\n<ul>\n<li>To implement the social login with the UI’s help, you need to configure the Social Provider. For more information on this, visit : <a href=\"https://www.loginradius.com/docs/authentication/quick-start/social-login/#partconfiguration1\">Social Login Configuration</a>.</li>\n<li>If you want to implement the Social Login with the JS interface’s help, the following URL will help you: <a href=\"https://www.loginradius.com/docs/authentication/quick-start/social-login/#partdeployment4\">Deployment</a>.</li>\n</ul>\n<h2 id=\"what-are-the-benefits-of-social-login\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-social-login\" aria-label=\"what are the benefits of social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Benefits of Social Login?</h2>\n<p>There are several benefits to using social login on your website. First, it provides a convenient and quick way for users to log in without having to create a new account. This can increase conversion rates and reduce the number of abandoned carts or forms.</p>\n<p>Second, social login can help you gather more data about your users. This data can be used to personalize the user experience, send targeted marketing messages, and <a href=\"https://www.loginradius.com/blog/growth/how-customer-retention-can-help-businesses-grow/\">improve customer retention</a>.</p>\n<p>Third, when we talk about social security login, social login can increase the security of your website by reducing the number of passwords users have to remember. Users are more likely to choose weak or easy-to-guess passwords if they have to remember multiple passwords for different websites.</p>\n<h2 id=\"how-to-implement-social-login-and-is-it-worth-implementing\" style=\"position:relative;\"><a href=\"#how-to-implement-social-login-and-is-it-worth-implementing\" aria-label=\"how to implement social login and is it worth implementing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Social Login and Is It Worth Implementing?</h2>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\">Implementing social login</a> on your website is relatively easy, especially if you use a third-party service like LoginRadius. LoginRadius provides a range of social login options, including Facebook, Google, Twitter, LinkedIn, and more.</p>\n<p>To implement social login, you will need to add social login buttons to your website and integrate them with your existing login system. You may also need to make some changes to your website's privacy policy and terms of service.</p>\n<p>Whether or not social login is worth implementing depends on your website and your users. If your website is focused on e-commerce or requires users to log in frequently, social login can be a great way to increase conversion rates and improve user experience. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about applying a Social Login on consumers websites and how it will enhance businesses. This feature allows consumers to login via social providers and removes the hassle to remember new passwords for different websites. However, before implementing any functionality on a website, analyze and consider the pros and cons from every possible angle.</p>\n<p>Cheers!</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p>1.<strong>Which is the most popular social login?</strong></p>\n<p>According to the <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">Consumer Identity Trend Report 2022</a>, 26.84% of users prefer social login. And Facebook login is the most popular social login method. </p>\n<p>2.<strong>What is a social login app?</strong></p>\n<p>Social login enables you to authenticate your users on your website or application using their existing social media profiles on your website or application. The most common login using social media are from platforms, including login include Facebook, Gmail, Instagram, etc. </p>\n<p>3.<strong>What data do you get with social login?</strong></p>\n<p>Social login provides you with a deep insight into your customer behavior and preferences that helps you create personalized customer journeys and aggressive <a href=\"https://www.loginradius.com/blog/growth/advantage-social-login-as-marketer/\">marketing campaigns</a>.</p>\n<p><strong>4. Who uses social login?</strong></p>\n<p>Social login is utilized by websites and applications to allow users to log in using their existing social media accounts.</p>\n<p><strong>5.  How to do social login?</strong></p>\n<p>Users can perform social login by clicking on the respective social media button on the website or application's login page and following the authentication prompts provided by the chosen social media platform.</p>\n<p><strong>6. How to use Facebook for social login?</strong></p>\n<p>Facebook login can be integrated with your website or mobile application for seamless login by using the <a href=\"https://www.loginradius.com/social-login/\">LoginRadius CIAM</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 28, 2020","updated_date":null,"title":"What is Social Login?","tags":["social login","identity verification","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0f72c20c3978105eb6bcabdc4e0e06d3/33aa5/social-login.jpg","srcSet":"/static/0f72c20c3978105eb6bcabdc4e0e06d3/f836f/social-login.jpg 200w,\n/static/0f72c20c3978105eb6bcabdc4e0e06d3/2244e/social-login.jpg 400w,\n/static/0f72c20c3978105eb6bcabdc4e0e06d3/33aa5/social-login.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vaibhav Jain","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/reconsidering-social-login-security-privacy-angle/"},"html":"<p><strong>Login methods may come and go, but customer identity is here to stay.</strong></p>\n<p>In the aftermath of two massive data exposures at Facebook and Google+ that were amplified by social login, I want to talk about the implications for B2C enterprises.</p>\n<p>Are the privacy and security risks of <a href=\"https://www.loginradius.com/social-login/\">social login</a> still worth the convenience? And what steps should companies take to protect customer data and maintain public trust?</p>\n<p>Let’s start with some history.</p>\n<h2 id=\"social-login-has-been-around-for-about-a-decade\" style=\"position:relative;\"><a href=\"#social-login-has-been-around-for-about-a-decade\" aria-label=\"social login has been around for about a decade permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social login has been around for about a decade.</h2>\n<p>Facebook came out with its first identity service, Facebook Connect, in 2008. Users started logging in with Twitter in 2009 and with LinkedIn in 2010. Google+ launched in 2011 and added its social login to the mix.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 47.53846153846153%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"airbnb social login 2012\"\n        title=\"airbnb social login 2012\"\n        src=\"/static/e04ffd23ea87ae34c483b1ea0fe7b6c2/e5715/airbnb_social_login_2012.png\"\n        srcset=\"/static/e04ffd23ea87ae34c483b1ea0fe7b6c2/a6d36/airbnb_social_login_2012.png 650w,\n/static/e04ffd23ea87ae34c483b1ea0fe7b6c2/e5715/airbnb_social_login_2012.png 768w,\n/static/e04ffd23ea87ae34c483b1ea0fe7b6c2/6bfd0/airbnb_social_login_2012.png 1011w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Throwback to the Airbnb login page in March 2012</strong></p>\n<p>LoginRadius got its start in 2012 by giving businesses a simple way to implement one or more social login methods on their digital properties. We saw a significant increase in sign-up rates for B2C websites with low-risk accounts that used our social login tools. Small, medium, and mid-market businesses were quick to adopt the LoginRadius solution.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 640px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.09375%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"1 Content Asset social API\"\n        title=\"1 Content Asset social API\"\n        src=\"/static/30086aa2e7bf5731fcdbf132c823b563/6af66/1-Content-Asset-social-API.png\"\n        srcset=\"/static/30086aa2e7bf5731fcdbf132c823b563/6af66/1-Content-Asset-social-API.png 640w\"\n        sizes=\"(max-width: 640px) 100vw, 640px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>LoginRadius supports 40+ social login providers</strong></p>\n<p>By 2015, social login had became a very popular login method. It appeared to be a win-win-win for all involved. Users liked the convenience, third parties liked the conversion rates and social data, and social networks liked off-site tracking for ad targeting.</p>\n<h3 id=\"but-as-more-businesses-and-customers-used-social-login-its-associated-privacy-issues-hit-the-public-consciousness\" style=\"position:relative;\"><a href=\"#but-as-more-businesses-and-customers-used-social-login-its-associated-privacy-issues-hit-the-public-consciousness\" aria-label=\"but as more businesses and customers used social login its associated privacy issues hit the public consciousness permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>But as more businesses and customers used social login, its associated privacy issues hit the public consciousness.</h3>\n<p>Customers started to notice that companies were collecting many data points from their social accounts, including check-ins, likes, and friend data. They realized that they were trading their private information to get the convenience of social login, and they weren’t happy with the trade-off.</p>\n<p><strong>So social networks started to cut back the functionality of social login.</strong> They made it more difficult to get permissions for collecting social data and publishing on users’ social accounts.</p>\n<p>Businesses in turn cut down their requests for read and publish permissions because they were harder to get and were a turnoff for customers. The Equifax breach in 2017 further sensitized businesses and users to the dangers of personal data leaks.</p>\n<p><strong>The massive scale of social data collection and third-party publishing dropped down to basic data and authentication by 2018</strong>, and social login reached an equilibrium between customer experience and respect for privacy.</p>\n<p>LoginRadius saw this shift coming. That’s why our company isn’t called SocialLoginRadius.</p>\n<h3 id=\"we-knew-that-social-login-would-never-be-sufficient-for-the-identity-needs-of-b2c-enterprises\" style=\"position:relative;\"><a href=\"#we-knew-that-social-login-would-never-be-sufficient-for-the-identity-needs-of-b2c-enterprises\" aria-label=\"we knew that social login would never be sufficient for the identity needs of b2c enterprises permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>We knew that social login would never be sufficient for the identity needs of B2C enterprises.</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 71.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"rawpixel 1062883 unsplash\"\n        title=\"rawpixel 1062883 unsplash\"\n        src=\"/static/0f0b67c8486b51fac893af4a9512ad9d/212bf/rawpixel-1062883-unsplash.jpg\"\n        srcset=\"/static/0f0b67c8486b51fac893af4a9512ad9d/6aca1/rawpixel-1062883-unsplash.jpg 650w,\n/static/0f0b67c8486b51fac893af4a9512ad9d/212bf/rawpixel-1062883-unsplash.jpg 768w,\n/static/0f0b67c8486b51fac893af4a9512ad9d/779b4/rawpixel-1062883-unsplash.jpg 3204w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>From the beginning, LoginRadius had a complete identity product roadmap that started with social login and progressed to a full customer identity platform.</strong></p>\n<p>In 2016 we launched our customer identity and access management solution with multiple login methods and the ability to integrate with any ID provider.</p>\n<p>The LoginRadius Customer Identity Platform still includes social login as an add-on, but it also has these more secure, robust, and specialized login options:</p>\n<ul>\n<li><strong>Standard Login</strong> is the traditional login process, where a user creates an account and logs in with a unique ID (email or username) and password.</li>\n<li><strong>Phone Login</strong> uses a customer's phone number as a unique ID.</li>\n<li><strong>Passwordless Login uses a customer’s email address or phone number to send them a one-time link or one-time passcode that they click to log in.</strong></li>\n<li><strong>One-Touch Login</strong> allows the user to register or log in using a generated link sent to their email address or a one-time password sent to their phone. The user does not need to be an existing user in the system. No credentials are submitted.</li>\n<li><strong>Smart Login</strong> is a login method that allows customers to log in to a device that can’t be accessed as a standard web or mobile device. It takes the authentication process for smartphone apps, smart TVs, gaming consoles, and other IoT devices and delegates the authentication process to another device that is easier and more secure for entering and managing passwords.</li>\n</ul>\n<p>Most of our current customers offer social login for ease of customer experience, but they only collect basic profile information such as name and email address.</p>\n<h3 id=\"loginradius-can-make-social-login-more-secure-for-businesses\" style=\"position:relative;\"><a href=\"#loginradius-can-make-social-login-more-secure-for-businesses\" aria-label=\"loginradius can make social login more secure for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius can make social login more secure for businesses.</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"stephen petrey 613428 unsplash\"\n        title=\"stephen petrey 613428 unsplash\"\n        src=\"/static/f2a93798280fab42b838c29745f4a94f/212bf/stephen-petrey-613428-unsplash.jpg\"\n        srcset=\"/static/f2a93798280fab42b838c29745f4a94f/6aca1/stephen-petrey-613428-unsplash.jpg 650w,\n/static/f2a93798280fab42b838c29745f4a94f/212bf/stephen-petrey-613428-unsplash.jpg 768w,\n/static/f2a93798280fab42b838c29745f4a94f/857b3/stephen-petrey-613428-unsplash.jpg 6000w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Until now, the market has mainly talked about the advantages of social login but hasn’t been as vocal about the risks. LoginRadius is taking a leadership role in advocating for social login practices that protect businesses and their customers better. Our experience facilitating social login for thousands of companies and hundreds of millions of customers over six years has given us expert insight on this login method.</p>\n<p><strong>LoginRadius strongly recommends that Fortune 1000 businesses adopt extra security and privacy measures around social login.</strong></p>\n<p>Our white paper, <a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\">Social Login Reconsidered</a>, puts forward four use cases for social login. These use cases cut the risks of illegitimate access and exposure while maintaining the ease of customer experience.</p>\n<p><a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social login reconsidered\"\n        title=\"social login reconsidered\"\n        src=\"/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-reconsidered.png\"\n        srcset=\"/static/bf408b3bda215542fe05da49cb06b853/a6d36/social-login-reconsidered.png 650w,\n/static/bf408b3bda215542fe05da49cb06b853/e5715/social-login-reconsidered.png 768w,\n/static/bf408b3bda215542fe05da49cb06b853/63ff0/social-login-reconsidered.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>The right use case for your business depends on the business model, the target audience, and the level of risk for customer accounts.</p>\n<h3 id=\"the-loginradius-mission-is-much-larger-than-a-single-login-method\" style=\"position:relative;\"><a href=\"#the-loginradius-mission-is-much-larger-than-a-single-login-method\" aria-label=\"the loginradius mission is much larger than a single login method permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The LoginRadius mission is much larger than a single login method.</h3>\n<p>Our mission is to empower businesses to provide secure, delightful experiences for their customers using the most innovative customer identity platform.</p>\n<p>And we will continue to develop and revisit our entire solution, as we have done for social login, to make sure we are fulfilling that mission.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CTA Graphics for Blogs V02 01 14 1024x310\"\n        title=\"CTA Graphics for Blogs V02 01 14 1024x310\"\n        src=\"/static/8f35aa0484e3c7f6abeab3116ff1873e/e5715/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png\"\n        srcset=\"/static/8f35aa0484e3c7f6abeab3116ff1873e/a6d36/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 650w,\n/static/8f35aa0484e3c7f6abeab3116ff1873e/e5715/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 768w,\n/static/8f35aa0484e3c7f6abeab3116ff1873e/2bef9/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 20, 2018","updated_date":null,"title":"Reconsidering Social Login from a Security and Privacy Angle","tags":["social login","data security","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/c15c0249e3d6c7f2888ec285e358c6ab/14b42/reconsidering-social-login.jpg","srcSet":"/static/c15c0249e3d6c7f2888ec285e358c6ab/f836f/reconsidering-social-login.jpg 200w,\n/static/c15c0249e3d6c7f2888ec285e358c6ab/2244e/reconsidering-social-login.jpg 400w,\n/static/c15c0249e3d6c7f2888ec285e358c6ab/14b42/reconsidering-social-login.jpg 800w,\n/static/c15c0249e3d6c7f2888ec285e358c6ab/47498/reconsidering-social-login.jpg 1200w,\n/static/c15c0249e3d6c7f2888ec285e358c6ab/37d86/reconsidering-social-login.jpg 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/customer-identity-preference-trends-q2-2016/"},"html":"<p>It’s that time of the quarter again when we get to some number crunching and put out our data for the world to analyze, think and act. It’s that time when you can think whether social login is still working and how many consumers actually use <a href=\"https://www.loginradius.com/social-login/\">social login against traditional email registration</a>. It’s that time when you evaluate customer identity preferences to understand what’s best for you.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 662px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 136%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAbCAIAAADzvTiPAAAACXBIWXMAAAsTAAALEwEAmpwYAAAGRElEQVQ4yxVVaVBTZxR9vzr90c50qh0RWQKBsNWigB21WLFU2bJSQFlCEKRqK9hWpS0USMhKQ4CAIAgi4gJYEDcshCCK7AkkbAIhGwYJBMoWJAlL0svMnTfffMtdzj33PASFp6OJDPdwDgpLc8DS/C6WOOCy0KFs57Bsd0qBWzgnMbfx6zi+TQgNhaPbBGQ4kpgoXJZtUKY9lobs9U89dr4o/X534JVKVAj1wBmuUyjbnZzvFMZxJecfpPCTiwUnk8vc4gpg0z6Y6kbORxEYjkQmeEEOkXN9E6/nPBv0TrgO7l2i85zDs21OpdsGUU/xWr9OqXEhMuD2J6HZu/AMm4B0lx/YGBLTDguJZCHosGwvSj4hrfpAdO6ek3+5xvJtcXRMVK7nhVJMDN8xgnuG+cg7sfgjHHMXib3b74+IjBoK57FTFM/zxxtIi/TdS+lUm3SqXzbXNTLdKVW39smbRIqXw9PNPbIOqbr37Uy7RPW8Y7xVpIjJrMFE8r6M5jmFZWNOc5Gltc11k3lSs5TCf0r8tTyeWi0UKQybljXDtnpu9ZecBmxy6Y26br1xa8tiuVbc9OnRq65RPMzpv13O5CDzqybJ5Kz7D6yQpNLif7oucxv2+KfebOhd37QcTygIv3a78rnYNjCj4qnIuGX5tbjJGs84llrtQeHbBFGR9Q3Lz5y6I7G5K4btNZPZYrGkFTV+Fc6e0ukfCoeUMyuw43s2n1raBIvL/Ear4Cw0kYkmsQ4lFCGLa5twlsJ/BqmqtCuL+g1hnxxC9YxowC9Eu/evxBmfJZ2c+2Dcvlbetj+pyiGCa0ViXSpsQlYN28FJJXGZD7YtFo1Ob9q21AoG7QIzBifn4OWLrglnAv3x67dwbXFt45eCxr1YBgqbZRtM9YjmIZDqnUbxruO/1wgGdSvGYaXum7i8qNSqDbOlsWPchUC//UwEuEBSq0bz5bxnn/v9iQqhAWZuFD6iXTTAGb1MAGQ4QslD42i2ARny90tTc3rPiGxUUOax+Hw0lkYvb4HUzjMeuiYUu0fnAqmtT6Yhs0sG3bJRb9weUc4/fTMm6JUfjuXF06qV2pU3g1Ngbf1KoVgxIJtdM5p/YtdZhdAcCYwDUTzfCzcQ7ZJhemFNM7+2sGqCEgCkUbWOVSGUaRYBwqUPm8vrW2C6VRNAm8x7Yo3fgdqbku+XVIboTeZ26VRd6/CrAVVzt6z+5bCgR9Y/PiPsU/SPawGn//QbQCR4adgwp5QKD6U/donkwWDAYCEtffKq5+K7/0qqhUPVLUP1r0YrBCP82q7S+u6G9rfgonNkGvzCtTdSdUz6fatAKoywa3QuOpSF+MYXBCbf9Lt08/jPN0N+qzh5qfTE5YpvLxQfjs09eq7QJybn2x+LTiSXf3f1jndUzldRPGiS9al0j7jCncizy4YJzZJ8ZhmaBDwdVc0PyrTDyvkJzeKQYg52RpQLEoVOLJuFphTWdlidykBjszBhnJ3BmJhe6n37vmv4XXPP5GuJ+qVY0TG4s5bIZl8PqAH8VxJVu0QtFMkV75dLGnqBm2TWI/+ksn0B6UhLv6qxcwJKahUroMJXEnXbgAqK3OkQDGa/csfESnB3Ou3e/giOZzTvr7udhLQH1gEZCIApHtcCsD2j06Kx9wMT2gGZdkihgx3o/4cN8+r61geTeUFv8onNs8fRveMLfeL4rqEsRxILgXxaxUowCN4ikgv65M1gvfInXbJbLyS3G/srmwerBEOQsA+F73O20DWMbU9kYSJzQOQQ2fQilNrWr+obm+kcftcuVY+9+08zr38hUu3GMT4+cmUfkWULAvR9mldyFSaCaxecCcIKPLH2T0PmV4xK7Wr3iAaIIZHNicdmQED0hm0gjGdMXiSj3i082zaEdojMO0DOsycw3WPzAWdQQgciAwHp/P5KZQLn0TlWnVck92hike/Fku+Syrxi81KrOutHFyKotdYhNA9gBYnlQGA4hXPg6xzOtQnMQOyILCs8y4VS6H2+1INEP3GhGPC0IzD3BmUGX61Mvdt1/GKJPZ6OOcMFSd5DYn2KZ1oFZh68eMsez0COptRgYq/vIxdhyAW4SyVhV8r9EwtcI3PQJJB19s4/JLncLSoH4jjg6F8E0z4jsOxC2aAHANj/rzGtmKsd35oAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CIPT Q2 2016 Report popout 600x900\"\n        title=\"CIPT Q2 2016 Report popout 600x900\"\n        src=\"/static/c814f8f7566c95e72243dbdb42a622ad/be86f/CIPT-Q2-2016-Report-popout-600x900.png\"\n        srcset=\"/static/c814f8f7566c95e72243dbdb42a622ad/a6d36/CIPT-Q2-2016-Report-popout-600x900.png 650w,\n/static/c814f8f7566c95e72243dbdb42a622ad/be86f/CIPT-Q2-2016-Report-popout-600x900.png 662w\"\n        sizes=\"(max-width: 662px) 100vw, 662px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>Why should you even worry about customer preferences? Because digital marketing starts with customer identity and ends with a great customer experience. Identity is how you connect to your customers and customer experience is how your customers feel about that connection over a period of time. Let’s think of some real world situations to elucidate this. If you have a prospective customer who is really fond of Twitter and wants to login to your website using his or her Twitter identity, but you don’t allow your end users to bring their Twitter identities, the customer is bound to be disappointed. A bad experience on the Web mostly ends in consumers bouncing off. That’s not exactly what you would want, right? </p>\n<p>But why should you care if you have world beating products and services? Well, the problem is that businesses are increasingly being transacted on the Web and the competition is too heavy. Heavy competition does exist in the real world too but consumers can easily switch companies on the Web, which is not the case in offline stores. That’s exactly why world beating products and service are not enough on the Web. Businesses need more than that. Businesses need Connected Customer Experience. Every tiny thing needs to be optimized to the tastes of your customers. Every tiny bump needs to be roadrolled for a seamless experience on your web and mobile applications.</p>\n<p>Great businesses are built on great products and great service, and a great customer experience. Having the first two doesn't mean you automatically have the third.</p>\n<p>Well, let’s get to the business end now. Like every quarter since about 13 quarters, the LoginRadius Analytics team has analyzed data from over 160,000 websites which are using <a href=\"https://www.loginradius.com/\">LoginRadius’ Customer Identity and Access Management (cIAM) platform</a>. The analysis brings out what customers in different industries and regions prefer in terms of their social identities, choice of social networks and choice of devices to register and login to various business websites. You can access this in depth analysis in Loginradius’ Customer Identity Preferences Trends report for Q2 2016 which is now available for <a href=\"https://www.loginradius.com/resource/customer-identity-preference-trends-2016/\">free download</a>. Before you download the report, let's get you a preview of what our data is saying this time.</p>\n<p>If you are expecting majority of website customers to be bringing their own social identities, you are spot on. In Q2 2016, almost 93% consumers preferred social login over traditional email registration on websites.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 300px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 73.66666666666666%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAPABQDASIAAhEBAxEB/8QAGAAAAwEBAAAAAAAAAAAAAAAAAAQFAQP/xAAWAQEBAQAAAAAAAAAAAAAAAAABAAL/2gAMAwEAAhADEAAAAbq+rTSOI4//xAAYEAEBAQEBAAAAAAAAAAAAAAACAQMAE//aAAgBAQABBQJWSZ7FrkwjnAF6jv/EABkRAQACAwAAAAAAAAAAAAAAAAEAIQMREv/aAAgBAwEBPwEcerbnRP/EABcRAAMBAAAAAAAAAAAAAAAAAAABEQL/2gAIAQIBAT8BmqRn/8QAGxAAAgIDAQAAAAAAAAAAAAAAABEBEhAhMYH/2gAIAQEABj8Cci3iYZaz8On/xAAcEAACAgIDAAAAAAAAAAAAAAAAARExEEEhYfD/2gAIAQEAAT8hY6EUCepw/PF9E9Tahj1R/9oADAMBAAIAAwAAABCzL//EABcRAQEBAQAAAAAAAAAAAAAAAAEAEWH/2gAIAQMBAT8QU8J3L//EABgRAAMBAQAAAAAAAAAAAAAAAAABESFh/9oACAECAQE/EHJFhyP/xAAdEAEBAAIBBQAAAAAAAAAAAAABEQAhMRBBcaHR/9oACAEBAAE/EHfQ6pjME9C5njo1YGKLXrNDZQAl75tTkMdvmf/Z'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Fig1.-Preferred-identity-of-customers-on-websites.-\"\n        title=\"Fig1.-Preferred-identity-of-customers-on-websites.-\"\n        src=\"/static/016b6c4123af5f7cb56a0c844b87b539/f93b5/Preferred-identity-of-customers-on-websites.jpg\"\n        srcset=\"/static/016b6c4123af5f7cb56a0c844b87b539/f93b5/Preferred-identity-of-customers-on-websites.jpg 300w\"\n        sizes=\"(max-width: 300px) 100vw, 300px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>If you are expecting Facebook to be the default choice of social identity for majority of the customers, you are right. But where you could be wrong is that majority is not very much. Only 53% customers logged in with their Facebook identities. So, who ate their share? Google, obviously. More and more people are preferring to use their Google identities to sign into websites for reasons that could be varied. The most apt, as per our understanding, is the ease of using Google identities and the fact that consumers don’t really have to worry much about their privacy while using Google identities to login on other websites. This is because most people don’t have a lot of <a href=\"https://en.wikipedia.org/wiki/Personally_identifiable_information\">Personally Identifiable Information (PII)</a> stored on their Google accounts, unlike Facebook. But, technically, this is still the minority view, though the difference between majority and minority is as thin as a straight line. Both of them together account for 98% social logins so the question of which network to provide for social login on your web or mobile applications is a no-brainer.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 300px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 73.66666666666666%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAPABQDASIAAhEBAxEB/8QAFwAAAwEAAAAAAAAAAAAAAAAAAAMFBP/EABYBAQEBAAAAAAAAAAAAAAAAAAIAAf/aAAwDAQACEAMQAAABu5mTkbAky//EABkQAAMBAQEAAAAAAAAAAAAAAAACEwESEf/aAAgBAQABBQLd8LJ0UQmvdUP/xAAYEQACAwAAAAAAAAAAAAAAAAAAEgECEf/aAAgBAwEBPwFq4NB//8QAFhEBAQEAAAAAAAAAAAAAAAAAAQAR/9oACAECAQE/AQdsb//EABoQAAICAwAAAAAAAAAAAAAAAAARATEQIjL/2gAIAQEABj8CE5xZ3qWf/8QAHhAAAgIABwAAAAAAAAAAAAAAAREAIRAxQXGBofD/2gAIAQEAAT8hqbqLE7CnpgT59ISCV4Fz1E//2gAMAwEAAgADAAAAEGsv/8QAGREAAgMBAAAAAAAAAAAAAAAAAREAIWHB/9oACAEDAQE/ECwXdLs3E//EABgRAAIDAAAAAAAAAAAAAAAAAAABESFh/9oACAECAQE/EGklUZH/xAAdEAACAgIDAQAAAAAAAAAAAAABEQAhMVEQQdGh/9oACAEBAAE/EBMIJYZbMcIo7uO2Fdn5C9RLQqNrH2WkZAo38n//2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Fig2.-Customers’-social-identity-preferences-for-Social-Login\"\n        title=\"Fig2.-Customers’-social-identity-preferences-for-Social-Login\"\n        src=\"/static/9f25bc2d32fe515e3f9a6fcb26f25bb3/f93b5/social-identity-preferences.jpg\"\n        srcset=\"/static/9f25bc2d32fe515e3f9a6fcb26f25bb3/f93b5/social-identity-preferences.jpg 300w\"\n        sizes=\"(max-width: 300px) 100vw, 300px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Social networks are not the only things that matter. People’s devices, too, play a role important enough not to be ignored. Once again in Q2 2016, majority of web browser based social login was from websites leading to the same inference as earlier that if you are targeting consumers on their mobile phones, get a mobile app for your business instead of optimizing your website for mobile.</p>\n<p>As far as social sharing is concerned, it seems Facebook is scoring where it needs to. Though its usage as a social identity reduced in Q2 2016, content sharing on Facebook increased giving credence to the theory proposed here.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 300px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 82%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Fig21.-Social-sharing-patterns-on-major-social-networks.\"\n        title=\"Fig21.-Social-sharing-patterns-on-major-social-networks.\"\n        src=\"/static/a8acee579708aa5bc2cacfe31610bb77/f93b5/Social-sharing-patterns-on-major-social-networks.jpg\"\n        srcset=\"/static/a8acee579708aa5bc2cacfe31610bb77/f93b5/Social-sharing-patterns-on-major-social-networks.jpg 300w\"\n        sizes=\"(max-width: 300px) 100vw, 300px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Some more critical insights you can obtain from the report are:</p>\n<ul>\n<li>In Q2 2016, males trumped females in social logging by 20%.</li>\n<li>About 18% of social logins were from Apple’s Safari Mobile browser.</li>\n<li>Just about 67% websites provide Facebook as a social login option on their website.</li>\n</ul>\n<p>Read more detailed analysis and insights in LoginRadius’ Customer Identity Preference Trends report for Q2 2016. Go ahead, <a href=\"https://www.loginradius.com/resource/customer-identity-preference-trends-2016/\">download it now</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius-banner\"\n        title=\"book-a-demo-loginradius-banner\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 16, 2016","updated_date":null,"title":"Customer Identity Preference Trends Q2 2016","tags":["customer identity management","social login","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":0.7352941176470589,"src":"/static/c814f8f7566c95e72243dbdb42a622ad/27a09/customer-identity-preference-trends-q2-2016.png","srcSet":"/static/c814f8f7566c95e72243dbdb42a622ad/69585/customer-identity-preference-trends-q2-2016.png 200w,\n/static/c814f8f7566c95e72243dbdb42a622ad/497c6/customer-identity-preference-trends-q2-2016.png 400w,\n/static/c814f8f7566c95e72243dbdb42a622ad/27a09/customer-identity-preference-trends-q2-2016.png 662w","sizes":"(max-width: 662px) 100vw, 662px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]}},"pageContext":{"tag":"social login"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}