{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/138","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"The gaming industry has been leveling up since it entered the mainstream in the 1980s. Exciting advancements in online streaming and Virtual…","fields":{"slug":"/growth/improving-customer-experience-in-the-gaming-industry/"},"html":"<p><img src=\"/1d6aa1f05216b8228a1a71fa7ed0be0e/image1.webp\"></p>\n<p>The gaming industry has been leveling up since it entered the mainstream in the 1980s. Exciting advancements in online streaming and Virtual Reality (VR) appear to lead the way. Yet, without a seamless user experience, game popularity can suffer. Here are some trends in improving customer experience that can help your gaming or streaming business win and retain more customers.</p>\n<h2 id=\"online-gaming-industry-growth\" style=\"position:relative;\"><a href=\"#online-gaming-industry-growth\" aria-label=\"online gaming industry growth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Online Gaming Industry Growth</h2>\n<p>In 2019, <a href=\"https://venturebeat.com/2020/01/02/superdata-games-hit-120-1-billion-in-2019-with-fortnite-topping-1-8-billion/\">a report by SuperData</a>, found that the gaming industry made over $120 billion dollars. And experts at <a href=\"https://newzoo.com/insights/articles/newzoo-adjusts-global-games-forecast-to-148-8-billion-slower-growth-in-console-spending-starts-sooner-than-expected/\">Newzoo</a> say the gaming market will grow to $189.6 billion by 2022. Newzoo’s report also stated that collectively, mobile and console games contribute around 80% of this revenue. In response to this demand, <a href=\"https://www.theverge.com/2019/6/19/18683382/what-is-cloud-gaming-google-stadia-microsoft-xcloud-faq-explainer\">Google and Microsoft</a> announced their own cloud gaming services. This means that <a href=\"https://www.theverge.com/2019/6/19/18683382/what-is-cloud-gaming-google-stadia-microsoft-xcloud-faq-explainer\">players can stream games</a> as easily as streaming a movie.</p>\n<h2 id=\"the-top-5-gaming-industries\" style=\"position:relative;\"><a href=\"#the-top-5-gaming-industries\" aria-label=\"the top 5 gaming industries permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Top 5 Gaming Industries</h2>\n<p>Since people of all ages and demographics play digital games, the global community is massive. <a href=\"https://www.businessinsider.com/video-game-industry-120-billion-future-innovation-2019-9\">Microsoft estimates over two billion active gamers</a> play everything from free mobile games to high-tech computer games. As new platforms, technology, and genres emerge, that figure is likely to grow. </p>\n<p><em>For now, here are some fun facts about the most popular gaming genres.</em></p>\n<p><strong>1. Gambling</strong></p>\n<p>Gambling has been a popular recreation for generations, so there’s no wonder that <a href=\"https://www.loginradius.com/blog/2020/06/online-casino-and-gambling-cyber-threat/\">online gambling is so lucrative</a>. Here are some interesting facts about the online gambling market.</p>\n<p><a href=\"https://www.prnewswire.com/news-releases/online-gambling-market-worth-102-97-billion-by-2025--cagr-11-5-grand-view-research-inc-300907362.html\">Grand View Research</a> predicts that this niche may be worth $102.97 billion by 2025.</p>\n<p>Currently, the <a href=\"https://www.egba.eu/eu-market/\">EU leads online gambling</a> and will likely continue this well into 2020. </p>\n<p>The Asia Pacific Digital Gaming market is expected to <a href=\"https://newzoo.com/insights/articles/newzoo-games-market-numbers-revenues-and-audience-2020-2023/\">reach +$241 billion</a> (due to a rise in disposable income) by 2023. </p>\n<p><strong>2. Shooter or survivor games</strong></p>\n<p>Shooter and survivor games give players a first-person point-of-view of a solider or apocalyptic survivor. Popular shooter games include Counter-Strike, Quake 4, Halo 2, and Battlefield 2. As a “build and survive” game, <a href=\"https://www.theverge.com/2019/12/5/20996849/minecraft-youtube-rewind-fortnite-grand-theft-auto-roblox-biggest-games-views\">Minecraft led video-game popularity</a> on Youtube in 2019.</p>\n<p>Gaming trivia: In 2018, <a href=\"https://www.usatoday.com/story/tech/2018/08/01/fortnite-tutors-thing-and-yes-parents-paying-them/882305002/\">some parents hired “Fortnite tutors”</a> to teach their kids to play better. Talk about helicopter parenting! </p>\n<p><strong>3. Educational games</strong></p>\n<p>Schools, universities, government agencies, and businesses support the educational gaming industry. The <a href=\"https://www.gamesindustry.biz/articles/2018-08-08-metaari-game-based-learning-market-will-reach-usd17-billion-by-2023\">Global Game-Based Learning Market report by Metaari</a> predicts that this gaming genre will hit $17 billion by 2023. </p>\n<p><strong>4. Cross-platform online games</strong> </p>\n<p>In cross-platform gaming, AKA cross-play games, players on multiple platforms and devices can get together and play at the same time. </p>\n<p>The popularity of cross-play is huge. That’s why vendors in the <a href=\"https://www.digitaltrends.com/gaming/what-is-cloud-gaming-explained/\">cloud-based gaming marketplace</a> are making games compatible on all platforms, including smartphones, PCs, laptops, and tablets. Some popular cross-play games include Call of Duty: Modern Warfare (Xbox One, PS4, PC), Minecraft (Xbox One, Switch, PC, mobile), and Fortnite (Xbox One, PS4, Switch, PC, mobile).</p>\n<p><strong>5. Virtual reality games</strong> </p>\n<p><a href=\"https://www.forbes.com/sites/bernardmarr/2019/07/19/the-important-difference-between-virtual-reality-augmented-reality-and-mixed-reality/#15d83bad35d3\">Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR)</a> are making exciting strides in gaming technology. In fact, <a href=\"https://www.polarismarketresearch.com/industry-analysis/virtual-reality-vr-in-gaming-market\">Polaris Market Research</a> predicts that VR in the gaming industry will become a $48.2 billion-dollar market by 2026. </p>\n<h2 id=\"improving-customer-experience-in-the-gaming-industry\" style=\"position:relative;\"><a href=\"#improving-customer-experience-in-the-gaming-industry\" aria-label=\"improving customer experience in the gaming industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improving Customer Experience in the Gaming Industry  </h2>\n<p>There’s no denying that gamers expect frictionless gameplay. That’s why in 2020, digital customer experience is vital to a game's popularity. </p>\n<p><em>Here are the top things to consider when improving a gamer's user experience:</em></p>\n<p><strong>Gamers expect 100% uptime.</strong> </p>\n<p>When a game crashes, it ruins the overall momentum of the game. Players know they can switch to a competitor anytime they want—and <em>they will</em>. Don’t assume they’ll return to your games once they find a better experience elsewhere.</p>\n<p>Here’s how to prevent that from happening. Look for cloud-based CIAM solutions like LoginRadius that offer <a href=\"https://www.loginradius.com/engineering/failover-systems-and-loginradius-99-99-uptime/\">automated failover systems</a> and a scalable infrastructure that handles surges. This will ensure that your game is available even during peak loads. </p>\n<p><img src=\"/f73e934336d4012e95a7103375606cea/image2.webp\"></p>\n<p><strong>Gamers exchange opinions on gaming forums.</strong> </p>\n<p>As the gaming industry continues <a href=\"https://www.forbes.com/sites/ilkerkoksal/2019/11/08/video-gaming-industry--its-revenue-shift/\">to grow</a>, it’s important to engage with your customers. A good way to increase engagement is to be present in various forums so that you can solve their technical queries.</p>\n<p>In case you can’t be there to solve them, reward forum members who provide answers to other gamers for you. </p>\n<p><strong>Gaming is an emotional experience.</strong></p>\n<p>Due to the emotional aspects of gaming, players see gaming as not just a product, but an experience. They forge friendships around gaming and often enjoy connecting to players around the world. In fact, a gaming trend called \"<a href=\"https://www.researchgate.net/publication/228294342_PC_bang_Inc_The_Culture_and_Business_of_PC_bangs_in_Korea\">PC Bangs</a>\" (translation: PC Rooms) gives gamers a dedicated gaming room. Many other countries are also jumping on the “gaming bar” trend, which also includes eSports cafes. </p>\n<p>Whether you own one of these gaming bars, or the games the guests are playing, you’ll want to keep players happy with great customer support. </p>\n<p><strong>Gamers are willing to pay more for a great experience.</strong></p>\n<p>In short, the more invested the player is in the experience, the more upset they’ll be if the experience is subpar. That’s why most gamers are willing to pay more for a great user experience, better support, and top-notch security. </p>\n<h2 id=\"making-data-security-a-priority-in-the-gaming-industry\" style=\"position:relative;\"><a href=\"#making-data-security-a-priority-in-the-gaming-industry\" aria-label=\"making data security a priority in the gaming industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Making Data Security a Priority in the Gaming Industry</h2>\n<p>Compared to TV, music, and film, the gaming industry is becoming one of the biggest industries in digital entertainment. In order to play their favorite games, players trust gaming companies with their personal information. </p>\n<p>That’s why data security should be taken seriously. Here are the most common gaming security issues and how to remedy them.</p>\n<ul>\n<li><strong>Weak authentication:</strong> An average gamer needs to manage multiple accounts for multiple games. This means that players must remember multiple passwords for all of these games. As a result, they end up with weaker passwords or reusing the same password for multiple accounts. This, of course, makes hacking a gamer’s account “child’s play.”</li>\n</ul>\n<p>To protect gamer accounts cybersecurity measures like <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multi-factor authentication</a> (MFA), password management, and firewalls should be applied. </p>\n<ul>\n<li><strong>Phishing</strong>: Phishing campaigns have been used to hack gamers. Hackers will set up a fake login page and send malicious links. Falling prey will result in a takeover of the player’s account or stealing possessions of a character. </li>\n</ul>\n<p>To protect players, educate them about phishing. Prevent account takeovers by using Risk-based Authentication (RBA). This detects unusual IPs or behavioral anomalies so you can block fake users from accessing accounts.</p>\n<ul>\n<li><strong>Child identity theft</strong>: Kids tend to be more <a href=\"https://www.lifelock.com/learn-identity-theft-resources-teens-risk-identity-theft.html\">vulnerable to identity theft</a> for numerous reasons. This makes the gaming industry a hunting ground for security abuse. Gaming companies can <a href=\"https://www.loginradius.com/role-management/\">leverage role management</a> to manage access, giving guardians the right to limit a child’s access.</li>\n</ul>\n<p>Customer Identity and Access Management (CIAM) platform LoginRadius offers <a href=\"https://www.loginradius.com/integrations/age-verification/\">out-of-the-box compliance</a> for COPPA, CCPA, and GDPR. This prevents any user under the age of 13, as indicated by the date of birth, from completing registration. </p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion </h3>\n<p>No matter what platform or game, players demand a seamless experience with no downtime. With a CIAM solution from LoginRadius, you don’t have to compromise security to provide it. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=improving-customer-experience-in-the-gaming-industry\"><img src=\"/1bebf239d110701b9b534d7eb481a5ac/BD-Plexicon1-1024x310-1.webp\" alt=\"BD-Plexicon1-1024x310-1\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 27, 2020","updated_date":null,"description":"In order to prosper in the gaming industry, you need to offer a smooth user interface. Learn how it is possible to use emerging technologies to draw and retain more clients.","title":"Improving Customer Experience in the Gaming Industry","tags":["data security","mfa","cx","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/e4060e876c9792f088e29757f041c689/7f8e9/gaming-industry.webp","srcSet":"/static/e4060e876c9792f088e29757f041c689/61e93/gaming-industry.webp 200w,\n/static/e4060e876c9792f088e29757f041c689/1f5c5/gaming-industry.webp 400w,\n/static/e4060e876c9792f088e29757f041c689/7f8e9/gaming-industry.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Identity as a Service (IDaaS) can be a game-changer for your business—but only if you know how to play it right.  Speaking of which, the…","fields":{"slug":"/identity/identity-as-a-service-for-business/"},"html":"<p>Identity as a Service (IDaaS) can be a game-changer for your business—but only if you know how to play it right. </p>\n<p>Speaking of which, the term identity refers to characteristics that make an entity recognizable. Likewise, <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">digital identity refers</a> to attributes that identify people, organizations, or other entities online.</p>\n<p>With more and more businesses migrating to the cloud, the demand for <a href=\"https://www.loginradius.com/authentication/\">seamless authentication of digital identities</a> has reached a critical point.</p>\n<p>Experts predict a massive change in the way enterprises handle <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) within the next decade. </p>\n<p>By 2022, Identity as a Service (IDaaS) solutions is expected to grow the identity and access management space to a <a href=\"https://www.gartner.com/account/signin?method=initialize&#x26;TARGET=http%253A%252F%252Fwww.gartner.com%252Fdocument%252Fcode%252F369430\">$13.42 billion property</a>. Hence, <em>now</em> is the best time to invest in a secure, highly accessible, simplified, low-risk solution like IDaaS.</p>\n<h2 id=\"what-is-identity-as-a-service-idaas\" style=\"position:relative;\"><a href=\"#what-is-identity-as-a-service-idaas\" aria-label=\"what is identity as a service idaas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity as a Service (IDAAS)? </h2>\n<p>Identity as a service (IDaaS) refers to identity and access management services that are offered through the cloud or via SaaS (software-as-a-service) systems. It offers cloud-based authentication delivered and operated by third-party providers on a subscription basis.</p>\n<p>In short, IDaaS helps manage digital identities so that the right users can access the resources that are meant for them.</p>\n<p>IDaaS is a win-win for both businesses and their customers. With modern IDaaS access features, there’s no need for end-users to remember multiple account credentials. Likewise, system administrators can reduce the number of user accounts they have to manage. </p>\n<h2 id=\"3-benefits-of-identity-as-a-service-idaas-for-developers\" style=\"position:relative;\"><a href=\"#3-benefits-of-identity-as-a-service-idaas-for-developers\" aria-label=\"3 benefits of identity as a service idaas for developers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Benefits of Identity as a Service (IDAAS) for Developers</h2>\n<p>As an application developer, you must see features like registration, authentication, and account recovery as opportunities to <a href=\"https://www.loginradius.com/customer-experience-solutions/\">better customer experiences</a>. But, that’s not it. The following are three important benefits of IDaaS for developers.</p>\n<h3 id=\"decentralization-of-identity\" style=\"position:relative;\"><a href=\"#decentralization-of-identity\" aria-label=\"decentralization of identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Decentralization of identity</h3>\n<p>IDaaS allows application developers to decentralize the user identity from the application. This leads to the following advantages for developers.</p>\n<ul>\n<li>If there is no need for the user identity information any longer, there's no point in storing it in their databases.</li>\n<li>The identity of a user does not resonate with the application, and all developers should care about is a unique identifier.</li>\n<li>The <a href=\"https://www.loginradius.com/blog/2019/06/perfect-ciam-platform/\">CIAM platform</a> will also manage the non-feature work like user CRUD, password CRUD, etc. That's another burden of the load.</li>\n</ul>\n<p>By letting an external service handle identity and authentication, developers can focus on bringing more value to the business. </p>\n<h3 id=\"idaas-is-api-based\" style=\"position:relative;\"><a href=\"#idaas-is-api-based\" aria-label=\"idaas is api based permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IDaaS is API-based </h3>\n<p>One of the core competencies of IDaaS is that they are API-first. Interestingly, most of these third parties provide on-demand expertise that would otherwise become more time-consuming and resource-heavy, if developed in-house.</p>\n<p>By leveraging APIs, developers can add them to their existing technology and save a significant amount of time.</p>\n<h3 id=\"bridge-the-gap-between-developer-and-security-teams\" style=\"position:relative;\"><a href=\"#bridge-the-gap-between-developer-and-security-teams\" aria-label=\"bridge the gap between developer and security teams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bridge the gap between developer and security teams</h3>\n<p>With developers constantly bugged to build revenue-generating apps in shorter deadlines, IDaaS allows them to get the job done quickly, and simultaneously create high quality and secure output. </p>\n<p>Furthermore, IDaaS has the potential to deliver a secure, streamlined on-demand identity expertise. Such strategies can also do a great deal to reduce internal tension and eventually bridge the gap between developers and the security workforce.</p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><img src=\"/cb344658920387aac010223f2c1d79a1/EB-Guide-to-Modern-Customer-Identity-1024x310.webp\" alt=\"Guide-to-Modern-Customer-Identity-ebook\"></a></p>\n<h2 id=\"3-benefits-of-identity-as-a-service-idaas-for-businesses\" style=\"position:relative;\"><a href=\"#3-benefits-of-identity-as-a-service-idaas-for-businesses\" aria-label=\"3 benefits of identity as a service idaas for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Benefits of Identity as a Service (IDaaS) for Businesses</h2>\n<p>A comprehensive IDaaS solution brings a plethora of benefits to the entire business environment. There's agility, security, and efficiency, to name a few. Some other advantages include:</p>\n<h3 id=\"freedom-to-choose\" style=\"position:relative;\"><a href=\"#freedom-to-choose\" aria-label=\"freedom to choose permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Freedom to choose</h3>\n<p>IDaaS allows businesses the freedom to choose the right IT resources that fit them and their customers. When they have the best tool to get their job done, that leads to better agility and increased speed. The outcome? A competitive position in the market.</p>\n<h3 id=\"increase-in-productivity\" style=\"position:relative;\"><a href=\"#increase-in-productivity\" aria-label=\"increase in productivity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Increase in productivity</h3>\n<p>IDaaS offers the liberty to businesses to manage their IT environment from a single platform. There's less scope for human error too. With a comprehensive identity solution, they can let their customers access multiple web properties with a <a href=\"https://www.loginradius.com/blog/2019/11/benefits-single-sign-on-sso/\">single set of credentials</a>. This leads to increased productivity and better security. </p>\n<h3 id=\"stronger-security\" style=\"position:relative;\"><a href=\"#stronger-security\" aria-label=\"stronger security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stronger security</h3>\n<p>A modern IDaaS solution secures identities and protects your IT environment. With features like MFA, SSO, and password complexity, businesses can control access and increase security. Needless-to-say, with identities being the epicenter of every cyberattack, identity security features such as these are instrumental in <a href=\"https://www.loginradius.com/blog/2019/12/digital-privacy-best-practices/\">safeguarding your digital properties</a>. </p>\n<h2 id=\"7-core-components-of-idaas-in-an-enterprise-environment\" style=\"position:relative;\"><a href=\"#7-core-components-of-idaas-in-an-enterprise-environment\" aria-label=\"7 core components of idaas in an enterprise environment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Core Components of IDaaS in an Enterprise Environment </h2>\n<p><img src=\"/ecda0feac4efd7080ac3429239ba4155/imgae2-1024x621.webp\"></p>\n<p>The features and functionalities of an Identity as a Service solution vary across all market segments but generally include digital identity access and management. Here are some of the most common components.</p>\n<h3 id=\"1-cloud-based-and-multi-tenant-architecture\" style=\"position:relative;\"><a href=\"#1-cloud-based-and-multi-tenant-architecture\" aria-label=\"1 cloud based and multi tenant architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Cloud-based and multi-tenant architecture</h3>\n<p>A typical IDaaS vendor will operate a <a href=\"https://www.loginradius.com/multi-tenant-cloud/\">multi-tenant service</a> delivery model. The vendor will issue updates and performance enhancement requests whenever these become available. </p>\n<h3 id=\"2-password-management-and-authentication\" style=\"position:relative;\"><a href=\"#2-password-management-and-authentication\" aria-label=\"2 password management and authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Password management and authentication</h3>\n<p>IDaaS service taps all the points of an ideal identity and access management platform. It includes maintaining features like multi-factor authentication and biometric access across all access points. </p>\n<h3 id=\"3-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#3-single-sign-on-sso\" aria-label=\"3 single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Single Sign-On (SSO)</h3>\n<p>When it comes to customer identity and access management, <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on</a> is a vital feature. </p>\n<p>SSO is designed to maximize the end-user experience while simultaneously maintaining the security of a network. With SSO, users are encouraged to use strong password combinations to access their everyday IT services. </p>\n<p>In an Identity as a service environment, SSO allows <a href=\"https://www.loginradius.com/single-sign-on/\">enterprises to secure authentication</a> for third-party services without requiring an internal IT department’s involvement.</p>\n<h3 id=\"4-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#4-multi-factor-authentication\" aria-label=\"4 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication (MFA)</a> is associated with Identity as a Service and is occasionally referred to as two-factor authentication. Using multiple factors for authentication helps prevent data breaches, making it one of the best ways to protect digital identities.</p>\n<p>Other examples of how MFA works include Google 2-Step Verification and Microsoft Authenticator. Both work on the TOTP (time-based one-time password) mechanism. </p>\n<p>Biometrics uses the \"inheritance\" as a means of verification—meaning something the user is. </p>\n<p>SMS and voice verifications are also popular multi-factor authentication methods. Iris or retina recognition, fingerprint, hand, thumbprints, full facial recognition, and DNA usage are catching up too. </p>\n<h3 id=\"5-automated-approval-workflows\" style=\"position:relative;\"><a href=\"#5-automated-approval-workflows\" aria-label=\"5 automated approval workflows permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Automated approval workflows</h3>\n<p>Identity as a Service also utilizes automated approval workflows. These workflows help IT admins to:</p>\n<ul>\n<li>Offer access privileges to multiple apps.</li>\n<li>Enforce GUI-based configuration capabilities. </li>\n<li>Manage user-account provisioning.</li>\n<li>Follow <a href=\"https://www.loginradius.com/data-governance/\">governance frameworks</a> for risk assessment.</li>\n</ul>\n<h3 id=\"6-analytics-and-intelligence\" style=\"position:relative;\"><a href=\"#6-analytics-and-intelligence\" aria-label=\"6 analytics and intelligence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Analytics and Intelligence</h3>\n<p>Using analytics and intelligence capabilities in IDaaS lets enterprises report misuse related to access privileges. This makes it easier to detect anomalies in user functions and data usage. </p>\n<h3 id=\"7-governance-and-compliance\" style=\"position:relative;\"><a href=\"#7-governance-and-compliance\" aria-label=\"7 governance and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Governance and Compliance</h3>\n<p>Enterprises can leverage the intelligence capabilities of an Identity as a Service platform to manage <a href=\"https://www.loginradius.com/blog/2020/07/data-governance-best-practices/\">governance and compliance</a>-related workflows. Real-world authentication processes can be aligned with governance policies to mitigate security risk.</p>\n<p><img src=\"/3985d0fc0e97f7f6526b5800bdf29e65/image-3-1-1024x621.webp\"></p>\n<h2 id=\"some-new-regulations-that-are-protecting-identities-include\" style=\"position:relative;\"><a href=\"#some-new-regulations-that-are-protecting-identities-include\" aria-label=\"some new regulations that are protecting identities include permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Some new regulations that are protecting identities include:</h2>\n<p><strong>1. General Data Protection Regulation (GDPR)</strong></p>\n<p>GDPR is the core of Europe's digital privacy legislation. It requires businesses to safeguard the personally identifiable information (PII) of the European Union citizens for transactions that occur within the member states. Failure to comply may cost dearly. Individual rights include: </p>\n<ul>\n<li>Right to be informed.</li>\n<li>Right of access.</li>\n<li>Right to rectification.</li>\n<li>Right to erasure.</li>\n<li>Right to restrict processing.</li>\n<li>Right to data portability.</li>\n<li>Right to object.</li>\n</ul>\n<p><strong>2. California Consumer Privacy Act (CCPA)</strong></p>\n<p>The CCPA is a state-level law that <a href=\"https://www.loginradius.com/blog/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">mandates that businesses</a> inform customers of their plan to monetize their data, and provide them with a clear means of opting out, whenever required. Any violation can lead to hefty fines. A few other requirements include:</p>\n<ul>\n<li>Businesses must disclose what information they collect.</li>\n<li>Businesses must delete customer data upon request. </li>\n<li>Customers can opt-out of their data being sold.</li>\n</ul>\n<h2 id=\"5-reasons-why-loginradius-idaas-is-the-right-fit-for-your-enterprise\" style=\"position:relative;\"><a href=\"#5-reasons-why-loginradius-idaas-is-the-right-fit-for-your-enterprise\" aria-label=\"5 reasons why loginradius idaas is the right fit for your enterprise permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Reasons Why LoginRadius IDaaS Is the Right Fit for Your Enterprise</h2>\n<p>In a world that’s swiftly migrating to the cloud, the LoginRadius IDaaS provider is positioned to <a href=\"https://www.loginradius.com/security/\">combine both security</a> and ease-of-use in solving emerging business needs for enterprise-level organizations. </p>\n<p>Here’s what LoginRadius IDaaS can do for your digital enterprise. </p>\n<h3 id=\"1-faster-implementation\" style=\"position:relative;\"><a href=\"#1-faster-implementation\" aria-label=\"1 faster implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Faster implementation</h3>\n<p>LoginRadius IDaaS implementation in the cloud is fast and straightforward. Since servers are already <a href=\"https://www.loginradius.com/identity-api/\">installed in the cloud</a>, you only need to configure your chosen platform according to your IT protocols to get it up and running.</p>\n<h3 id=\"2-easy-third-party-integrations\" style=\"position:relative;\"><a href=\"#2-easy-third-party-integrations\" aria-label=\"2 easy third party integrations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Easy third-party integrations</h3>\n<p>A cloud-based Identity as a Service platform like LoginRadius easily integrates with <a href=\"https://www.loginradius.com/cloud-integrations/\">3rd-party apps</a>. You can also add or remove any feature from your existing CIAM environment at any time, such as MFA, SSO, or <a href=\"https://www.loginradius.com/blog/2019/02/presenting-progressive-profiling-loginradius/\">Progressive Profiling</a>.</p>\n<h3 id=\"3-seamless-data-migration\" style=\"position:relative;\"><a href=\"#3-seamless-data-migration\" aria-label=\"3 seamless data migration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Seamless data migration </h3>\n<p>Transferring identity data to a new environment in the cloud may seem daunting to the uninitiated. LoginRadius provides customers with <a href=\"https://www.loginradius.com/blog/2020/07/loginradius-identity-import-manager-data-migration/\">data migration software</a>, and sets up and executes the migration for a seamless, hassle-free transfer.</p>\n<h3 id=\"4-passwordless-authentication\" style=\"position:relative;\"><a href=\"#4-passwordless-authentication\" aria-label=\"4 passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Passwordless Authentication </h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">Passwordless Authentication</a> deters cybercriminals by reducing the risk of password sprawl. With the LoginRadius IDaaS platform, you can set up secure, passwordless authentication and secure password resets.</p>\n<h3 id=\"5-no-need-for-ciam-experts\" style=\"position:relative;\"><a href=\"#5-no-need-for-ciam-experts\" aria-label=\"5 no need for ciam experts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. No need for CIAM experts</h3>\n<p>CIAM experts are an asset to any company when it comes to implementing IDaaS and securing customer identities. Luckily, onboarding a CIAM expert isn’t necessary when using Identity as a Service. With LoginRadius CIAM, we are with you every step of the way in your digital transformation.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>There is a lot of anticipation about Identity as a Service in solving real-world business problems. It is important, and no, you cannot mess it up. Because then, you will be out of business. No wonder, IDaaS has already entered the mainstream and will continue growing from here.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=identity-as-a-service-for-business\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 25, 2019","updated_date":null,"description":"Identity as a service (IDaaS) refers to services provided via the cloud or through SaaS (software-as-a-service) systems for identity and access management. It provides cloud-based authentication provided and managed on a subscription basis by third-party providers.","title":"Identity as a Service (IDAAS): Managing Digital Identities (Updated)","tags":["idaas","digital identity management","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/4545cde6890d02351eb7cdba48dbe112/7f8e9/idaas-business.webp","srcSet":"/static/4545cde6890d02351eb7cdba48dbe112/61e93/idaas-business.webp 200w,\n/static/4545cde6890d02351eb7cdba48dbe112/1f5c5/idaas-business.webp 400w,\n/static/4545cde6890d02351eb7cdba48dbe112/7f8e9/idaas-business.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"These days, businesses have an understanding of security hygiene and the risks of using insecure passwords.  Yet, the password management…","fields":{"slug":"/identity/worst-passwords-list-2019/"},"html":"<p>These days, businesses have an understanding of security hygiene and the risks of using insecure passwords. </p>\n<p>Yet, the <em>password management struggle is real</em> and it is hitting businesses <em>hard</em>. </p>\n<p>Given the fact that stolen or reused passwords are responsible for 80% of <a href=\"https://www.helpnetsecurity.com/2019/10/10/poor-password-hygiene/\">hacking-related breaches</a>, it’s high time for businesses to fix their overall security posture and step up their cybersecurity game. </p>\n<p>While more and more businesses are taking this concern seriously and are implementing security measures like password management, <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a> (MFA), and <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, it is unfortunate that people still cling to poor password habits. </p>\n<p>NordPass came up with a database of 500 million leaked passwords and ranked them based on their usage in its list of worst passwords in 2019. Keep reading for some of the worst of the bunch. </p>\n<h2 id=\"the-top-51-worst-passwords-of-2019\" style=\"position:relative;\"><a href=\"#the-top-51-worst-passwords-of-2019\" aria-label=\"the top 51 worst passwords of 2019 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Top 51 Worst Passwords of 2019</h2>\n<p>In this list, you’ll recognize some old standbys like \"123456\" and \"password\" in the top spots. But there are some unexpected ones here, too. </p>\n<p>For example, passwords like zinch and g_czechout may seem harder to crack, yet they still made it to the 7th and 8th positions, respectively.</p>\n<p>You’ll also see popular female names like Jasmine or Jennifer. Another tactic is using a string of letters that forms a pattern or a line on the keyboard. Popular examples include asdfghjkl and 1qaz2wsx. </p>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><img src=\"/0211bcf38d1a0a60f9930324cfba56e0/credential-stuffing.webp\"></a></p>\n<p>Here they all are in top ranking order.  </p>\n<table>\n<thead>\n<tr>\n<th><strong>Rank</strong></th>\n<th><strong>Password</strong></th>\n<th><strong>Count</strong></th>\n<th></th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>1</td>\n<td>12345</td>\n<td>2812220</td>\n<td></td>\n</tr>\n<tr>\n<td>2</td>\n<td>123456</td>\n<td>2485216</td>\n<td></td>\n</tr>\n<tr>\n<td>3</td>\n<td>123456789</td>\n<td>1052268</td>\n<td></td>\n</tr>\n<tr>\n<td>4</td>\n<td>test1</td>\n<td>993756</td>\n<td></td>\n</tr>\n<tr>\n<td>5</td>\n<td>password</td>\n<td>830846</td>\n<td></td>\n</tr>\n<tr>\n<td>6</td>\n<td>12345678</td>\n<td>512560</td>\n<td></td>\n</tr>\n<tr>\n<td>7</td>\n<td>zinch</td>\n<td>483443</td>\n<td></td>\n</tr>\n<tr>\n<td>8</td>\n<td>g_czechout</td>\n<td>372278</td>\n<td></td>\n</tr>\n<tr>\n<td>9</td>\n<td>asdf</td>\n<td>359520</td>\n<td></td>\n</tr>\n<tr>\n<td>10</td>\n<td>qwerty</td>\n<td>348762</td>\n<td></td>\n</tr>\n<tr>\n<td>11</td>\n<td>1234567890</td>\n<td>329341</td>\n<td></td>\n</tr>\n<tr>\n<td>12</td>\n<td>1234567</td>\n<td>261610</td>\n<td></td>\n</tr>\n<tr>\n<td>13</td>\n<td>Aa123456.</td>\n<td>212903</td>\n<td></td>\n</tr>\n<tr>\n<td>14</td>\n<td>iloveyou</td>\n<td>171657</td>\n<td></td>\n</tr>\n<tr>\n<td>15</td>\n<td>1234</td>\n<td>169683</td>\n<td></td>\n</tr>\n<tr>\n<td>16</td>\n<td>abc123</td>\n<td>150977</td>\n<td></td>\n</tr>\n<tr>\n<td>17</td>\n<td>111111</td>\n<td>148079</td>\n<td></td>\n</tr>\n<tr>\n<td>18</td>\n<td>123123</td>\n<td>145365</td>\n<td></td>\n</tr>\n<tr>\n<td>19</td>\n<td>dubsmash</td>\n<td>144104</td>\n<td></td>\n</tr>\n<tr>\n<td>20</td>\n<td>test</td>\n<td>139624</td>\n<td></td>\n</tr>\n<tr>\n<td>21</td>\n<td>princess</td>\n<td>122658</td>\n<td></td>\n</tr>\n<tr>\n<td>22</td>\n<td>122658</td>\n<td>116273</td>\n<td></td>\n</tr>\n<tr>\n<td>23</td>\n<td>sunshine</td>\n<td>107202</td>\n<td></td>\n</tr>\n<tr>\n<td>24</td>\n<td>BvtTest123</td>\n<td>106991</td>\n<td></td>\n</tr>\n<tr>\n<td>25</td>\n<td>11111</td>\n<td>104395</td>\n<td></td>\n</tr>\n<tr>\n<td>26</td>\n<td>ashley</td>\n<td>94557</td>\n<td></td>\n</tr>\n<tr>\n<td>27</td>\n<td>00000</td>\n<td>92927</td>\n<td></td>\n</tr>\n<tr>\n<td>28</td>\n<td>000000</td>\n<td>92330</td>\n<td></td>\n</tr>\n<tr>\n<td>29</td>\n<td>password1</td>\n<td>92009</td>\n<td></td>\n</tr>\n<tr>\n<td>30</td>\n<td>monkey</td>\n<td>86404</td>\n<td></td>\n</tr>\n<tr>\n<td>31</td>\n<td>livetest</td>\n<td>83677</td>\n<td></td>\n</tr>\n<tr>\n<td>32</td>\n<td>55555</td>\n<td>83004</td>\n<td></td>\n</tr>\n<tr>\n<td>33</td>\n<td>soccer</td>\n<td>80159</td>\n<td></td>\n</tr>\n<tr>\n<td>34</td>\n<td>charlie</td>\n<td>78914</td>\n<td></td>\n</tr>\n<tr>\n<td>35</td>\n<td>asdfghjkl</td>\n<td>77360</td>\n<td></td>\n</tr>\n<tr>\n<td>36</td>\n<td>654321</td>\n<td>76498</td>\n<td></td>\n</tr>\n<tr>\n<td>37</td>\n<td>family</td>\n<td>76007</td>\n<td></td>\n</tr>\n<tr>\n<td>38</td>\n<td>michael</td>\n<td>71035</td>\n<td></td>\n</tr>\n<tr>\n<td>39</td>\n<td>123321</td>\n<td>69727</td>\n<td></td>\n</tr>\n<tr>\n<td>40</td>\n<td>football</td>\n<td>68495</td>\n<td></td>\n</tr>\n<tr>\n<td>41</td>\n<td>baseball</td>\n<td>67981</td>\n<td></td>\n</tr>\n<tr>\n<td>42</td>\n<td>q1w2e3r4t5y6</td>\n<td>66586</td>\n<td></td>\n</tr>\n<tr>\n<td>43</td>\n<td>nicole</td>\n<td>64992</td>\n<td></td>\n</tr>\n<tr>\n<td>44</td>\n<td>jessica</td>\n<td>63498</td>\n<td></td>\n</tr>\n<tr>\n<td>45</td>\n<td>purple</td>\n<td>62709</td>\n<td></td>\n</tr>\n<tr>\n<td>46</td>\n<td>shadow</td>\n<td>62592</td>\n<td></td>\n</tr>\n<tr>\n<td>47</td>\n<td>hannah</td>\n<td>62394</td>\n<td></td>\n</tr>\n<tr>\n<td>48</td>\n<td>chocolate</td>\n<td>62325</td>\n<td></td>\n</tr>\n<tr>\n<td>49</td>\n<td>michelle</td>\n<td>61873</td>\n<td></td>\n</tr>\n<tr>\n<td>50</td>\n<td>daniel</td>\n<td>61643</td>\n<td></td>\n</tr>\n<tr>\n<td>51</td>\n<td>maggie</td>\n<td>61445</td>\n<td></td>\n</tr>\n</tbody>\n</table>\n<h2 id=\"why-is-password-hygiene-not-taken-seriously\" style=\"position:relative;\"><a href=\"#why-is-password-hygiene-not-taken-seriously\" aria-label=\"why is password hygiene not taken seriously permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is password hygiene not taken seriously?</h2>\n<p>Now that you've seen the worst passwords, you may want to <a href=\"https://www.loginradius.com/blog/2018/05/infographic-poor-password-hygiene-letting-cybercriminals-clean/\">improve the password hygiene</a> of your enterprise.</p>\n<p>But what if your customers don't follow good password hygiene? </p>\n<p>Unfortunately, many don't. The biggest reason is that remembering multiple passwords for multiple accounts is hard work. This leads to people using easy-to-guess passwords or recycled passwords which can lead to a domino effect of attacks on both consumers and companies. </p>\n<p>Another flawed approach is that people may think their information is insignificant, so they assume that no hacker would care about them. However, a ransomware attack can lock users out of their accounts and become quite costly.</p>\n<p><img src=\"/e9b93c8b923b38970dce3081e9a46938/image2.webp\"></p>\n<h2 id=\"how-can-you-improve-password-security\" style=\"position:relative;\"><a href=\"#how-can-you-improve-password-security\" aria-label=\"how can you improve password security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How can you improve password security?</h2>\n<p>As our worst passwords list shows, you can’t stop everyone from using bad passwords. However, you can prevent hackers from accessing passwords by using a Customer Identity and Access Management (CIAM) solution. Here’s how.</p>\n<p>An Identity Platform can help companies implement industry-standard hashing algorithms that protect passwords during transit or at rest. This is an effective way to prevent data from being exposed to hackers. </p>\n<p>With the increase in frequency and complexity of attacks, companies could also utilize additional features like two-factor authentication, risk-based authentication, and <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless login</a>.</p>\n<p>By implementing these features, companies can increase security to customer accounts that will help prevent data breaches and hacks.</p>\n<p>A CIAM solution also saves resources. Your support and development teams can devote their time to growing your business rather than responding to data breaches. </p>\n<p>Overall, bad passwords coupled with smart hackers are a big problem for  businesses. To protect your company from costly hacks and breaches, you need cybersecurity that prevents access to your sensitive data. For state-of-the-art cybersecurity and enhanced customer experience, choose a globally-certified CIAM solution like LoginRadius. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=worst-passwords-list-2019\"><img src=\"/084774eb7512c1b89a504206fda05ffc/CTA-book-demo-password-1024x310.webp\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 23, 2019","updated_date":null,"description":"Overall, a major challenge for corporations is poor passwords combined with smart hackers. You need cybersecurity that prevents access to your confidential data to protect your business from expensive hacks and breaches. Choose a globally-certified CIAM solution like LoginRadius for state-of-the-art safety and increased customer experience.","title":"The Worst Passwords of 2019","tags":["passwordless login","password management","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/cf8b7e1e5cc06a1c8074dc343cc7f342/7f8e9/worst-psswrd-list.webp","srcSet":"/static/cf8b7e1e5cc06a1c8074dc343cc7f342/61e93/worst-psswrd-list.webp 200w,\n/static/cf8b7e1e5cc06a1c8074dc343cc7f342/1f5c5/worst-psswrd-list.webp 400w,\n/static/cf8b7e1e5cc06a1c8074dc343cc7f342/7f8e9/worst-psswrd-list.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"We want to give a big thank you and shout out to Union Gospel Mission (UGM) for giving us the opportunity to give back to the community…","fields":{"slug":"/growth/christmas-spirit-of-giving/"},"html":"<p>We want to give a big thank you and shout out to <a href=\"https://www.ugm.ca/\">Union Gospel Mission (UGM)</a> for giving us the opportunity to give back to the community! </p>\n<p>The holiday season serves as a great reminder to count our blessings. Many of us are fortunate in that we know which beds we’ll be sleeping in tonight. We consider hunger as an occasional discomfort we can easily solve. For gifts, we expect beautiful, new items from malls and boutiques rather than second-hand or dollar store finds. But we shouldn’t feel guilty. Instead, let’s feel grateful for the blessings we get to enjoy.</p>\n<p>As we count our blessings, the holiday season also reminds us not to simply give, but to embrace <em>the joy of giving</em>. With the help of UGM, the team at LoginRadius got to do just that. We celebrated the holiday season by preparing gifts for the residents at one of UGM Vancouver’s housing facilities. </p>\n<p>Together, the LoginRadius team wrote Christmas cards and assembled gift bags full of goodies. Each bag had necessities <em>and</em> treats, including socks, toothbrushes, toothpaste, gloves, candies, and chocolates.</p>\n<p>As LoginRadius grows from a tech startup to an established corporation, we’re reminded that the joy of giving is year-round. We feel lucky that we can contribute to projects that help our community. In fact, some of our own team members could have benefited from organizations like UGM in the past—our own CEO grew up in a rural village without running water or electricity. </p>\n<p>Our night of preparing gifts and cards for UGM was a great way to get into the Christmas spirit. We hope you enjoy these photos and get inspired to help your local community, too.</p>\n<center>\n<p><strong>Happy holiday and New Year from everyone at LoginRadius!</strong></p>\n</center>\n<p>If you wish to join UGM in helping our most vulnerable communities, please consider giving them a <a href=\"https://www.ugm.ca/donate/?noredirect=1\">generous donation</a>.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 17, 2019","updated_date":null,"description":"We want to give the Union Gospel Mission (UGM) a huge thank you and shout out for giving us the chance to give the world back!","title":"LoginRadius Gets into the Christmas Spirit (of Giving)","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/f18a5a3da74f18941615facdf8f24952/7f8e9/christmas-spirit-of-giving.webp","srcSet":"/static/f18a5a3da74f18941615facdf8f24952/61e93/christmas-spirit-of-giving.webp 200w,\n/static/f18a5a3da74f18941615facdf8f24952/1f5c5/christmas-spirit-of-giving.webp 400w,\n/static/f18a5a3da74f18941615facdf8f24952/7f8e9/christmas-spirit-of-giving.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"It’s never too soon to plan for the future. Taking proactive steps to secure your client’s digital privacy could pay off big in 202…","fields":{"slug":"/identity/digital-privacy-best-practices/"},"html":"<p><em>It’s never too soon to plan for the future. Taking proactive steps to secure your client’s digital privacy could pay off big in 2020.</em></p>\n<p>Concerns over protecting digital data have always been at the forefront of a CIO’s mind. But when the 2017 Equifax breach struck, it brewed fresh reservations. Executives across business verticals began working even harder to secure the digital privacy of their consumers’ data. </p>\n<h2 id=\"what-is-digital-privacy\" style=\"position:relative;\"><a href=\"#what-is-digital-privacy\" aria-label=\"what is digital privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is Digital Privacy</h2>\n<p>Digital privacy is keeping consumers’ personal data private. It is the act of using a safer internet and securing other connected devices based on their perceived importance. </p>\n<p>For example, a person may not be comfortable sharing names, contact numbers or profile pictures on the internet, while another may be okay with it. Hence, digital privacy is about <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">protecting consumers' data</a> within the scope of their comfort zone.</p>\n<h2 id=\"what-do-the-experts-think-about-digital-privacy\" style=\"position:relative;\"><a href=\"#what-do-the-experts-think-about-digital-privacy\" aria-label=\"what do the experts think about digital privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Do the Experts Think About Digital Privacy</h2>\n<p>As we move towards a more data-centric economy, C-suite execs have a lot on their plates in terms of external collaboration, information sharing, and above all, protecting consumers' sensitive data. </p>\n<p>Three security experts provide advice on the best privacy practices in 2020.</p>\n<p><strong>1. David Kemp, Business Strategist with Micro Focus</strong></p>\n<p>\"Looking at the year ahead, we will see a major drive from organizations to achieve data privacy compliance,\" Kemp says, \"individuals will increasingly recognize their right to data privacy, and ability to hold businesses to account for negligence.\"</p>\n<p><strong>2. Kelvin Coleman, Executive Director at NCSA</strong></p>\n<p>“With new privacy legislation going to affect this year, digital privacy couldn’t be a more timely opportunity for helping businesses and consumers understand the importance of respecting and protecting personal information,” said <a href=\"https://twitter.com/kcolemanncsa?lang=en\">Coleman</a>.</p>\n<h2 id=\"how-important-is-online-privacy\" style=\"position:relative;\"><a href=\"#how-important-is-online-privacy\" aria-label=\"how important is online privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Important Is Online Privacy </h2>\n<p>Data is an incredibly valuable commodity today. Marketing is just one of the many ways of businesses exploiting consumer data—mostly to boost revenue and improve their market position.</p>\n<p>Simply put, data or digital privacy is a basic human right. The concept in business reflects the personally identifiable information of its employees and consumers, at large. It also includes the data (financial or research) required to operate a business. These are sensitive information and should remain confidential at all times. </p>\n<p>After the European Union enacted the <a href=\"https://www.loginradius.com/gdpr-and-privacy/\">General Data Protection Regulation (GDPR)</a>, many companies have begun exploring the role of privacy as a human right. It’s been giving a new direction to companies to develop the necessary tools and processes to collect consumer data and not exploit it. </p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><img src=\"/c62fbeba5c65dddf6f32bbac3af59099/CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.webp\" alt=\"CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance-whitepaper\"></a></p>\n<h2 id=\"5-major-threats-to-data-privacy-in-the-digital-age\" style=\"position:relative;\"><a href=\"#5-major-threats-to-data-privacy-in-the-digital-age\" aria-label=\"5 major threats to data privacy in the digital age permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Major Threats to Data Privacy in the Digital Age</h2>\n<h3 id=\"1-extremely-poor-password-hygiene\" style=\"position:relative;\"><a href=\"#1-extremely-poor-password-hygiene\" aria-label=\"1 extremely poor password hygiene permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Extremely Poor Password Hygiene</h3>\n<p>The importance of using strong passwords is never irrelevant. Inadequate <a href=\"https://www.loginradius.com/blog/2018/12/infographic-the-death-of-passwords/\">password hygiene</a> has always been the primary source of attacks like credential stuffing and account takeovers. </p>\n<p>One of the easiest ways to mitigate the uncertainty of cyber attack is by making passwords hard-to-steal and never re-using them across multiple accounts. </p>\n<p>Businesses are also going passwordless, which means consumers do not need to memorize any credentials whatsoever and use social media sign-in, PIN authentication or email verification instead to authenticate.</p>\n<h3 id=\"2-phishing-attacks\" style=\"position:relative;\"><a href=\"#2-phishing-attacks\" aria-label=\"2 phishing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Phishing Attacks</h3>\n<p><a href=\"https://www.loginradius.com/blog/phishing-for-identity/\">Phishing attacks</a> happen when cybercriminals scam consumers with fraudulent email messages and trick them into giving away sensitive data. Most of these messages seem like they are from authentic sources and no one usually questions their legitimacy.</p>\n<p>Do not click on links from suspicious email addresses, always type the target website address yourself, and never give away your personal information to anyone. Safeguarding against phishing is possible. All you need is to do is pay attention to detail. </p>\n<h3 id=\"3-inadequate-data-security-training\" style=\"position:relative;\"><a href=\"#3-inadequate-data-security-training\" aria-label=\"3 inadequate data security training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Inadequate Data Security Training</h3>\n<p>Simple cybersecurity drills for employees within organizations can go a long way in achieving digital privacy. Train them on the various data security protocols so they know how to protect consumers' sensitive data.</p>\n<p>At the end of it, they should know how to spot phishing scams, the importance of changing passwords frequently, always use encrypted emails while sending sensitive information, whom to report if their <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">credentials are stolen</a>, how to conduct security updates on their home and office devices, and the likes. </p>\n<h3 id=\"4-shoulder-surfing\" style=\"position:relative;\"><a href=\"#4-shoulder-surfing\" aria-label=\"4 shoulder surfing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Shoulder Surfing</h3>\n<p>Shoulder surfing dates back to even before when the internet was invented. In those days, thieves used to spy on user's phones as they punched numbers or fed information.</p>\n<p>Shoulder surfing, in the age of the internet, refers to the attacker peering over the user's shoulder to get information from the screen or keyboard movements. Credit card numbers, bank accounts, and credentials like user name, passwords are most susceptible to such attacks. </p>\n<h3 id=\"5-lack-of-faster-breach-response\" style=\"position:relative;\"><a href=\"#5-lack-of-faster-breach-response\" aria-label=\"5 lack of faster breach response permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Lack of faster breach response</h3>\n<p>Even if you have the best security protocols in place, a data breach can still happen. Maintaining digital privacy does not only mean that you need to protect your organization from every cyberattack, it also means preparing for the prompt response, if a breach has to happen. Many lack a faster incident response plan. </p>\n<h2 id=\"how-organisations-can-protect-their-digital-privacy\" style=\"position:relative;\"><a href=\"#how-organisations-can-protect-their-digital-privacy\" aria-label=\"how organisations can protect their digital privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Organisations Can Protect Their Digital Privacy</h2>\n<h3 id=\"1-support-leadership-buy-in\" style=\"position:relative;\"><a href=\"#1-support-leadership-buy-in\" aria-label=\"1 support leadership buy in permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Support leadership buy-in.</h3>\n<p>Protecting customer data can make or break a company, so it should be a top priority. If security isn’t considered vital when issuing departmental finances, you might not get the resources you need to protect your company.</p>\n<p>Luckily, most organizations support privacy-focused leadership buy-ins. If your company does not, remind them of the high costs of poor data management if they <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-best-practices-for-enterprises/\">fail to protect their customer identities</a>.</p>\n<h3 id=\"2-designate-one-dedicated-security-personnel\" style=\"position:relative;\"><a href=\"#2-designate-one-dedicated-security-personnel\" aria-label=\"2 designate one dedicated security personnel permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Designate one dedicated security personnel. </h3>\n<p>With security at the leadership level, companies can plan more robust organizational initiatives.</p>\n<p>Appointing one individual to manage an enterprise’s digital privacy is a sound practice. This means a C-level professional should screen for legal and <a href=\"https://www.loginradius.com/blog/2019/09/ccpa-vs-gdpr-the-compliance-war/\">compliance risks</a> that impact customer security and privacy. </p>\n<h3 id=\"3-develop-a-culture-of-security-and-privacy\" style=\"position:relative;\"><a href=\"#3-develop-a-culture-of-security-and-privacy\" aria-label=\"3 develop a culture of security and privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Develop a culture of security and privacy.</h3>\n<p>Let’s face it—many security-related incidents occur due to human negligence. With packed schedules and tight deadlines, crucial processes may sometimes go unattended. When that happens, an enterprise may suffer irreparable damage.  </p>\n<p>It’s no surprise that employees are the gatekeepers of a company’s digital privacy. One wrong move can result in severe repercussions. Hence, companies must teach employees how to adhere to security and privacy policies. It also helps to explain why certain security controls are in place. </p>\n<p>To achieve this, companies should invest in employee security training and educate different departments about the <a href=\"https://www.loginradius.com/blog/2020/04/marriott-data-breach-2020/\">impact of a data breach</a>. Let them know that one careless action can ruin the reputation of a company. In short, when people understand why certain rules are important, they’ll respect these more. </p>\n<h3 id=\"4-establish-transparent-processes-and-policies\" style=\"position:relative;\"><a href=\"#4-establish-transparent-processes-and-policies\" aria-label=\"4 establish transparent processes and policies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Establish transparent processes and policies. </h3>\n<p>No matter how perfect your framework is, it’s useless if your customers aren’t aware of your processes and policies. Make dedicated policy pages and place links to these on your site’s home page and menu bar.</p>\n<h3 id=\"5-strategize-an-incident-response-plan\" style=\"position:relative;\"><a href=\"#5-strategize-an-incident-response-plan\" aria-label=\"5 strategize an incident response plan permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Strategize an incident response plan. </h3>\n<p>Data breaches are a nightmare that companies dread. That’s why gatekeepers must prepare for it in advance. </p>\n<p>Don’t wait to draft incident policies for your customers after a data breach. With a digital privacy response plan, you can tell your customers what to do, discuss their roles, and show them how to communicate internally and externally in the event of a data breach. </p>\n<p>The ability to demonstrate Return on Mitigation (ROM) is also a critical metric to CEOs. To do this, calculate <a href=\"https://www.loginradius.com/loginradius-business-continuity-covid-19-outbreak/\">potential risks and assess</a> how much can be saved through on-time mitigation.</p>\n<p><img src=\"/26e39a8dfcb0edf605806f1e923997ec/image2-3.webp\" alt=\"digital privacy best practices\"></p>\n<h2 id=\"how-loginradius-helps-businesses-protect-consumer-data\" style=\"position:relative;\"><a href=\"#how-loginradius-helps-businesses-protect-consumer-data\" aria-label=\"how loginradius helps businesses protect consumer data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Helps Businesses Protect Consumer Data</h2>\n<p><a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">Consumer identity and access management (CIAM)</a> platform LoginRadius offers a comprehensive methodology that helps businesses to collect, store, and process consumers’ data by ensuring the highest level of protection. </p>\n<p>LoginRadius complies with major regulatory laws and privacy requirements. It helps global digital companies to conduct business by keeping consumer digital privacy and security sentiments at the forefront. </p>\n<h3 id=\"loginradius-fulfills-the-following-rights-of-the-consumers\" style=\"position:relative;\"><a href=\"#loginradius-fulfills-the-following-rights-of-the-consumers\" aria-label=\"loginradius fulfills the following rights of the consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius fulfills the following rights of the consumers.</h3>\n<ul>\n<li>The right to be informed.</li>\n<li>The right of access.</li>\n<li>The right to withdraw consent.</li>\n<li>The right to rectification.</li>\n<li>The right to be forgotten.</li>\n<li>The right to restriction of processing data.</li>\n<li>The right to deletion of inactive data. </li>\n<li>The right to protection of children's personal data.</li>\n</ul>\n<h3 id=\"overview-of-global-regulations-that-loginradius-is-compiled-with\" style=\"position:relative;\"><a href=\"#overview-of-global-regulations-that-loginradius-is-compiled-with\" aria-label=\"overview of global regulations that loginradius is compiled with permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Overview of global regulations that LoginRadius is compiled with.</h3>\n<ul>\n<li><strong>General Data Protection Regulation</strong> (GDPR): Offers data protection and privacy for all individual citizens of the European Union and the European Economic Area.</li>\n<li><strong>California Consumer Privacy Act</strong> (CCPA): focuses on the privacy <a href=\"https://www.loginradius.com/blog/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">rights of California consumers</a>.</li>\n<li><strong>US Privacy Shield</strong>: Enables US-based organizations to benefit from the adequacy determinations.</li>\n<li><strong>ISO/IEC 27018:2019</strong>:  Protects Personally Identifiable Information (PII) in the public cloud computing environment.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion </h2>\n<p>Getting your enterprise onboard with these best practices is the first step to attaining better digital privacy for your consumers. Start by setting up a data maintenance process—operational efficiencies will follow through. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=digital-privacy-best-practices\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 12, 2019","updated_date":null,"description":"Concerns over digital data security have always been at the forefront of a CIO 's mind. But it generated fresh concern when the 2017 Equifax hack struck. Here's how executives work to protect the digital privacy of consumer data across business verticals.","title":"Digital Privacy: Securing Consumer Privacy with LoginRadius","tags":["data privacy","compliance","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8181818181818181,"src":"/static/035b5c33645cd5126ea97720f0dd7048/7f8e9/digital-privacy.webp","srcSet":"/static/035b5c33645cd5126ea97720f0dd7048/61e93/digital-privacy.webp 200w,\n/static/035b5c33645cd5126ea97720f0dd7048/1f5c5/digital-privacy.webp 400w,\n/static/035b5c33645cd5126ea97720f0dd7048/7f8e9/digital-privacy.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"The official supported drivers for Mongo for Go have been officially released for several months now and is slowly seeing more usage…","fields":{"slug":"/engineering/custom-encoders-in-the-mongo-go-driver/"},"html":"<p>The official supported drivers for Mongo for Go have been officially released for several months now and is slowly seeing more usage. Although many of the features of standard Mongo drivers have been implemented within the supported driver, the documentation for a majority of the features are still in the process of being created. This post will provide some information on how to set up custom JSON encoders so you can change how BSON operators are processed whenever Mongo documents are marshalled into JSON. For this blog, a custom date and object id encoder will be created to handle the BSON operators and transform them into more easily processed JSON.</p>\n<p>This blog assumes that you have a basic understanding of Go and how to write some code in the language. If you want to follow along with the guide, you will also require a working Mongo instance, as well as your environment set up for Go.</p>\n<p>Before interacting with the database, we can set up a quick Go application that finds data from a Mongo database and outputs it. For this example, the Mongo database is set up with a collection containing documents with a name, a date and the object id. For our blog, the Mongo document that is being worked with is quite simple:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;_id&quot;</span><span class=\"mtk1\"> : </span><span class=\"mtk11\">ObjectId</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;5de6b0850f3c7b5cce642529&quot;</span><span class=\"mtk1\">),</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;Name&quot;</span><span class=\"mtk1\"> : </span><span class=\"mtk8\">&quot;dateOne&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk8\">&quot;Date&quot;</span><span class=\"mtk1\"> : </span><span class=\"mtk11\">ISODate</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;2019-04-08T11:55:02.658Z&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>A simple main function that retrieves data from Mongo and outputs the JSON string is as follows:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">func</span><span class=\"mtk1\"> </span><span class=\"mtk11\">main</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">result</span><span class=\"mtk1\"> </span><span class=\"mtk4\">struct</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\tID   primitive.ObjectID </span><span class=\"mtk8\">`bson:&quot;_id&quot;`</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\tName </span><span class=\"mtk10\">string</span><span class=\"mtk1\">             </span><span class=\"mtk8\">`bson:&quot;Name&quot;`</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\tDate primitive.DateTime </span><span class=\"mtk8\">`bson:&quot;Date&quot;`</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">ctx</span><span class=\"mtk1\">, </span><span class=\"mtk12\">cancel</span><span class=\"mtk1\"> := context.</span><span class=\"mtk11\">WithTimeout</span><span class=\"mtk1\">(context.</span><span class=\"mtk11\">Background</span><span class=\"mtk1\">(), </span><span class=\"mtk7\">10</span><span class=\"mtk1\">*time.Second)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">client</span><span class=\"mtk1\">, </span><span class=\"mtk12\">connErr</span><span class=\"mtk1\"> := mongo.</span><span class=\"mtk11\">Connect</span><span class=\"mtk1\">(ctx, options.</span><span class=\"mtk11\">Client</span><span class=\"mtk1\">().</span><span class=\"mtk11\">ApplyURI</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;&quot;</span><span class=\"mtk1\">))</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk15\">if</span><span class=\"mtk1\"> connErr != </span><span class=\"mtk4\">nil</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\tlog.</span><span class=\"mtk11\">Fatal</span><span class=\"mtk1\">(connErr)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">collection</span><span class=\"mtk1\"> := client.</span><span class=\"mtk11\">Database</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;test&quot;</span><span class=\"mtk1\">).</span><span class=\"mtk11\">Collection</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;dates&quot;</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">filter</span><span class=\"mtk1\"> := bson.M{</span><span class=\"mtk8\">&quot;Name&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;dateOne&quot;</span><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">findErr</span><span class=\"mtk1\"> := collection.</span><span class=\"mtk11\">FindOne</span><span class=\"mtk1\">(ctx, filter).</span><span class=\"mtk11\">Decode</span><span class=\"mtk1\">(&result)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk15\">if</span><span class=\"mtk1\"> findErr != </span><span class=\"mtk4\">nil</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\tlog.</span><span class=\"mtk11\">Fatal</span><span class=\"mtk1\">(findErr)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\tfmt.</span><span class=\"mtk11\">Print</span><span class=\"mtk1\">(result.Date)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">data</span><span class=\"mtk1\">, </span><span class=\"mtk12\">writeErr</span><span class=\"mtk1\"> := bson.</span><span class=\"mtk11\">MarshalExtJSON</span><span class=\"mtk1\">(result, </span><span class=\"mtk4\">false</span><span class=\"mtk1\">, </span><span class=\"mtk4\">false</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk15\">if</span><span class=\"mtk1\"> writeErr != </span><span class=\"mtk4\">nil</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\tlog.</span><span class=\"mtk11\">Fatal</span><span class=\"mtk1\">(writeErr)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\tfmt.</span><span class=\"mtk11\">Print</span><span class=\"mtk1\">(</span><span class=\"mtk11\">string</span><span class=\"mtk1\">(data))</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk11\">cancel</span><span class=\"mtk1\">()</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>The function MarshalExtJSON is a part of the bson package that is a part of the driver. It uses a default registry to define the rules when converting Mongo primitive types into JSON. The arguments it takes are the Go struct being passed in, whether the result should be returned in canonical form (For more details, check this <a href=\"https://docs.mongodb.com/manual/reference/mongodb-extended-json/%5D(https://docs.mongodb.com/manual/reference/mongodb-extended-json/)\">link</a>, and whether HTML strings are escaped.</p>\n<p>The output of this function when reading our document produces a JSON string with all the BSON operators included.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk8\">&quot;_id&quot;</span><span class=\"mtk1\">: {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\t</span><span class=\"mtk8\">&quot;$oid&quot;</span><span class=\"mtk1\">:</span><span class=\"mtk8\">&quot;5de6b0850f3c7b5cce642529&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t},</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk8\">&quot;Name&quot;</span><span class=\"mtk1\">:</span><span class=\"mtk8\">&quot;dateOne&quot;</span><span class=\"mtk1\">,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk8\">&quot;Date&quot;</span><span class=\"mtk1\">:{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\t</span><span class=\"mtk8\">&quot;$date&quot;</span><span class=\"mtk1\">:</span><span class=\"mtk8\">&quot;2019-04-08T11:55:02.658Z&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>Using custom encoders, we can change how the bson package marshals the JSON and remove all the BSON operators. The first thing to do is to define package level variables that will hold the types of the Mongo primitives that need to be changed in the JSON response. Outside the main function, include these two lines:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">tOID</span><span class=\"mtk1\"> = reflect.</span><span class=\"mtk11\">TypeOf</span><span class=\"mtk1\">(primitive.ObjectID{})</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">tDateTime</span><span class=\"mtk1\"> = reflect.</span><span class=\"mtk11\">TypeOf</span><span class=\"mtk1\">(primitive.</span><span class=\"mtk11\">DateTime</span><span class=\"mtk1\">(</span><span class=\"mtk7\">0</span><span class=\"mtk1\">))</span></span></code></pre>\n<p>Next, we can make new functions to customize how these types are handled. For the date encoding, we want to have the Date key matched with the returned date string.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">func</span><span class=\"mtk1\"> </span><span class=\"mtk11\">dateTimeEncodeValue</span><span class=\"mtk1\">(ec bsoncodec.EncodeContext, vw bsonrw.ValueWriter, val reflect.Value) </span><span class=\"mtk10\">error</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk4\">const</span><span class=\"mtk1\"> </span><span class=\"mtk12\">jDateFormat</span><span class=\"mtk1\"> = </span><span class=\"mtk8\">&quot;2006-01-02T15:04:05.999Z&quot;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk15\">if</span><span class=\"mtk1\"> !val.</span><span class=\"mtk11\">IsValid</span><span class=\"mtk1\">() || val.</span><span class=\"mtk11\">Type</span><span class=\"mtk1\">() != tDateTime {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\t</span><span class=\"mtk15\">return</span><span class=\"mtk1\"> bsoncodec.ValueEncoderError{Name: </span><span class=\"mtk8\">&quot;DateTimeEncodeValue&quot;</span><span class=\"mtk1\">, Types: []reflect.Type{tDateTime}, Received: val}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">ints</span><span class=\"mtk1\"> := val.</span><span class=\"mtk11\">Int</span><span class=\"mtk1\">()</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">t</span><span class=\"mtk1\"> := time.</span><span class=\"mtk11\">Unix</span><span class=\"mtk1\">(</span><span class=\"mtk7\">0</span><span class=\"mtk1\">, ints*</span><span class=\"mtk7\">1000000</span><span class=\"mtk1\">).</span><span class=\"mtk11\">UTC</span><span class=\"mtk1\">()</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk15\">return</span><span class=\"mtk1\"> vw.</span><span class=\"mtk11\">WriteString</span><span class=\"mtk1\">(t.</span><span class=\"mtk11\">Format</span><span class=\"mtk1\">(jdateFormat))</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>The parameters in this function are pre-defined within the driver package of the driver. This involves passing in the BSON encoding context, the value writer and the value that is being processed. The value writer and the value are the parameters that we use within our function.</p>\n<p>First, we check if the value passed in is the correct type. If there is an issue with the value, then an error is thrown during the encoding. Next, we can set the format we want our date string to appear in, and process our value into a Go Time object. After that, we can use the value writer to write the formatted date into our JSON string.</p>\n<p>Similar to the custom date encoding, the object id encoding function has the same structure.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">func</span><span class=\"mtk1\"> </span><span class=\"mtk11\">objectIDEncodeValue</span><span class=\"mtk1\">(ec bsoncodec.EncodeContext, vw bsonrw.ValueWriter, val reflect.Value) </span><span class=\"mtk10\">error</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk15\">if</span><span class=\"mtk1\"> !val.</span><span class=\"mtk11\">IsValid</span><span class=\"mtk1\">() || val.</span><span class=\"mtk11\">Type</span><span class=\"mtk1\">() != tOID {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t\t</span><span class=\"mtk15\">return</span><span class=\"mtk1\"> bsoncodec.ValueEncoderError{Name: </span><span class=\"mtk8\">&quot;ObjectIDEncodeValue&quot;</span><span class=\"mtk1\">, Types: []reflect.Type{tOID}, Received: val}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">s</span><span class=\"mtk1\"> := val.</span><span class=\"mtk11\">Interface</span><span class=\"mtk1\">().(primitive.ObjectID).</span><span class=\"mtk11\">Hex</span><span class=\"mtk1\">()</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk15\">return</span><span class=\"mtk1\"> vw.</span><span class=\"mtk11\">WriteString</span><span class=\"mtk1\">(s)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>First, we check if the type is valid, and if it is, we simply write out the object id as a hex string. To create the hex string, we first convert the value into an interface, then cast it as an object id to allow the Hex function to be called.</p>\n<p>Now that our two functions are created to handle the BSON types, we can create our custom registry.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">func</span><span class=\"mtk1\"> </span><span class=\"mtk11\">createCustomRegistry</span><span class=\"mtk1\">() *bsoncodec.RegistryBuilder {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">primitiveCodecs</span><span class=\"mtk1\"> bson.PrimitiveCodecs</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk12\">rb</span><span class=\"mtk1\"> := bsoncodec.</span><span class=\"mtk11\">NewRegistryBuilder</span><span class=\"mtk1\">()</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        bsoncodec.DefaultValueEncoders{}.</span><span class=\"mtk11\">RegisterDefaultEncoders</span><span class=\"mtk1\">(rb)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        bsoncodec.DefaultValueDecoders{}.</span><span class=\"mtk11\">RegisterDefaultDecoders</span><span class=\"mtk1\">(rb)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\trb.</span><span class=\"mtk11\">RegisterEncoder</span><span class=\"mtk1\">(tDateTime, bsoncodec.</span><span class=\"mtk11\">ValueEncoderFunc</span><span class=\"mtk1\">(dateTimeEncodeValue))</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\trb.</span><span class=\"mtk11\">RegisterEncoder</span><span class=\"mtk1\">(tOID, bsoncodec.</span><span class=\"mtk11\">ValueEncoderFunc</span><span class=\"mtk1\">(objectIDEncodeValue))</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\tprimitiveCodecs.</span><span class=\"mtk11\">RegisterPrimitiveCodecs</span><span class=\"mtk1\">(rb)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">\t</span><span class=\"mtk15\">return</span><span class=\"mtk1\"> rb</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>In this function, we are setting up our registry to use our custom encoders, while also setting up default encoders for all other types that are being marshalled. Using the bsoncodec package, the NewRegistryBuilder function is called to initialize a new registry. Next, we set up this registry with the default encoders and decoders that are pre-programmed in the driver using RegisterDefaultEncoders. During this step, we can also register encoders and decoders for raw types by calling RegisterPrimitiveCodecs. Finally, we can include our custom encoders by calling RegisterEncoder on the custom registry struct. Our encoder will be called whenever the type defined in the first argument in RegisterEncoder is found in the struct being marshalled.</p>\n<p>To ensure our new custom registry is being used, we have to do two things. The first is to build the custom registry. This should be done before the marshalling of the struct.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"7\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">customRegistry</span><span class=\"mtk1\"> = </span><span class=\"mtk11\">createCustomRegistry</span><span class=\"mtk1\">().</span><span class=\"mtk11\">Build</span><span class=\"mtk1\">()</span></span></code></pre>\n<p>Next, we need to change the marshalling method to use the new custom registry instead of the default one. We can do this by changing the method being used to marshal the struct.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"8\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk12\">customData</span><span class=\"mtk1\">, </span><span class=\"mtk12\">writeErr</span><span class=\"mtk1\"> := bson.</span><span class=\"mtk11\">MarshalExtJSONWithRegistry</span><span class=\"mtk1\">(customRegistry, result, </span><span class=\"mtk4\">false</span><span class=\"mtk1\">, </span><span class=\"mtk4\">false</span><span class=\"mtk1\">)</span></span></code></pre>\n<p>The function MarshalExtJSONWithRegistry takes the same parameters as MarshalExtJSON, but also requires a custom registry to be passed in as the first parameter. We pass in the custom registry we created into the method to allow the marshalling to use our custom encoders. As a result, when printing our new JSON string output, we get this:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"go\" data-index=\"9\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">{</span><span class=\"mtk8\">&quot;_id&quot;</span><span class=\"mtk1\">:</span><span class=\"mtk8\">&quot;5de6b0850f3c7b5cce642529&quot;</span><span class=\"mtk1\">,</span><span class=\"mtk8\">&quot;Name&quot;</span><span class=\"mtk1\">:</span><span class=\"mtk8\">&quot;dateOne&quot;</span><span class=\"mtk1\">,</span><span class=\"mtk8\">&quot;Date&quot;</span><span class=\"mtk1\">:</span><span class=\"mtk8\">&quot;2019-04-08T11:55:02.658Z&quot;</span><span class=\"mtk1\">}</span></span></code></pre>\n<p>The Mongo driver for Go is still in active development and new versions continue to be released. Hopefully this blog provides some useful information on how the driver works while new documentation is being created.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk10 { color: #4EC9B0; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n</style>","frontmatter":{"date":"December 03, 2019","updated_date":null,"description":null,"title":"Custom Encoders in the Mongo Go Driver","tags":["Go","Golang","MongoDriver"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.25,"src":"/static/5101a7134dd4fbb552b2c92ea342e1e4/58556/mongo-drivers.webp","srcSet":"/static/5101a7134dd4fbb552b2c92ea342e1e4/61e93/mongo-drivers.webp 200w,\n/static/5101a7134dd4fbb552b2c92ea342e1e4/1f5c5/mongo-drivers.webp 400w,\n/static/5101a7134dd4fbb552b2c92ea342e1e4/58556/mongo-drivers.webp 800w,\n/static/5101a7134dd4fbb552b2c92ea342e1e4/5d27d/mongo-drivers.webp 936w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Chris Yee","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":822,"currentPage":138,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}