{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/140","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"This blog is part 1 of a series on gRPC. Part 1 will go over some important concepts, part 2 will be a walkthrough of a client-server…","fields":{"slug":"/engineering/getting-started-with-grpc-part-1-concepts/"},"html":"<p><em>This blog is part 1 of a series on gRPC. Part 1 will go over some important concepts, part 2 will be a walkthrough of a client-server implementation in Go, and part 3 will be about LoginRadius' experience migrating to gRPC!</em></p>\n<p><strong>gRPC</strong></p>\n<p>gRPC, simply put, is just another way to send data across networks. It can be used to communicate between services in a microservice architecture, where a single service can interact with multiple others. Similarly, in client-server models, there can be multiple clients communicating with a common backend server.</p>\n<p><img src=\"/eb7252946d79f23eab5aca02ae64256d/Screen-Shot-2019-10-30-at-1.31.52-PM.webp\"></p>\n<p>The gRPC framework was initially developed at Google and is now open-source. It is a modern implementation of the RPC (Remote Procedure Call) protocol, which has been around since the 80s. You will often see gRPC being compared to other technologies like SOAP, REST, and GraphQL.</p>\n<p>Some features:</p>\n<ul>\n<li>HTTP/2 based transport</li>\n<li>Unary calls: single request, single response</li>\n<li>Streaming calls: client, server, and bidirectional</li>\n<li>Layered design for further extension e.g. authentication, load balancing, logging</li>\n</ul>\n<p><em>How is it used to send data?</em></p>\n<p>gRPC is based on the idea of calling a remote procedure just like a local one. A procedure is like a function or a method. So, ideally developers can treat remote and local calls similarly. A great thing about gRPC is that developers do not need to know the details of the remote interaction.</p>\n<p>Here is a diagram from the official grpc <a href=\"https://grpc.io/docs/guides/\">docs</a> showing the flow:</p>\n<p><img src=\"/d21748638236fc42aba043d73c0de37f/Screen-Shot-2019-10-30-at-1.35.45-PM-768x480.webp\"></p>\n<p>Each client service will include a stub, which is like an interface containing the available remote procedures. These stubs are auto-generated files.</p>\n<p><em>But what does proto refer to? And what are stubs? How can we generate them?</em></p>\n<p>To answer these questions, we need to look at another technology called protocol buffers.</p>\n<p><strong>Protocol Buffers</strong></p>\n<p>Protocol buffers (protobufs), are a way to format data for storage and transport. gRPC uses protobufs to format data sent over the wire. It is comparable to other data serialization formats such as JSON, XML, and YAML.</p>\n<p>Some features:</p>\n<ul>\n<li>\n<p>Ability to generate interfaces (stubs) for many languages</p>\n<ul>\n<li>You can create proto definitions once (in a .proto file), and compile it into a variety of different languages including Go, Java, C#, and Python.</li>\n</ul>\n</li>\n<li>\n<p>Requires defining schemas - need to know expected data fields and types</p>\n<ul>\n<li>This is unlike JSON which is flexible.</li>\n</ul>\n</li>\n<li>\n<p>Binary format, meaning data is converted into binary when sent over the wire.</p>\n<ul>\n<li>Binary is smaller, and generally can be decoded faster compared to text-based formats such as JSON.</li>\n</ul>\n</li>\n</ul>\n<p><em>How is it used with gRPC?</em></p>\n<p>Step 1: Create proto definitions - methods, requests, responses.</p>\n<ul>\n<li>For example, in account.proto file, we define 3 rpc methods: Find, Update, and Delete.</li>\n<li>These are the remote procedures that can be called by clients.</li>\n</ul>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"protobuf\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">service AccountService {</span>\n<span class=\"grvsc-line\">  rpc Find(FindRequest) returns (FindResponse);</span>\n<span class=\"grvsc-line\">  rpc Update(UpdateRequest) returns (UpdateResponse);</span>\n<span class=\"grvsc-line\">  rpc Delete(DeleteRequest) returns (DeleteResponse);</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<ul>\n<li>Each method can have its own request and response schemas.</li>\n</ul>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"protobuf\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">message FindRequest {</span>\n<span class=\"grvsc-line\">  string Uid = 1;</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">message FindResponse {</span>\n<span class=\"grvsc-line\">  string Uid = 1;</span>\n<span class=\"grvsc-line\">  string Name = 2;</span>\n<span class=\"grvsc-line\">  int32 Age = 3;</span>\n<span class=\"grvsc-line\">  bool isVerified = 4;</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<ul>\n<li>Note that each field in a message has a unique number. These numbers are used to identify the fields when encoded into binary (recall that protobuf sends data over the wire as binary).</li>\n</ul>\n<p>Step 2: Compile proto file for auto-generated stubs in desired language.</p>\n<ul>\n<li>First, the compiler needs to be <a href=\"https://github.com/protocolbuffers/protobuf\">installed</a>. Refer to blog <em>part 2</em> for detailed instructions.</li>\n<li>The compiler is invoked by the protoc command. In this case, the file account.proto is compiled into Golang with a grpc plugin.</li>\n</ul>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"batch\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">protoc account.proto --go_out=plugins=grpc:.</span></span></code></pre>\n<ul>\n<li>Different languages may have different ways of compiling proto files. For instance with NodeJS, there are npm libraries which allow programmatically compiling proto files.</li>\n</ul>\n<p>Step 3: Use stubs in server and clients.</p>\n<p><strong>The Big Picture</strong></p>\n<p><img src=\"/bca259a3d4e6268ad603d14ed1f03e10/Screen-Shot-2019-10-30-at-1.57.55-PM.webp\"></p>\n<p><strong>Why gRPC?</strong></p>\n<p>One compelling reason to use gRPC is that it provides high performance</p>\n<ul>\n<li>HTTP/2: e.g. requests are multiplexed, so a single long-lived TCP connection can be used by multiple requests at once. This results in less connection overhead.</li>\n<li>Protobufs: e.g. as a binary format, it allows for quick encoding and decoding of data. </li>\n</ul>\n<p><em>How does it differ from REST?</em></p>\n<table>\n<thead>\n<tr>\n<th></th>\n<th><strong>gRPC</strong></th>\n<th><strong>REST</strong></th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>API</td>\n<td>Contract-based i.e. stubs</td>\n<td>Resource-based and relies on HTTP verbs i.e. GET/PUT/POST/DELETE</td>\n</tr>\n<tr>\n<td>Network protocol</td>\n<td>HTTP/2</td>\n<td>HTTP/1.1 or HTTP/2</td>\n</tr>\n<tr>\n<td>Data serialization format</td>\n<td>Protocol buffers</td>\n<td>JSON</td>\n</tr>\n<tr>\n<td>Streaming</td>\n<td>Built-in support for client, server, and bi-directional streaming</td>\n<td>REST on HTTP/1.1 does not allow streaming</td>\n</tr>\n</tbody>\n</table>\n<p><strong>Other Considerations</strong></p>\n<p>Here, we briefly go over a few other things to consider with gRPC. These will be covered in more detail in another blog.</p>\n<p><em>Management of proto files</em><br>\nIf you plan to have multiple proto files and client services, you need some way to manage them for distribution and version control. One solution is to keep all proto files in a central git repository, and maintain versions using git tags.</p>\n<p><em>Using proto2 vs. proto3</em><br>\nProtocol buffers have two syntax versions: proto2 and proto3.</p>\n<ul>\n<li>One key feature in proto2 is that it differentiates between required and optional fields, and supports nullable fields.</li>\n<li>In proto3, all fields are optional and nullable fields are no longer supported. If a field is unset, it will be set to a default value e.g. empty string for type string. Because of this, determining whether a field was intentionally set or not requires workarounds such as using wrappers.</li>\n</ul>\n<p><em>Load-Balancing</em><br>\nSomething to note about load-balancing gRPC is that HTTP/2 requires L7 (Application Layer) load-balancers. Recall that in HTTP/2, TCP connections are long-lived and requests are multiplexed. This makes L4 (Connection Layer) load-balancers ineffective. This differs from HTTP/1.1 where TCP connections get cycled and can benefit from L4 load-balancers. </p>\n<p>That's it for now! To learn more, check out the official <a href=\"https://grpc.io\">gRPC</a> and <a href=\"https://developers.google.com/protocol-buffers\">protobuf</a> docs.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n</style>","frontmatter":{"date":"October 30, 2019","updated_date":null,"description":null,"title":"Getting Started with gRPC - Part 1 Concepts","tags":["Engineering","gRPC"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1,"src":"/static/23fcca8d49d96b5e61cc171769c93b38/a55b6/grpc.webp","srcSet":"/static/23fcca8d49d96b5e61cc171769c93b38/61e93/grpc.webp 200w,\n/static/23fcca8d49d96b5e61cc171769c93b38/a55b6/grpc.webp 246w","sizes":"(max-width: 246px) 100vw, 246px"}}},"author":{"id":"Andy Yeung","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Cross-Site Request Forgery (CSRF) is a common web application attack where a victims’ authenticated session becomes compromised…","fields":{"slug":"/engineering/introduction-to-cross-site-request-forgery-csrf/"},"html":"<p><strong>Introduction</strong></p>\n<p>Cross-Site Request Forgery (CSRF) is a common web application attack where a victims’ authenticated session becomes compromised. This attack essentially tricks a victim into performing unintended tasks on a website they are authenticated in. There are variations to this attack, and a popular one we will discuss is utilizing authentication token to imitate api requests.</p>\n<p><strong>Context</strong></p>\n<p>In order to understand CSRF, it is important to know how cookies and authentication tokens are used for persisting user sessions. Cookies are information stored in the browser, and often used for managing state between HTTP requests. A key feature of cookies is that they are automatically passed as a header in HTTP requests. Authentication tokens are typically stored as cookies, and are a way to keep track of a users’ authenticated session. These tokens are set as cookies after a user successfully authenticates themselves by log in.</p>\n<p><strong>How it works</strong></p>\n<p>CSRF takes advantage of the storage of auth tokens in the browser, and constructs http requests to a target server on behalf of the user. Imitating http requests from the legitimate site requires research and preparation from the attacker beforehand, such as finding vulnerable websites and api’s suitable for the attack.</p>\n<p><img src=\"/29706236a94eec5b8a444b4fd69797b1/image2.webp\"></p>\n<p>Here is a high-level example of an CSRF attack. Note that some details are excluded for simplicity, but the key aspects are included.</p>\n<ol>\n<li>\n<p>John is authenticated on banking.io</p>\n<ul>\n<li>Auth token is set as a cookie on the browser.</li>\n</ul>\n</li>\n<li>\n<p>On another tab, John clicks on an advertisement for free money, which leads to a malicious site.</p>\n<ul>\n<li>Typically, some social engineering is necessary to lure victims to a malicious website.</li>\n</ul>\n</li>\n<li>\n<p>Malicious site makes a POST request to banking.io/setpassword, which is an api for setting a users password to anything.</p>\n<ul>\n<li>The malicious site will construct the POST request for setting password exactly like the legitimate site, and uses John’s authentication cookie.</li>\n<li>The password will be set to anything the attacker wants.</li>\n</ul>\n</li>\n<li>Victim is unable to authenticate with banking.io anymore, because the password was set to something else.</li>\n</ol>\n<p><strong>Mitigation</strong></p>\n<p>A common and effective way of mitigating CSRF is called the double submit cookie. Essentially the client will have two paired and encrypted tokens: one hidden in the page HTML and the other stored as a cookie.</p>\n<p><img src=\"/7a65c1db0bdc228bfa69aeb7455e1e63/image1.webp\"></p>\n<p>When a request is made by the client, both tokens are sent to the server, and the server will then ensure the tokens are valid pairs before processing the request as normal. </p>\n<p><img src=\"/846b57c31fe869f9e584127cd5e6d1f7/image3.webp\"></p>\n<p>Now the attacker will be unable to perform CSRF since they will not have access to the token hidden in the pages HTML, and the target server requires a valid token pair before processing the request.</p>\n<p>There are also many other mitigation techniques, such as using the Same-Site cookie attribute, and requiring user interaction such as CAPTCHA for requests. Learn more on the <a href=\"https://owasp.org/www-community/attacks/csrf\">OWASP wiki</a>).</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 30, 2019","updated_date":null,"description":null,"title":"Introduction to Cross-Site Request Forgery (CSRF)","tags":["CSRF"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/45655fcaf75e8e3352165b60c7cac47b/1f5c5/crosspath.webp","srcSet":"/static/45655fcaf75e8e3352165b60c7cac47b/61e93/crosspath.webp 200w,\n/static/45655fcaf75e8e3352165b60c7cac47b/1f5c5/crosspath.webp 400w","sizes":"(max-width: 400px) 100vw, 400px"}}},"author":{"id":"Andy Yeung","github":null,"avatar":null}}}},{"node":{"excerpt":"Cybersecurity awareness helps protect enterprises, employees, and customers. That’s why, more than ever, enterprises are working hard to…","fields":{"slug":"/identity/cloud-computing-security-challenges/"},"html":"<p>Cybersecurity awareness helps protect enterprises, employees, and customers. That’s why, more than ever, enterprises are working hard to protect sensitive data against breaches and hacks. Likewise, consumers want to change unsafe habits, so they can better protect their personal and vulnerable information.</p>\n<p>One answer may be a cloud-based <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management (CIAM)</a> solution, like the one we have built at LoginRadius. This would enable more security features like single sign-on, <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless logins</a>, and multi-factor authentication. </p>\n<h2 id=\"5-cloud-security-challenges-that-businesses-face-today\" style=\"position:relative;\"><a href=\"#5-cloud-security-challenges-that-businesses-face-today\" aria-label=\"5 cloud security challenges that businesses face today permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Cloud Security Challenges that Businesses Face Today</h2>\n<h3 id=\"1-ddos-attacks\" style=\"position:relative;\"><a href=\"#1-ddos-attacks\" aria-label=\"1 ddos attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. DDoS attacks</h3>\n<p>DDoS or Denial-of-Service attacks are the number one concern of every cloud provider. These attacks cripple server performance and can take websites down for hours or days, hurting revenue and customer satisfaction. Meanwhile, attackers don’t need to invest in expensive hardware; they can relatively easily launch DDoS attacks over the internet.</p>\n<p>To combat cloud-based DDoS attacks, you'll need a responsive platform that can detect possible breaches, identify abnormal network behavior, and block DDoS attacks before they take down your website.</p>\n<h3 id=\"2-lack-of-cloud-security-architecture\" style=\"position:relative;\"><a href=\"#2-lack-of-cloud-security-architecture\" aria-label=\"2 lack of cloud security architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Lack of cloud security architecture</h3>\n<p>One of the main reasons organizations move to public clouds is the ability to seamlessly apply cloud security measures that are built into the cloud environment and take into account policies, identity, and compliance requirements.</p>\n<p>Cloud migration is a complex and challenging endeavor. Therefore, every aspect of the migration must be treated carefully in order to avoid critical business challenges such as data loss and security breaches.</p>\n<h3 id=\"3-data-breaches\" style=\"position:relative;\"><a href=\"#3-data-breaches\" aria-label=\"3 data breaches permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Data breaches</h3>\n<p>This is the most common adoption concern when it comes to moving to cloud infrastructure. After all, IT professionals have had full control of everything related to security when it comes to on-premises infrastructure. </p>\n<p>It is important that you choose a provider with a proven track record in implementing strong security protocols in their own data centers. This will ensure that the security controls you have in place today remain intact and that any new, vital security controls are added as well.</p>\n<h3 id=\"4-insecure-interfaces-and-apis\" style=\"position:relative;\"><a href=\"#4-insecure-interfaces-and-apis\" aria-label=\"4 insecure interfaces and apis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Insecure interfaces and APIs</h3>\n<p>Cloud computing providers are expected to ensure the security of customer resources, even during times of high-volume system changes. This goal is particularly difficult because security must be built into the cloud API. Cloud API providers must rely on authentication and authorization tools to validate requests.</p>\n<h3 id=\"span-stylecolor-ff4500-poorly-designed-apis-may-lead-to-misuse-of-information-or-even-data-breaches-when-an-organization-makes-a-change-to-an-api-it-must-take-into-account-how-that-change-affects-both-internal-and-external-consumers-span\" style=\"position:relative;\"><a href=\"#span-stylecolor-ff4500-poorly-designed-apis-may-lead-to-misuse-of-information-or-even-data-breaches-when-an-organization-makes-a-change-to-an-api-it-must-take-into-account-how-that-change-affects-both-internal-and-external-consumers-span\" aria-label=\"span stylecolor ff4500 poorly designed apis may lead to misuse of information or even data breaches when an organization makes a change to an api it must take into account how that change affects both internal and external consumers span permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><span style=\"color: #FF4500\"> \"Poorly designed APIs may lead to misuse of information or even data breaches. When an organization makes a change to an API, it must take into account how that change affects both internal and external consumers.\" </span></h3>\n<h3 id=\"5-lack-of-proper-education\" style=\"position:relative;\"><a href=\"#5-lack-of-proper-education\" aria-label=\"5 lack of proper education permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Lack of proper education</h3>\n<p>To keep your cloud security as strong as possible, you need to prioritize education, not just around best practices for traditional security but also on industry trends. And this is what most enterprises lack today. </p>\n<p>Team members should have a good understanding of the basics to start. For example, what is cloud computing and why do they need it? Then the team should identify experts within the organization to teach their colleagues more advanced cloud security, such as industry best practices.</p>\n<h2 id=\"how-safe-is-cloud-computing\" style=\"position:relative;\"><a href=\"#how-safe-is-cloud-computing\" aria-label=\"how safe is cloud computing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How safe is cloud computing? </h2>\n<p>Cloud security (AKA cloud computing security) is a set of policies, technologies, applications, and controls used to protect data and other material that is stored or run in the cloud. </p>\n<p>It’s safe because your files are stored on servers all around the world. This is called a ‘distributed system.’ Your data is encrypted when it travels over the internet, so it’s completely private and protected from hackers and thieves.</p>\n<p>Luckily, SaaS companies like LoginRadius specialize in cloud security that keeps customer data secure and private. We also offer IDaaS with a number of user authentication services like multi-factor authentication, single sign-on, and identity management. </p>\n<h2 id=\"what-is-idaas\" style=\"position:relative;\"><a href=\"#what-is-idaas\" aria-label=\"what is idaas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is IDaaS?</h2>\n<p>IDaaS is a software platform that focuses on protecting and <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">managing digital identities</a>. At LoginRadius, cloud security is at the core of our customer identity and access management (CIAM) platform. Cloud security is built into the foundation of everything we do—and we have the credentials to prove it. </p>\n<h2 id=\"which-security-credentials-matter\" style=\"position:relative;\"><a href=\"#which-security-credentials-matter\" aria-label=\"which security credentials matter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Which security credentials matter?</h2>\n<p>LoginRadius has successfully passed multiple audits and earned several certifications in recognition of our commitment to security. These include SOC 2® and ISAE 3000 Type II audits, which we completed in July and August. The SOC 2, issued by the American Institute of CPAs, is considered to be the highest standard for ensuring the security, availability, processing integrity, and confidentiality of customer data. Meanwhile, the ISAE 3000, issued by the International Federation of Accountants, is a standard for assurance over non-financial information.</p>\n<p>In August, we also achieved the ISO 27001 Information Security Standard Accredited certification, which sets the international industry-standard for establishing, implementing, maintaining, and continually improving an information security management system.</p>\n<h3 id=\"span-stylecolor-ff4500-our-privacy-shield-compliance-certification-recognizes-our-compliance-with-data-protection-requirements-when-transferring-personal-data-from-the-eu-and-switzerland-to-the-us-span-\" style=\"position:relative;\"><a href=\"#span-stylecolor-ff4500-our-privacy-shield-compliance-certification-recognizes-our-compliance-with-data-protection-requirements-when-transferring-personal-data-from-the-eu-and-switzerland-to-the-us-span-\" aria-label=\"span stylecolor ff4500 our privacy shield compliance certification recognizes our compliance with data protection requirements when transferring personal data from the eu and switzerland to the us span  permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><span style=\"color: #FF4500\"> Our Privacy Shield <a href=\"https://www.loginradius.com/compliances/\">compliance certification</a> recognizes our compliance with data protection requirements when transferring personal data from the EU and Switzerland to the US. </span>  </h3>\n<p>In addition, we hold a Security Trust Assurance and Risk (STAR) certification issued by the Cloud Security Alliance (CSA). CSA describes the STAR program as the <a href=\"https://cloudsecurityalliance.org/wp-uploads/2015/04/CSA_STAR-Brochure_April_2015.pdf/\">most powerful cloud security assurance program</a>, \"encompassing key principles of transparency, rigorous auditing, and harmonization of standards.\"</p>\n<p><img src=\"/d2205770d07bd3b466f7642e6d025dbf/Cloud-Security-Challenges-Today-V01.01_02-1024x621.webp\"></p>\n<h2 id=\"why-choose-cloud-computing\" style=\"position:relative;\"><a href=\"#why-choose-cloud-computing\" aria-label=\"why choose cloud computing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why choose cloud computing? </h2>\n<p><strong>Cost-effectiveness</strong></p>\n<p>Typically, on-premises security solutions require a substantial investment to engineer and maintain. </p>\n<p>By contrast, with cloud computing, you don't need to pay anything upfront. That's because cloud security tools are built and operated by a third-party vendor. You only pay for what you need or use through a monthly or annual subscription. </p>\n<p><strong>Maintenance</strong></p>\n<p>With cloud security, a third-party vendor is responsible for maintaining the system, not you. This vendor is the one spending their money and time on upgrading, integrating, and optimizing the system. The vendor also keeps the technology up-to-date, leaving you free to focus on growing your business. </p>\n<p><strong>Scalability</strong></p>\n<p>Cloud servers are made to support massive sign-ins and sudden, dramatic surges of user actions (during a major sports game or popular TV voting system). </p>\n<p>In fact, the LoginRadius Identity Platform was designed with service provider-class scale in mind. The distributed CIAM network has regularly experienced peak transaction volumes in excess of <a href=\"https://www.sdxcentral.com/articles/news/security-startups-loginradius-and-siemplify-score-millions-more-in-funding/2018/07/\">150,000 logins per second</a>, and typically handles 10,000 requests per second with less than 500 milliseconds latency. Check our <a href=\"https://status.loginradius.com/\">live status</a> to see more.</p>\n<p><strong>Compliance</strong></p>\n<p>Any enterprise that stores customer data must comply with global privacy regulations. These regulations govern how you seek customer consent to use their data and what you do with that data.</p>\n<p>The European Union's <a href=\"https://www.loginradius.com/blog/2019/09/ccpa-vs-gdpr-the-compliance-war/\">General Data Protection Regulation (GDPR)</a> is just one example of this kind of legislation. With cloud security, your third-party vendor is responsible for compliance and has the expertise to do so.</p>\n<h3 id=\"span-stylecolor-ff4500-at-loginradius-our-identity-platform-complies-with-all-significant-data-security-and-privacy-laws-and-with-the-terms-of-various-social-networks-we-monitor-these-laws-regularly-for-changes-or-updates-and-being-that-our-cloud-data-centers-are-in-over-35-locations-worldwide-you-can-choose-where-your-customer-data-is-stored-to-comply-with-local-data-regulationsspan\" style=\"position:relative;\"><a href=\"#span-stylecolor-ff4500-at-loginradius-our-identity-platform-complies-with-all-significant-data-security-and-privacy-laws-and-with-the-terms-of-various-social-networks-we-monitor-these-laws-regularly-for-changes-or-updates-and-being-that-our-cloud-data-centers-are-in-over-35-locations-worldwide-you-can-choose-where-your-customer-data-is-stored-to-comply-with-local-data-regulationsspan\" aria-label=\"span stylecolor ff4500 at loginradius our identity platform complies with all significant data security and privacy laws and with the terms of various social networks we monitor these laws regularly for changes or updates and being that our cloud data centers are in over 35 locations worldwide you can choose where your customer data is stored to comply with local data regulationsspan permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><span style=\"color: #FF4500\"> At LoginRadius, our Identity Platform complies with all significant data security and privacy laws and with the terms of various social networks. We monitor these laws regularly for changes or updates. And being that our cloud data centers are in over 35 locations worldwide, you can choose where your customer data is stored to comply with local data regulations. </span></h3>\n<p><strong>Secure Data Access</strong></p>\n<p>Customer access to their data is a requirement of the <a href=\"https://www.loginradius.com/blog/identity/ccpa-introduction/\">California Consumer Privacy Act (CCPA)</a>, and non-compliance can result in hefty fines. However, data stored on cloud services is instantly available to authorized users. On the cloud, centralized data can be backed up regularly and restored quickly in case <a href=\"https://searchdisasterrecovery.techtarget.com/definition/disaster-recovery\">disaster recovery</a> is ever necessary.</p>\n<p><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><img src=\"/fa88a9e70426c2aaf7daf7d4265e1351/SASE-approach.webp\" alt=\"SASE-approach\"></a></p>\n<p><strong>Better Performance</strong></p>\n<p>Just as cloud technology powers its way into transforming entire industries, so does its technology progressively cut down on latency times and work to improve overall performance.</p>\n<p>Moreover, a third-party data center provider can speed up your hardware refresh cycles and deliver the latest high-performance equipment. With a third-party data center provider, all you need to do is add more power or expand the floor space when you need it. You don’t have to worry about maintaining huge backup spares, or worry about the manufacturer’s end-of-life (EOL) replacement schedules.</p>\n<p><strong>Speed to Market</strong></p>\n<p>Cloud computing enables enterprises to provision resources for development and testing across a wide variety of environments. Once they are complete, applications can be rapidly deployed into an operational environment hosted on the cloud for a smooth launch. </p>\n<p>As these environments feature elastic scaling capabilities, organizations no longer need to worry about an incorrect capacity estimate impacting their ability to scale on demand.</p>\n<p><strong>Cloud Security Alliance</strong></p>\n<p>The Cloud Security Alliance is the world's leading organization dedicated to defining and raising awareness of cloud security best practices. </p>\n<p>LoginRadius is a member, along with other experts in cloud security. Together, CSA members share up-to-date developments about the cloud computing environment. We recognize emerging security risks so that we can improve cloud security for everyone. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=cloud-computing-security-challenges\"><img src=\"/1bebf239d110701b9b534d7eb481a5ac/image5.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 24, 2019","updated_date":null,"description":"For business owners and IT professionals around the world, security in the cloud is still a pressing concern. There are a lot of things you need to consider when moving your business to a cloud environment; from data protection, getting the right platform for your needs, how to protect data during transit, and more.","title":"Cloud Security Challenges Today: Expert Advice on Keeping your Business Safe","tags":["cloud computing","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7094017094017093,"src":"/static/4eb7a20492e18259ebaaf31842d03695/9fd83/cloud-computing-security-challenges-cover.webp","srcSet":"/static/4eb7a20492e18259ebaaf31842d03695/61e93/cloud-computing-security-challenges-cover.webp 200w,\n/static/4eb7a20492e18259ebaaf31842d03695/1f5c5/cloud-computing-security-challenges-cover.webp 400w,\n/static/4eb7a20492e18259ebaaf31842d03695/9fd83/cloud-computing-security-challenges-cover.webp 626w","sizes":"(max-width: 626px) 100vw, 626px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"When it comes to online security, the battle cry among experts lately is: “The future is passwordless!” So, why is passwordless…","fields":{"slug":"/identity/passwordless-authentication-the-future-of-identity-and-security/"},"html":"<p>When it comes to online security, the battle cry among experts lately is: “The future is passwordless!” So, why is passwordless authentication so important?</p>\n<p>Simple. Passwords are just too easy to guess, hack, or intercept. What’s more, the legacy of password reuse is leading to constant <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">attack and account vulnerabilities</a>.</p>\n<p>However, modern-day passwordless authentication security goes beyond the use of password and username credentials. </p>\n<p>So, whether your organization wants to replace passwords or is determined to keep using them, you must first <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">understand password weaknesses</a>. Here are a few:</p>\n<ul>\n<li>Users often create weak passwords that are vulnerable to phishing attacks.</li>\n<li>Hackers commonly use brute force attacks to hack password credentials. </li>\n<li>Users often reuse the same authentication credentials on different accounts.</li>\n<li>Password methods alone cannot keep hackers away.</li>\n</ul>\n<p>Remember that we’re not dealing with bored, out-of-work hackers playing for thrills. Rather, these are often well-established criminal organizations using high-end machine learning (for <em>big</em> profit). </p>\n<h2 id=\"what-is-passwordless-authentication\" style=\"position:relative;\"><a href=\"#what-is-passwordless-authentication\" aria-label=\"what is passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Passwordless Authentication?</h2>\n<p>A <a href=\"https://www.loginradius.com/passwordless-login/\">passwordless authentication</a> system is one that swaps the use of a traditional password with more secure factors. These extra-security methods may include a magic link, fingerprint, PIN, or a secret token delivered via email or text message.</p>\n<h2 id=\"why-do-we-need-passwordless-authentication\" style=\"position:relative;\"><a href=\"#why-do-we-need-passwordless-authentication\" aria-label=\"why do we need passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Do We Need Passwordless Authentication?</h2>\n<p>Most people have questions regarding the reliability of passwordless authentication and they always question themselves- is passwordless more secure? Well, passwordless login <a href=\"https://www.loginradius.com/passwordless-login/\">eliminates the need to generate passwords</a> altogether. There’s a lot of good in this new-age process for both users and organizations alike.</p>\n<p>For users, since one need not type passwords anymore, it leads to a better screen time experience. While for organizations, it will <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">lead to fewer breaches</a> and support costs.</p>\n<p>The good news is that the list doesn’t stop here. Let’s learn more. </p>\n<h2 id=\"comparative-analysis-passwordless-vs-traditional-authentication\" style=\"position:relative;\"><a href=\"#comparative-analysis-passwordless-vs-traditional-authentication\" aria-label=\"comparative analysis passwordless vs traditional authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Comparative Analysis: Passwordless vs Traditional Authentication</h2>\n<p>Let’s quickly compare passwordless and traditional authentication and learn how secure is passwordless authentication: </p>\n<h3 id=\"1-security\" style=\"position:relative;\"><a href=\"#1-security\" aria-label=\"1 security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Security</h3>\n<ul>\n<li><strong>Passwordless Authentication</strong>: Offers enhanced security by eliminating the risks associated with passwords, such as phishing, brute force attacks, and password reuse.</li>\n<li><strong>Traditional Authentication</strong>: Relies solely on passwords, which are susceptible to various cyber threats, making accounts vulnerable to unauthorized access.</li>\n</ul>\n<h3 id=\"2-user-experience\" style=\"position:relative;\"><a href=\"#2-user-experience\" aria-label=\"2 user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. User Experience</h3>\n<ul>\n<li><strong>Passwordless Authentication</strong>: Provides a seamless and user-friendly experience, as users do not need to remember complex passwords.</li>\n<li><strong>Traditional Authentication</strong>: Often results in password fatigue and the need to remember multiple passwords, leading to user frustration.</li>\n</ul>\n<h3 id=\"3-cost-effectiveness\" style=\"position:relative;\"><a href=\"#3-cost-effectiveness\" aria-label=\"3 cost effectiveness permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Cost-Effectiveness</h3>\n<ul>\n<li><strong>Passwordless Authentication</strong>: Can reduce costs associated with password management, such as password resets and support requests.</li>\n<li><strong>Traditional Authentication</strong>: May incur higher costs due to the need for password management systems and support for password-related issues.</li>\n</ul>\n<h3 id=\"4-vulnerabilities\" style=\"position:relative;\"><a href=\"#4-vulnerabilities\" aria-label=\"4 vulnerabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Vulnerabilities</h3>\n<ul>\n<li><strong>Passwordless Authentication</strong>: Reduces vulnerabilities such as password spraying, brute force attacks, spear phishing, and password sharing.</li>\n<li><strong>Traditional Authentication</strong>: Prone to common vulnerabilities like weak passwords, password dictionaries, and password patterns.</li>\n</ul>\n<h3 id=\"passwordless-login-for-businesses\" style=\"position:relative;\"><a href=\"#passwordless-login-for-businesses\" aria-label=\"passwordless login for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Login for Businesses</h3>\n<p>The use of passwordless authentication security in businesses is multifold. For example, you can go passwordless for internal security, online consumers, or even combine the two of them. </p>\n<p>A few use cases of passwordless authentication include:</p>\n<ul>\n<li>Sign up for a service, or get a subscription.</li>\n<li>Let consumers log in to their online accounts.</li>\n<li>Make a secure payment online.</li>\n</ul>\n<p>With passwordless login, it is much easier to keep information about your users safe and implement tighter <a href=\"https://www.loginradius.com/security/\">security measures for your employees</a>.</p>\n<h3 id=\"passwordless-login-for-non-profits\" style=\"position:relative;\"><a href=\"#passwordless-login-for-non-profits\" aria-label=\"passwordless login for non profits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Login for Non-Profits</h3>\n<p>Speaking of non-profit organizations, passwordless authentication can do wonders to the security of the donation process. </p>\n<p>Also, when a person donates to an NGO, they can have their payment information like name, card details, expiry dates etc. saved using passwordless options like email authentication. So the next time they plan to donate, they won't need to fill in the basic information. </p>\n<h2 id=\"benefits-of-passwordless-authentication\" style=\"position:relative;\"><a href=\"#benefits-of-passwordless-authentication\" aria-label=\"benefits of passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Passwordless Authentication</h2>\n<p>We’ve learned how is passwordless more secure. Now let’s explore its benefits: </p>\n<ul>\n<li>\n<p><strong>Improved user experience</strong>: Be it fingerprint scanning, social media sign-in, <a href=\"https://www.loginradius.com/blog/2020/04/loginradius-pin-based-authentication/\">PIN authentication</a>, or email verification, you no longer need to memorize any credentials whatsoever.   </p>\n<p>Passwordless authentication only takes a few basic steps and works on both websites and mobile applications alike. </p>\n</li>\n<li>\n<p><strong>Increased cost-effectiveness</strong>: Passwords require constant maintenance. According to Forrester, the average cost of one password reset for a company is $70. For large enterprises, this figure reaches $1 million USD each year.   </p>\n<p>Needless to say, eliminating passwords will not just save time and productivity, but also a bulk load of expenses.</p>\n</li>\n<li>\n<p><strong>Stronger security</strong>: User-controlled passwords are vulnerable to attacks like phishing, credential stuffing, brute force attacks, <a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">corporate account takeover (CATO)</a>, and more.   </p>\n<p>So, when there is no password to hack in the first place, those vulnerabilities will automatically decrease.</p>\n</li>\n<li><strong>Greater convenience</strong>: Since users can authenticate without passwords, it becomes easier to sign in and access data from anywhere on the web.</li>\n<li>\n<p><strong>IT Gains Control and Visibility</strong>: Phishing, reuse, and password sharing are just a few of the issues related to password-based authentication.  </p>\n<p>So, when there is no need for passwords in the first place, IT can reclaim its purpose of having complete visibility over <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">identity and access management</a>.</p>\n</li>\n</ul>\n<h2 id=\"what-does-passwordless-authentication-prevent\" style=\"position:relative;\"><a href=\"#what-does-passwordless-authentication-prevent\" aria-label=\"what does passwordless authentication prevent permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Does Passwordless Authentication Prevent</h2>\n<p>With passwords out of the picture, the following are a few attacks that businesses can dodge by implementing passwordless authentication into their systems.</p>\n<ol>\n<li><strong>Password spraying</strong>: It is a method of cyber-attack that attempts to log in to a large number of accounts with commonly used password credentials.</li>\n<li><strong>Brute Force Attack</strong>: Hackers use the trial-and-error method to guess the login credentials or encryption keys. They try all the possible combinations until the account is hacked.</li>\n<li><strong>Spear phishing</strong>: It is an email spoofing attack that scams organizations and individuals to give away sensitive credentials for financial, military, or trade gains.</li>\n<li><strong>Social Engineering</strong>: Hackers use psychological manipulation and scam users into giving away sensitive information or granting access to critical resources.</li>\n<li><strong>Shoulder Surfing</strong>: It is a type of data theft where the intruder steals login credentials by peeking over the target's shoulder.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><img src=\"/ed01fc7fdf96152fcc18b7f6e2369834/DS-Product-Passwordless-Login-1024x310.webp\" alt=\"Passwordless Login Datasheet\"></a></p>\n<h2 id=\"how-safe-is-passwordless-authentication-as-compared-to-other-login-methods\" style=\"position:relative;\"><a href=\"#how-safe-is-passwordless-authentication-as-compared-to-other-login-methods\" aria-label=\"how safe is passwordless authentication as compared to other login methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Safe Is Passwordless Authentication as Compared to Other Login Methods</h2>\n<p>A common issue with using passwords for authentication lies in the fact that customers want the quickest way to log in to their accounts. After all, the longer it takes for a consumer to sign-up, or make a purchase, they will more likely tend to bounce. Other reasons why passwords bounce include:</p>\n<ul>\n<li><strong>Password complexity is weak</strong>: Passwords may meet the standard complexity, but they may be still weak because of\npassword dictionaries.</li>\n<li><strong>Password follow patterns</strong>: Because the majority of passwords follow a certain pattern, it is easier for hackers to commit data theft. </li>\n<li><strong>Passwords aren’t unique</strong>: People reuse passwords and newly leaked dictionaries contain previously leaked passwords.</li>\n</ul>\n<p>Due to <a href=\"https://www.loginradius.com/resource/infographic/death-of-passwords\">bad password practices</a>, chances are consumers may be putting their accounts at risk. This is one of the strongest reasons why passwordless authentication is preferred by consumers and enterprises as their preferred method of authentication.</p>\n<h2 id=\"types-of-passwordless-authentication\" style=\"position:relative;\"><a href=\"#types-of-passwordless-authentication\" aria-label=\"types of passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Passwordless Authentication</h2>\n<p>In a typical application, passwordless authentication can be implemented through different approaches. Here’s a list of the most common ones.</p>\n<h3 id=\"email-based-passwordless-authentication\" style=\"position:relative;\"><a href=\"#email-based-passwordless-authentication\" aria-label=\"email based passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Email-Based Passwordless Authentication</h3>\n<p>This is one of the most common login systems. The user is asked to enter the email address. A unique code (or magic link) is then created and sent to the associated email ID. When the user clicks on the link, the server triggers an action to verify if the code is valid within a certain timeframe (e.g. three minutes) and then swaps it for a long-time validation token. If the authentication is successful, the user is let in.</p>\n<h3 id=\"social-login-authentication\" style=\"position:relative;\"><a href=\"#social-login-authentication\" aria-label=\"social login authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social Login Authentication</h3>\n<p><a href=\"https://www.loginradius.com/social-login/\">Social login is the method of authentication</a> using a social network provider like Facebook, Twitter, or Google. The user enters your application and selects a social network provider. A login request is then sent to the provider and after the provider approves it, the user is allowed to access their application. There is no need for passwords at all.</p>\n<h3 id=\"sms-based-passwordless-login\" style=\"position:relative;\"><a href=\"#sms-based-passwordless-login\" aria-label=\"sms based passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SMS-Based Passwordless Login</h3>\n<p>Here’s a convenient, easy-to-implement way to onboard a user. SMS-based login eliminates the need to create additional credentials, thereby easing the basic authentication process. The steps are simple: A user must enter a valid phone number; then the server sends a single-use code to that number which the user must enter to log in to the service. </p>\n<h3 id=\"biometrics-based-or-passwordless-authentication-for-logged-in-users\" style=\"position:relative;\"><a href=\"#biometrics-based-or-passwordless-authentication-for-logged-in-users\" aria-label=\"biometrics based or passwordless authentication for logged in users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometrics-Based or Passwordless Authentication for Logged-In Users</h3>\n<p>Biometric authentication services focus on growing technologies like fingerprint, face, or iris scans. The technology works on smartphones where users press their thumbs on their smartphone scanners to authorize their identities and gain access to their accounts. Both Android and Apple offer biometric login options that are popular for their convenience.</p>\n<p><img src=\"/a1d76f9568d4e91319ebc88ec601082d/Passwordless-Authentication-shield-image-1024x576.webp\" alt=\"image showing passwordless login is more secure and harder to hack\"></p>\n<h2 id=\"how-does-passwordless-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-passwordless-authentication-work\" aria-label=\"how does passwordless authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Passwordless Authentication Work</h2>\n<p>The technology behind passwordless login is similar to that of digital certificates. There are <a href=\"https://en.wikipedia.org/wiki/Cryptographic_key_types\">cryptographic key pairs</a> that include a private and public key. </p>\n<p>To understand how this works, think of the public key as the padlock. The private key, on the other hand, is what unlocks the padlock. To sum up, there is only one key for the padlock and in return, one padlock for the key. </p>\n<p>This means that whenever a user wishes to create a secure account, a public-private key pair must be generated. This is usually done via tools like a mobile app or a browser extension. Here are the steps:</p>\n<ul>\n<li>A private key is stored on the local device of the user and linked to an authentication factor like a PIN, fingerprint or face recognition. </li>\n<li>The public key, on the other hand, goes to the website or application where the user wishes to log in. </li>\n</ul>\n<p>Today’s passwordless authentication follows the <a href=\"https://en.wikipedia.org/wiki/FIDO2_Project\">FIDO2 standard</a>. It includes WebAuthn and CTAP that help organizations keep their passwords secure.</p>\n<p><img src=\"/e87ea235483268977b7dd24ed6f0cdc2/Passwordless-Login-Flowchart-1024x549.webp\" alt=\"flowchart of Passwordless Login\"></p>\n<p>Wondering how it works? </p>\n<p>Let’s assume you’re a service provider and you store customer public keys in “public”.</p>\n<p>That may sound risky, but here’s the catch. If a hacker obtains that public key, the data will be of no use without the private key that unlocks it. The best part is that the private key remains with the end-user.</p>\n<h2 id=\"emerging-trends-in-passwordless-security\" style=\"position:relative;\"><a href=\"#emerging-trends-in-passwordless-security\" aria-label=\"emerging trends in passwordless security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Emerging Trends in Passwordless Security</h2>\n<p>As the landscape of cybersecurity evolves, several emerging trends in passwordless security are reshaping how we protect digital identities:</p>\n<h3 id=\"1-biometric-authentication\" style=\"position:relative;\"><a href=\"#1-biometric-authentication\" aria-label=\"1 biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Biometric Authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-mob-biometric-authentication/\">Biometric authentication</a> methods, such as fingerprint scanning, facial recognition, or iris scans, are gaining traction. These methods offer a seamless and secure way to authenticate users without the need for traditional passwords.</p>\n<h3 id=\"2-magic-links-and-email-authentication\" style=\"position:relative;\"><a href=\"#2-magic-links-and-email-authentication\" aria-label=\"2 magic links and email authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Magic Links and Email Authentication</h3>\n<p>The use of <a href=\"https://www.loginradius.com/blog/identity/passwordless-magic-links/\">magic links</a> sent via email is becoming popular. Users can simply click on a unique link to access their accounts, eliminating the need to remember passwords. This method enhances user experience and streamlines the login process.</p>\n<h3 id=\"3-social-login-integration\" style=\"position:relative;\"><a href=\"#3-social-login-integration\" aria-label=\"3 social login integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Social Login Integration</h3>\n<p>Integrating social media accounts for authentication is a rising trend. Users can leverage their existing social media profiles to log in to various platforms, reducing the burden of creating and managing multiple passwords.</p>\n<h3 id=\"4-hardware-tokens-and-smart-cards\" style=\"position:relative;\"><a href=\"#4-hardware-tokens-and-smart-cards\" aria-label=\"4 hardware tokens and smart cards permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Hardware Tokens and Smart Cards</h3>\n<p>Hardware tokens and smart cards provide physical, secure methods of authentication. These devices generate unique codes or require physical presence for access, adding an extra layer of security to passwordless authentication.</p>\n<h2 id=\"implementing-passwordless-authentication-with-loginradius\" style=\"position:relative;\"><a href=\"#implementing-passwordless-authentication-with-loginradius\" aria-label=\"implementing passwordless authentication with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Passwordless Authentication with LoginRadius</h2>\n<p>The best way to provide seamless registration and authentication for your customers is with a passwordless login solution. This gives them a hassle-free way to access their accounts—with no passwords needed! </p>\n<p>The LoginRadius Identity Platform is an out-of-the-box way for you to do this easily. The identity and access management platform is fully customizable too, so you can <a href=\"https://www.loginradius.com/customer-experience-solutions/\">simplify your customer experience</a> to suit your company’s needs.</p>\n<p>Here’s how the platform works.</p>\n<p><img src=\"/db128da0e3d5e449bf98248eeb11ab13/activating-passwordless-login-in-loginradius-1024x504.webp\" alt=\"activating passwordless login in loginradius dashboard\"></p>\n<h3 id=\"passwordless-authentication-with-loginradius-is-a-three-fold-process\" style=\"position:relative;\"><a href=\"#passwordless-authentication-with-loginradius-is-a-three-fold-process\" aria-label=\"passwordless authentication with loginradius is a three fold process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless authentication with LoginRadius is a three-fold process. </h3>\n<p><strong>Step 1:</strong> On the website login page, a customer will be asked to enter the email address. It will act as their username too.</p>\n<p><strong>Step 2:</strong> LoginRadius will send a temporary verification link to the associated email address. You can custom-set the duration that link will remain active before it expires.</p>\n<p><strong>Step 3:</strong> The customer is prompted to click the verification link, which is then authenticated and redirected to the website the customer originated from.</p>\n<p>It’s as simple as that!</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Not only is remembering password characters a pain but logging in by password alone is not very secure. By removing passwords, you can reduce costs to your IT and customer service departments. The icing on the cake is that passwordless logins improve customer experience. That’s great for your brand reputation and your bottom line.</p>\n<p>If your company is not on board with passwordless authentication yet, the time to act is now.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p>Q: Is passwordless authentication safer?</p>\n<p>A: Yes, passwordless authentication is considered safer as it eliminates the vulnerabilities associated with traditional passwords, such as phishing and brute force attacks.</p>\n<p>Q: What is the difference between passwordless and OTP?</p>\n<p>A: Passwordless authentication eliminates the need for a password entirely, relying on methods like biometrics or magic links. OTP (One-Time Password) is a temporary code sent to a user's device, often used as a second factor in authentication.</p>\n<p>Q: What is the difference between passwordless and SSO?</p>\n<p>A: Passwordless authentication focuses on eliminating passwords, while Single Sign-On (SSO) allows users to access multiple applications with one set of login credentials.</p>\n<p>Q: What is 2FA or passwordless?</p>\n<p>A: 2FA (Two-Factor Authentication) requires two forms of verification for access. Passwordless authentication, on the other hand, allows users to log in without using a traditional password, using methods like biometrics or email links.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=passwordless-authentication-the-future-of-identity-and-security\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 11, 2019","updated_date":null,"description":"The war cry among experts lately when it comes to online safety is: The future is passwordless! So, why does passwordless authentication matter so much?","title":"The Role of Passwordless Authentication in Securing Digital Identity","tags":["passwordless authentication","digital identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4598540145985401,"src":"/static/4e610fa1793a4c84532bd855d762bbbf/58556/passwordless-auth.webp","srcSet":"/static/4e610fa1793a4c84532bd855d762bbbf/61e93/passwordless-auth.webp 200w,\n/static/4e610fa1793a4c84532bd855d762bbbf/1f5c5/passwordless-auth.webp 400w,\n/static/4e610fa1793a4c84532bd855d762bbbf/58556/passwordless-auth.webp 800w,\n/static/4e610fa1793a4c84532bd855d762bbbf/cc834/passwordless-auth.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"At LoginRadius, we are passionate about creating efficient processes to provide seamless online login experiences. At the KuppingerCole…","fields":{"slug":"/identity/kuppingercole-ciw-presentation/"},"html":"<p>At LoginRadius, we are passionate about creating efficient processes to provide seamless online login experiences. At the <a href=\"https://www.kuppingercole.com/events/ciwusa2019\">KuppingerCole Consumer Identity World</a> event in Seattle, our CEO, Rakesh Soni, gave an insightful presentation on the importance of Marketing and Engineering collaboration to achieve this goal. In essence, working together maximize's each team's strength by eliminating each team's limitations. His presentation can be downloaded <a href=\"http://go.pardot.com/l/547662/2019-10-01/725pkx/547662/299407/LoginRadiusBlog_KCCIW2019.pdf\">here</a> and you can read the summary below. </p>\n<h1 id=\"what-is-consumer-identity-world\" style=\"position:relative;\"><a href=\"#what-is-consumer-identity-world\" aria-label=\"what is consumer identity world permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Consumer Identity World?</h1>\n<p>Consumer Identity World is a three-day annual conference hosted by KuppingerCole for leaders who secure consumer digital identities. Topics for discussion often include Customer Identity &#x26; Access Management (CIAM) strategies, customer privacy and consent management, and methods for improving customer experience.  </p>\n<p>KuppingerCole is a renowned, independent analyst organization that specializes in neutral advice, thought leadership, and practical relevance regarding CIAM, as well as IAM. The latter acronym stands for Identity &#x26; Access Management. Simply put, IAM is a platform built for managing and securing <em>employee</em> identities, rather than customer identities. More information about the difference between IAM vs. CIAM can be found <a href=\"https://www.loginradius.com/blog/2019/03/iam-vs-ciam/\">here</a>.</p>\n<h1 id=\"improving-security-and-service-for-customer-digital-identities\" style=\"position:relative;\"><a href=\"#improving-security-and-service-for-customer-digital-identities\" aria-label=\"improving security and service for customer digital identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improving security and service for customer digital identities</h1>\n<p>Throughout the three days at Consumer Identity World, attendees networked and learned about the latest news in data security, privacy regulations, and login authentication. Our CEO, Rakesh, contributed to this conversation with a presentation on the vital need for Marketing and Engineering teams to unite. By combining the skills and insights of both teams, companies can better serve today’s modern digital user. </p>\n<h2 id=\"characteristics-of-the-modern-digital-user\" style=\"position:relative;\"><a href=\"#characteristics-of-the-modern-digital-user\" aria-label=\"characteristics of the modern digital user permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Characteristics of the modern digital user</h2>\n<p>Society is constantly becoming more digitalized. Online services completely changed consumer behavior—we shop, pay bills, and call rides online. So, when businesses provide services, they should understand the characteristics of today’s digital users. Here are a few:  </p>\n<ul>\n<li>Digital users are aware of what new technology can do (<a href=\"https://www.superoffice.com/blog/digital-transformation/\">SuperOffice</a>)</li>\n<li>They expect a frictionless experience (<a href=\"https://www.globenewswire.com/news-release/2018/08/21/1554497/0/en/New-Report-Shows-Identity-Verification-a-Priority-for-eCommerce-and-Online-Lending-Businesses.html\">Whitepages Pro</a>)</li>\n<li>They prefer self-service over human assistance (<a href=\"https://www.superoffice.com/blog/customer-self-service/\">Whitepages Pro</a>)</li>\n<li>They expect an <a href=\"https://www.loginradius.com/blog/growth/omnichannel-customer-experience/\">omnichannel</a> experience.</li>\n</ul>\n<p>Rakesh also stressed that digital users want quick, hassle-free service when: </p>\n<ul>\n<li>Arriving at a website—pages should load quickly </li>\n<li>Registering or requesting forgotten passwords </li>\n<li>Logging in or authenticating—systems should not crash</li>\n</ul>\n<h2 id=\"challenge-marketing--engineering-teams-are-so-different\" style=\"position:relative;\"><a href=\"#challenge-marketing--engineering-teams-are-so-different\" aria-label=\"challenge marketing  engineering teams are so different permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenge: Marketing &#x26; Engineering teams are so different</h2>\n<p><strong>Marketing Team Strengths</strong></p>\n<ul>\n<li>Messaging</li>\n<li>Visuals</li>\n<li>UX</li>\n</ul>\n<p><strong>Marketing Team Weaknesses</strong></p>\n<ul>\n<li>Software technicalities</li>\n<li>Influence on website speed</li>\n</ul>\n<p><strong>Engineering Team</strong> <strong>Strengths</strong></p>\n<ul>\n<li>Customer identity data input/output </li>\n<li>Web development</li>\n</ul>\n<p><strong>Engineering Team</strong> <strong>Weaknesses</strong></p>\n<ul>\n<li>Addressing Customer Experience (CX) </li>\n<li>Improving and implementing CX </li>\n</ul>\n<h2 id=\"solution-marketing-and-engineering-teams-can-collaborate\" style=\"position:relative;\"><a href=\"#solution-marketing-and-engineering-teams-can-collaborate\" aria-label=\"solution marketing and engineering teams can collaborate permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Solution: Marketing and Engineering teams can collaborate.</h2>\n<p> By combining their different skills and insights two teams become a stronger whole.</p>\n<h2 id=\"initiating-collaboration\" style=\"position:relative;\"><a href=\"#initiating-collaboration\" aria-label=\"initiating collaboration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Initiating collaboration</h2>\n<p>There are two main ways to join Marketing and Engineering teams, so you can create a modern online experience. Here’s how your Executive Team can help implement this.</p>\n<p>The first way is for the Executive team to create a culture of collaboration between Marketing and Engineering. </p>\n<p>Make it clear that they both have the same goal:</p>\n<p>Both teams want to provide a frictionless online experience for customers. </p>\n<p><a href=\"https://www.loginradius.com/resource/kuppingercole-2019-consumer-authentication-report\"><img src=\"/ec87d1feea4c4c2a8af7c538293caba4/kuppingercole.webp\" alt=\"kuppingercole\"></a></p>\n<p>Next, highlight each team’s strengths and how the other team contributes to the overall goal. Management should ensure their teams feel empowered and excited to work with each other. </p>\n<p>Additionally, the Executive team should seek to build a team of experts. This team should be responsible for developing and maintaining a high-performance system. </p>\n<p>Vital features of this system include:</p>\n<ul>\n<li>Unified experience across different brands under a parent organization</li>\n<li>Quick API response time of less than 400 ms</li>\n<li>Handle large peak loads of 100,000 logins/second</li>\n<li>Guarantee 99.99% system uptime</li>\n<li>Send password reset emails in less than 3 seconds</li>\n<li>Load pages in less than 750 ms</li>\n</ul>\n<p>Your collaborative dream team should include individuals who specialize in identity, DevOps, third-party integrations, UX, and consumer behaviour. They should continue to research and develop a high performing customer ID and experience engine. Once this in place, this team of experts should work to continuously maintain it. </p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>Creating collaboration between Marketing and Engineering can greatly improve online services. This culture and structure of working together is key in meeting these needs and evolving in the future. And it is up to the Executive team to ensure that this collaboration is successful. <br>\n<a href=\"http://go.pardot.com/l/547662/2019-10-01/725pkx/547662/299407/LoginRadiusBlog_KCCIW2019.pdf\">Click here</a> to download a PDF of the full presentation.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 04, 2019","updated_date":null,"description":"We are enthusiastic about building successful processes at LoginRadius to provide smooth online login experiences. Our CEO, Rakesh Soni, gave an informative presentation at the KuppingerCole Customer Identity World event in Seattle on the importance of collaboration between Marketing and Engineering to achieve this objective. In essence, working together maximises the power of each team by minimising the shortcomings of each team. It is possible to download his presentation here and you can read the review below.","title":"LoginRadius presents at KuppingerCole Consumer Identity World","tags":["media-and-publication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/f623b52e92b5b2b069bd4bd056b1ca35/7f8e9/kuppingercole-ciw-presentation.webp","srcSet":"/static/f623b52e92b5b2b069bd4bd056b1ca35/61e93/kuppingercole-ciw-presentation.webp 200w,\n/static/f623b52e92b5b2b069bd4bd056b1ca35/1f5c5/kuppingercole-ciw-presentation.webp 400w,\n/static/f623b52e92b5b2b069bd4bd056b1ca35/7f8e9/kuppingercole-ciw-presentation.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"In business, digital identity management primarily refers to the way a customer’s personal information is safely collected, stored, and…","fields":{"slug":"/identity/digital-identity-management/"},"html":"<p>In business, <a href=\"https://www.loginradius.com/blog/growth/identity-management-critical-revenue-generation/\">digital identity management</a> primarily refers to the way a customer’s personal information is safely collected, stored, and accessed.</p>\n<p>While this may appear simple, many businesses fall prey to misconceptions about building or managing a customer’s digital identity. To help you leverage customer identity data, let’s discuss the top three misconceptions that trip businesses up.</p>\n<p><img src=\"/f3d824c7434598f4c7e2ab2dbf1db537/Digital-Identity-Management-5-Ways-to-Win-V01.02-02-1024x576.webp\"></p>\n<h2 id=\"3-common-misconceptions-around-digital-identity\" style=\"position:relative;\"><a href=\"#3-common-misconceptions-around-digital-identity\" aria-label=\"3 common misconceptions around digital identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Common misconceptions around digital identity</h2>\n<ol>\n<li><strong>“<em>A digital identity must use highly personal identifiable information</em>.”</strong> </li>\n</ol>\n<p>Many businesses make the mistake of putting sensitive personal information like full names or social insurance numbers in their system to track customer identities. Due to the proliferation of data breaches, this is risky. Safer methods should be used instead, such as coded customer numbers.</p>\n<p>2. <strong>“<em>You can only get customer insights from surveys or forms.</em>”</strong></p>\n<p>Sure, one way of getting consumer insights is having them fill out a form on your site. Another way is to use a device ID to identify customer behavior</p>\n<p>But what about consumers who own multiple devices, have separate digital IDs at work and home, and access the internet through multiple IP addresses or 3rd-party apps? When you gather data from multiple sources, you’ll need to compile this and store it in one place. But how?</p>\n<p>With <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) software, you can access an individual’s extensive data from multiple sources. Even “anonymous” user data can help you create a customer identity. You can even gather data through <a href=\"https://www.loginradius.com/progressive-profiling/\">progressive profiling</a>—a gradual, more natural way for customers to share their personal information.   </p>\n<p>3. <strong>“<em>Consumer behavior analytics is all you need.</em>”</strong></p>\n<p>Due to marketing’s reliance on user experience mapping, session analytics, and content engagements, this myth is rampant. As a result, many businesses mistakenly think “behavioral” data is all they need for digital identity management. Not true. In the next section, we’ll explain why.  </p>\n<ul>\n<li><img src=\"/b94010577baaf8e693d46fc305da47a4/01-dashboard-1024x865.webp\"></li>\n</ul>\n<h2 id=\"why-is-digital-identity-management-important\" style=\"position:relative;\"><a href=\"#why-is-digital-identity-management-important\" aria-label=\"why is digital identity management important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is digital identity management important?</h2>\n<p>We live in an era where data is the most valuable commodity in the world. However, where there is <em>value,</em> there is also <em>risk</em>. For instance...</p>\n<p><strong>Did you know that <a href=\"https://www.inc.com/thomas-koulopoulos/the-biggest-risk-to-your-business-cant-be-eliminated-heres-how-you-can-survive-i.html\">60% of companies fail</a> within 6 months of a cyber attack?</strong></p>\n<p>Malicious software, hackers, online fraud, and user errors all pose a danger to the digital identification data that you collect or store. </p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-trends-2019/\"><img src=\"/ec1776169c43e41554911ec0182070ed/digital-identity-trends-2019.webp\" alt=\"digital-identity-trends-2019\"></a></p>\n<p>For businesses that collect or store customer data, security is vital to winning and maintaining customer trust. If you’re uncertain how, here are 5 methods that can help.</p>\n<h2 id=\"5-gold-standards-for-winning-customer-trust\" style=\"position:relative;\"><a href=\"#5-gold-standards-for-winning-customer-trust\" aria-label=\"5 gold standards for winning customer trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Gold Standards for Winning Customer Trust</h2>\n<p>1. <strong>Collect only what’s needed</strong></p>\n<p>Many businesses are quick to collect an array of customer data during the registration process. If you don’t take the time to consider if/why/how you’ll use all of this data— or determine the right time to collect this information—you’ll run into a lot of issues. </p>\n<p>Collecting unnecessary data wastes resources and increases the risk of identity theft. Plus, gathering too much data also causes customers to abandon registration, as it slows down the process and feels intrusive.  </p>\n<p>2. <strong>Invest in data encryption and hashing.</strong></p>\n<p>When data is in transit from one server to another, it’s at its most vulnerable. That’s why <a href=\"https://www.loginradius.com/data-governance/\">encryption in transit</a> is crucial to data protection. Likewise, encryption at rest is necessary for data governance and compliance efforts. </p>\n<p>When it comes to hackers, anything that has been coded can be decoded. Thus, utilizing <a href=\"https://www.loginradius.com/docs/infrastructure-and-security/cryptographic-hashing-algorithms/\">one-way hashing</a> for safeguarding sensitive data like passwords is a must-do.</p>\n<p>Safety Tip: When you implement encryption at rest and encryption in transit, be sure that you’re using a platform with an ISO 27001 certification. This ensures that your system complies with industry-leading standards for information security and risk management.   </p>\n<p>3. <strong>Limit access to data.</strong></p>\n<p>Not all data is in use continuously. That’s why sensitive customer data should not be accessible to everyone, all the time. </p>\n<p>Utilizing field-level encryption allows you to set up access based on an individual’s role. In other words, field-level encryption is the ability to encrypt data within specific <a href=\"https://searchoracle.techtarget.com/definition/field\">data fields</a>, making this data unreadable to anyone who lacks access or the keys to decrypt this data.  </p>\n<p>4. <strong>Require safer authentication.</strong></p>\n<p>While some tech-savvy users know how to look after their personal information, many are unaware of how digital identity verification impacts security. </p>\n<p>To reduce risk, it’s important to invest in systems that enable a higher level of passwordless login. One method, <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multi-factor authentication</a> (MFA), uses an SMS or a call-in code, and/or an email link as extra levels of security. </p>\n<p>Another method, risk-based authentication (RBA), recognizes user patterns and alerts your system if this pattern suddenly changes. For example, if someone tries to log in from a foreign country or a new IP address, an email will be sent to the registered user, asking them to validate the action.   </p>\n<p>5. <strong>Respect your customers.</strong></p>\n<p>In the past, digital identity management practices were not very respectful of customer privacy. But soon, customers demanded better—and <a href=\"https://en.wikipedia.org/wiki/Regulatory_compliance\">compliance regulations</a> were born. </p>\n<p>Compliance regulations require businesses to communicate with customers about why their data is collected, by whom, and what will be done with it. It also demands customer consent before collecting their data.</p>\n<p>Did you know that requesting consent can also strengthen your brand reputation and build customer trust? That’s why it’s smart to employ a <a href=\"https://www.loginradius.com/compliances/\">compliance-ready platform</a> now. This will prepare your business for global data regulations while also fostering customer loyalty.</p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p><strong>Is there one way to achieve all 5 gold standards?</strong>  </p>\n<p>Yes—with CIAM software. LoginRadius CIAM offers a variety of highly-secure customer identity management features. For added peace of mind, LoginRadius keeps its platforms ahead of emerging data regulations and consistently performs rigorous updates.</p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-trends-2020/\"><img src=\"/c024cf67b6f7b1fa45d6e3b19bead603/LoginRadius-Consumer-Identity-Trend-Report-1-1024x310.webp\" alt=\"LoginRadius Consumer Identity Trend Report\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 01, 2019","updated_date":null,"description":"In industry , digital identity management relates specifically to how the personal information of a customer is obtained, processed, and accessed safely.","title":"Digital Identity Management: 5 Ways to Win Customer Trust","tags":["digital identity management","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7241379310344827,"src":"/static/8714c2a907a14fa58a5ebfc556e430b7/7f8e9/digital-identity-mngmnt.webp","srcSet":"/static/8714c2a907a14fa58a5ebfc556e430b7/61e93/digital-identity-mngmnt.webp 200w,\n/static/8714c2a907a14fa58a5ebfc556e430b7/1f5c5/digital-identity-mngmnt.webp 400w,\n/static/8714c2a907a14fa58a5ebfc556e430b7/7f8e9/digital-identity-mngmnt.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":834,"currentPage":140,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}