{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/147","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"In today’s digitally connected world, superior customer experience is one of the biggest drivers for company success. At the heart of that…","fields":{"slug":"/identity/digital-transformation-safeguarding-customer-experience/"},"html":"<p>In today’s digitally connected world, superior customer experience is one of the biggest drivers for company success. At the heart of that experience is personalization, which harnesses the power of digital transformation in order to create curated experiences that can drive consumer engagement and differentiation in the market.</p>\n<p>A <a href=\"https://www.accenture.com/t20180503T034117Z__w__/nl-en/_acnmedia/PDF-77/Accenture-Pulse-Survey.pdf\">recent survey by Accenture Interactive</a> found that 48% of consumers have left a company’s website in favour of another simply because it lacked personalization, and that trend is increasing annually. This statistic means two things. First, personalization has become the priority for nearly all business. Second, consumers have more power than ever to switch brands if their experience lacks that personal touch.</p>\n<p>However, in order to provide a personalized experience, businesses need to collect more data about their customers. 83% of consumers are willing to share their data in order to enable a personalized experience, so long as businesses are transparent about how they plan to use that data.</p>\n<p>With that said, customers still care deeply about the security and privacy of their personal data, and organizations that fail to protect it will face a number of consequences. This is where a customer identity and access management (CIAM) solution comes in. The <a href=\"https://www.loginradius.com/\">LoginRadius CIAM platform</a> not only helps organizations collect better data about their customers, but it provides a number of safeguards to protect that data.</p>\n<h2 id=\"how-does-loginradius-store-data-securely\" style=\"position:relative;\"><a href=\"#how-does-loginradius-store-data-securely\" aria-label=\"how does loginradius store data securely permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does LoginRadius store data securely?</h2>\n<p>The LoginRadius platform is built with <a href=\"https://www.loginradius.com/security/\">security as the top priority</a>, incorporating the highest security standards to ensure that customer data is always protected. From client browsers to the application to internal databases, personal data is always transferred following Open Authentication 2.0 protocols through an encrypted HTTPS tunnel. Our platform also incorporates end-to-end SSL encryption, which secures sensitive customer data to prevent unauthorized access and rogue attacks.</p>\n<p>LoginRadius <a href=\"https://www.loginradius.com/resource/loginradius-ciam-user-data-storage/\">user data storage</a> is also a key differentiator in the CIAM market. Our platform uses Microsoft Azure as the cloud hosting platform for all production environments, meaning that customer profiles are stored on this cloud platform by default. LoginRadius stores customer data in 29 global data centres, all of which feature separate firewalled databases for each client at the highest level of security, as well as a robust backup and recovery system.</p>\n<h2 id=\"loginradius-security-certifications\" style=\"position:relative;\"><a href=\"#loginradius-security-certifications\" aria-label=\"loginradius security certifications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius Security Certifications</h2>\n<p>The LoginRadius CIAM platform has hosting and data security approval for all of the most commonly used compliances:</p>\n<ul>\n<li>SOC 1/SSAE 16/ISAE 3402 and SOC 2</li>\n<li>Cloud Security Alliance CCM</li>\n<li>FISMA</li>\n<li>PCI DSS Level 1</li>\n<li>UK Government G-Cloud</li>\n<li>Australian Government IRAP</li>\n<li>HIPAA</li>\n<li>CDSA</li>\n<li>US-EU Safe Harbor</li>\n</ul>\n<p>Many of these certifications involve rigorous third-party assessment of either our cloud service or our data management and security practices. They also help us achieve compliance with the EU GDPR: the most significant privacy legislation to impact how organizations deal with their customers’ information.</p>\n<p><a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\"><img src=\"/d45b10c2827e315e3e240d8b332af5d7/core-of-digital-transformation.webp\" alt=\"core-of-digital-transformation\"></a></p>\n<p>In order to <a href=\"https://www.loginradius.com/resource/loginradius-and-gdpr-compliance/\">comply with the GDPR</a>, LoginRadius has worked hard to ensure that our products and capabilities are leveraged to guarantee data privacy and compliance for every one of our 3,000+ customers. Some of these features include gaining <a href=\"https://www.loginradius.com/blog/identity/consent-management/\">customer consent</a> for access to their personal data, allowing customers to view, export, and edit their personal data at any time, and providing customers with a <em>right to be forgotten</em> by deleting their accounts entirely.</p>\n<p>If you’re interested in learning more about how the LoginRadius platform works, <a href=\"https://www.loginradius.com/schedule-demo/\">schedule a demo</a> today.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 03, 2018","updated_date":null,"description":"Superior customer service is one of the key factors for company success in today's digitally linked world. Personalization, which harnesses the power of digital transformation in order to create curated interactions that can fuel customer engagement and market differentiation, is at the core of the experience.","title":"Digital Transformation: Safeguarding the Customer Experience","tags":["digital transformation","customer identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7094017094017093,"src":"/static/f8c805060a1d86103f0f16bf8295cde3/58556/digital-transformation-safeguarding.webp","srcSet":"/static/f8c805060a1d86103f0f16bf8295cde3/61e93/digital-transformation-safeguarding.webp 200w,\n/static/f8c805060a1d86103f0f16bf8295cde3/1f5c5/digital-transformation-safeguarding.webp 400w,\n/static/f8c805060a1d86103f0f16bf8295cde3/58556/digital-transformation-safeguarding.webp 800w,\n/static/f8c805060a1d86103f0f16bf8295cde3/99238/digital-transformation-safeguarding.webp 1200w,\n/static/f8c805060a1d86103f0f16bf8295cde3/90fb1/digital-transformation-safeguarding.webp 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Founded in 1928, Rede Gazeta started with one newspaper, A Gazeta. Throughout the years, it has grown into the largest communication network…","fields":{"slug":"/identity/rede-gazeta-loginradius-customer-success-story/"},"html":"<p><img src=\"/3950db75a56792db737ff33cf87d506f/logo_redegazeta-300x212.webp\"></p>\n<p>Founded in 1928, <a href=\"https://en.wikipedia.org/wiki/TV_Gazeta\">Rede Gazeta</a> started with one newspaper, A Gazeta. Throughout the years, it has grown into the largest communication network in the Espírito Santo region of Brazil. It has  a network of 19 businesses that touches various forms of media outlets, including print newspapers, online media, editorial photography, radio stations, and broadcasting.</p>\n<p>Rede Gazeta operates based on the commitment to innovation, quality content, and ethical conduct, and this belief and true throughout its entire organization.</p>\n<h2 id=\"the-situation\" style=\"position:relative;\"><a href=\"#the-situation\" aria-label=\"the situation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Situation</h2>\n<p>As one of the most important media corporations in Brazil, Rede Gazeta needs to ensure that they are constantly innovating how to best understand their audiences in order to stay relevant. The most important aspect of what they do, is understanding the content that is the most relevant and interesting to their audience.</p>\n<h2 id=\"the-challenges\" style=\"position:relative;\"><a href=\"#the-challenges\" aria-label=\"the challenges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Challenges</h2>\n<ul>\n<li><strong>Understanding the data</strong></li>\n<li>\n<ul>\n<li>With data from multiple sources, they struggled to consolidate everything and truly understand what their readers were looking for.</li>\n</ul>\n</li>\n<li><strong>Updating the infrastructure</strong></li>\n<li>\n<ul>\n<li>It was difficult to keep track and make sure that the APIs from all of the social networks were updated at all times</li>\n</ul>\n</li>\n<li><strong>Time consuming</strong></li>\n<li>\n<ul>\n<li>Instead of putting time towards innovating ways to reach their audience and working on future initiatives, the team was weighed down with the workload to maintain their existing infrastructure and APIs.</li>\n</ul>\n</li>\n</ul>\n<h2 id=\"the-loginradius-solution\" style=\"position:relative;\"><a href=\"#the-loginradius-solution\" aria-label=\"the loginradius solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The LoginRadius Solution</h2>\n<ul>\n<li><strong>Social Login</strong></li>\n<li>\n<ul>\n<li>With <a href=\"https://www.loginradius.com/social-login/\">LoginRadius' social login solution</a>, we took over the responsibility of maintaining and updating the social APIs to ensure that they are always up to date. We handle everything so Rede Gazeta can free up their time to focus on their own projects and initiatives.</li>\n</ul>\n</li>\n<li><strong>Customizable interface</strong></li>\n<li>\n<ul>\n<li>By using LoginRadius' dashboard, Rede Gazeta can easily customize and make any necessary changes to their registration page. Even though it is managed through LoginRadius, Rede Gazeta has full control over the look and feel of their registration page.</li>\n</ul>\n</li>\n<li>\n<p><strong>Integration</strong></p>\n<ul>\n<li><em>CXense</em></li>\n</ul>\n</li>\n<li>\n<ul>\n<li>\n<ul>\n<li>Through LoginRadius, Rede Gazeta was able to set up an integration with CXense, a data management platform, where the data stored in LoginRadius is automatically synced with the CXense database. This ensures that their data is unified at all times for further analysis.</li>\n</ul>\n</li>\n<li><em>Google Analytics</em></li>\n</ul>\n</li>\n<li>\n<ul>\n<li>\n<ul>\n<li>With the Google Analytics integration, Rede Gazeta can automatically track the user activity of their readers and have that information stored in the unified profiles in LoginRadius. This, along with the CXsense integration, provides Rede Gazeta with a centralized view of their audience. They now have all the information they need to know and generate the content that their users want to read.</li>\n</ul>\n</li>\n</ul>\n</li>\n</ul>\n<iframe width=\"853\" height=\"480\" src=\"https://www.youtube.com/embed/YROtRO5GpbQ\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen></iframe>\n<p>Rede Gazeta - LoginRadius Customer Success Story</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=rede-gazeta-loginradius-customer-success-story\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 06, 2018","updated_date":null,"description":"By implementing LoginRadius, Rede Gazeta now have an even better understanding of what their readers are interested in, and can devote their time into generating quality content that their users want to read.","title":"Rede Gazeta, a LoginRadius Customer Success Story","tags":["media-and-publication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/7ee981b07948cc9f29e88d5b4ad83f6a/58556/lr-and-rede-gazeta.webp","srcSet":"/static/7ee981b07948cc9f29e88d5b4ad83f6a/61e93/lr-and-rede-gazeta.webp 200w,\n/static/7ee981b07948cc9f29e88d5b4ad83f6a/1f5c5/lr-and-rede-gazeta.webp 400w,\n/static/7ee981b07948cc9f29e88d5b4ad83f6a/58556/lr-and-rede-gazeta.webp 800w,\n/static/7ee981b07948cc9f29e88d5b4ad83f6a/2ed18/lr-and-rede-gazeta.webp 959w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Karl Wittig","github":null,"avatar":null}}}},{"node":{"excerpt":"Everywhere you look, companies are announcing plans to undergo digital business transformations. The problem they are facing, however, is…","fields":{"slug":"/growth/4-things-consider-starting-digital-transformation/"},"html":"<p>Everywhere you look, companies are announcing plans to undergo digital business transformations. The problem they are facing, however, is deciding where to start. </p>\n<p>A recent study by Gartner found that 66% of leaders have plans for a digital transformation, but only 11% are actually able to achieve it at scale. And the reason for these poor results? A whopping 57% of organizations are struggling to find a starting point for their transformation. If you happen to be one of these organizations, keep reading for the top 4 things to consider when starting a digital transformation.</p>\n<h2 id=\"1-get-connected-and-bring-value-to-your-organization\" style=\"position:relative;\"><a href=\"#1-get-connected-and-bring-value-to-your-organization\" aria-label=\"1 get connected and bring value to your organization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Get Connected and Bring Value to Your Organization</h2>\n<p><img src=\"/e4851a4457e73f5acc036386b7e501c7/rawpixel-268378-unsplash-1024x683.webp\" alt=\"rawpixel\"></p>\n<p>A good place to start your digital transformation is to build initiatives that focus on changing your operating model. But what does being more connected actually mean? Well, for starters, one of the main ways that companies are getting more connected is by making their data more available and transparent across their entire digital ecosystem. This will actually help you make money in new ways. For example, you can gather and use that data to create new revenue-generating services.</p>\n<p>Being more connected will help your organization cross the threshold of your transformation to enable you, your suppliers, partners, and customers to work more closely together, and improve value throughout your business.</p>\n<h2 id=\"2-optimize-your-business-initiatives-with-automation-tools\" style=\"position:relative;\"><a href=\"#2-optimize-your-business-initiatives-with-automation-tools\" aria-label=\"2 optimize your business initiatives with automation tools permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Optimize Your Business Initiatives with Automation Tools</h2>\n<p><img src=\"/a0d6ddb148ed98b592914d9f3843ec65/austin-chan-275638-unsplash-1024x683.webp\"></p>\n<p>Automation tends to overlap with all the other starting points, but it will truly help you reinvent the way that value is delivered. For example, with automation tools, data can flow in real-time and be automatically updated across your entire digital ecosystem.</p>\n<p>This not only greatly improves productivity, but can also enable you to understand your audience and thus deliver more value to your customers. This tends to be a great starting point for organizations as it helps decrease cost, reduce time to value, and change the way you engage with your customers.</p>\n<h2 id=\"3-empower-your-business-partners-and-customers\" style=\"position:relative;\"><a href=\"#3-empower-your-business-partners-and-customers\" aria-label=\"3 empower your business partners and customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Empower Your Business Partners and Customers</h2>\n<p><img src=\"/db1f8485bea2478e4991f1c0dce31ad1/jordan-mcqueen-99269-unsplash-1024x683.webp\"></p>\n<p>While the first two steps are focused on improving your operating model, this one will help you change your business model completely. For example, by utilizing the right tools and technology, you will be able to empower your partners and customers to create value for themselves, which will multiply your business's potential.</p>\n<p>But what does this actually mean?</p>\n<p>Instead of you proving to your partners and customers the benefits of working with you, you are providing them with the tools so they can easily discover this for themselves. Not only that, but this also enables you to provide a self-serve model throughout your business, so you can focus your resources on improving your services and offerings.</p>\n<h2 id=\"4-programmable-platforms-to-bring-value-to-you\" style=\"position:relative;\"><a href=\"#4-programmable-platforms-to-bring-value-to-you\" aria-label=\"4 programmable platforms to bring value to you permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Programmable Platforms to Bring Value to YOU</h2>\n<p><img src=\"/46a6a6ebc9be07a22e1750de82abc30c/riccardo-annandale-140624-unsplash-e1533839787184-1024x714.webp\" alt=\"riccardo-annandale\"></p>\n<p>This last step is key, as it will help you focus on changing both your business and operating models. Simply by utilizing others to help create and deliver the value to your business. For example, instead of using your own resources to build tools that would help bring value, you can outsource and have experts do it for you, so you can focus on what you do best. </p>\n<p>One great tool that would help you achieve this, is a <a href=\"https://www.loginradius.com/blog/identity/guide-choosing-right-ciam-solution/\">CIAM solution</a>. These platforms are a huge help in regards to helping you manage and secure you customers' data and identities. And another great thing about them? The newer platforms are completely cloud-based and are managed for you. Meaning the potential for the value it could bring to you are endless.</p>\n<p>Curious about what value this could bring you? Check out these resources to <a href=\"https://www.loginradius.com/customer-identity-management-b2c-ciam/\">learn more</a>.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 09, 2018","updated_date":null,"description":"Everywhere you look, businesses are revealing plans to undergo digital business transformations. The problem they are facing, though is deciding where to start.","title":"4 Things to Consider When Starting a Digital Transformation","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/4a1081cf267e11e5e806e5ac92dc1aef/58556/4-things-consider-starting-digital-transformation.webp","srcSet":"/static/4a1081cf267e11e5e806e5ac92dc1aef/61e93/4-things-consider-starting-digital-transformation.webp 200w,\n/static/4a1081cf267e11e5e806e5ac92dc1aef/1f5c5/4-things-consider-starting-digital-transformation.webp 400w,\n/static/4a1081cf267e11e5e806e5ac92dc1aef/58556/4-things-consider-starting-digital-transformation.webp 800w,\n/static/4a1081cf267e11e5e806e5ac92dc1aef/99238/4-things-consider-starting-digital-transformation.webp 1200w,\n/static/4a1081cf267e11e5e806e5ac92dc1aef/7c22d/4-things-consider-starting-digital-transformation.webp 1600w,\n/static/4a1081cf267e11e5e806e5ac92dc1aef/d664d/4-things-consider-starting-digital-transformation.webp 2678w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"The movement towards digitalization is occurring across all business sectors. Even industries that have always been solely focused on…","fields":{"slug":"/identity/4-barriers-building-digital-business-overcome/"},"html":"<p>The movement towards digitalization is occurring across all business sectors. Even industries that have always been solely focused on growing and expanding their existing business models are joining the movement. However, there are some roadblocks that these companies have to overcome in order to successfully build a digital business. But don't let these roadblocks stunt your digital growth! Here are some tips to help you along:</p>\n<h3 id=\"1-inability-to-work-as-a-team\" style=\"position:relative;\"><a href=\"#1-inability-to-work-as-a-team\" aria-label=\"1 inability to work as a team permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Inability to work as a team</h3>\n<p><img src=\"/022294cbf866ec2a1b9d2ba3bd56f4f9/rawpixel-741662-unsplash-1024x684.webp\"></p>\n<p>Many companies across industries are actively working towards transforming their businesses to digital. This includes using technology to improve/optimize the existing business model, in order to pave the way towards building more efficient digital workflows.</p>\n<p><a href=\"https://www.loginradius.com/customer-identity-management-b2c-ciam/\">Digital optimization</a> have been shown to improve business performance, enhance business intelligence and analytics, as well as increase productivity. This is why so many want to go digital, however, this is not a one person job. The problem is that sometimes companies are too keen to make this happen, that they start multiple projects with different teams at the same time. Over time, this can become scattered and the teams can lose sight of what it is they're working towards and what is expected out of them.</p>\n<p>To make sure that you don't suffer from the same fate, start by creating a dedicated digital innovation team. While it's important to make sure the team members are digitally-savvy, it's also worth noting that this shouldn't only include technical personnel, but also those from business too, as they will be directly affected by the digitized business models and processes.</p>\n<p>This team, comprised of different representations from within the company, will be able to lead the digital projects and make sure that the team expectations align with the company's goals.</p>\n<h3 id=\"2-lack-of-corporate-vision\" style=\"position:relative;\"><a href=\"#2-lack-of-corporate-vision\" aria-label=\"2 lack of corporate vision permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Lack of corporate vision</h3>\n<p><img src=\"/63d874c2efd2fc4804f091914ecf2442/glenn-carstens-peters-190592-unsplash-1024x681.webp\"></p>\n<p>While the majority of your company may have the same goal of moving towards digital, the motives and driving force behind achieving this goal can differ from one person or team to the other. Some may be looking to simply optimize the current workflows to enhance productivity and business outcomes, while others are seeing this as a move towards bigger innovations that will potentially disrupt the entire industry. In this case, there are conflicting ideas of why the company is undergoing a digital reform and how to proceed.</p>\n<p>How do you make sure this doesn't happen? It's important to lay out a clear roadmap for all of the members involved in the digital transformation to make sure that everyone is clear about the path that the company is taking towards this initiative.</p>\n<p>In order to do this, however, you first need to consider and be certain to communicate the company's goals for building a digital business: Are you in it to simply optimize your current processes and pave the way for digital growth? Or are you looking to invest heavily in digital innovation with the goal of disrupting the entire industry?</p>\n<h3 id=\"3-gaps-in-organizational-capabilities-to-deliver-digital-innovation\" style=\"position:relative;\"><a href=\"#3-gaps-in-organizational-capabilities-to-deliver-digital-innovation\" aria-label=\"3 gaps in organizational capabilities to deliver digital innovation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Gaps in organizational capabilities to deliver digital innovation</h3>\n<p><img src=\"/f12d88a5d63e25a3ab99f5adf6c9a49b/james-pond-185593-unsplash-1024x683.webp\"></p>\n<p>Your goals are set and you've got everyone on board to work towards a common digital outcome.</p>\n<p>Now what?</p>\n<p>Now is time to evaluate the capabilities within your company - not only the people and their skills, but more importantly, the company's resources and infrastructure. Do you have the systems and resources in place for digital operations?</p>\n<p>This is the stage where you need to evaluate your internal resources, including the current technology build, systems, <a href=\"https://www.calendar.com/artificial-intelligence/\">AI</a>, and software. This will give you a clear picture of the tools you already have and what else you need in order for a successful digital optimization.</p>\n<p>More often than not, it's not the team's incapabilities to deliver certain results, but the tools they are given. Make sure you give them what they need in order for them to successfully help you realize your goal of building a digital business.</p>\n<h3 id=\"4-inadequate-leadership\" style=\"position:relative;\"><a href=\"#4-inadequate-leadership\" aria-label=\"4 inadequate leadership permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Inadequate leadership</h3>\n<p><img src=\"/31f14c901460c607d72224376e3f3b68/steven-lelham-342930-unsplash-1024x540.webp\"></p>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-digital-transformation/\">Digital transformation is exciting</a>, but it is also a new concept that companies across industries are only experimenting with in the past few years. Excitement aside, new processes, especially one that affects entire business models and operations, can be daunting.</p>\n<p>Transforming existing processes and building new ones are dramatic changes that affect the entire company. Changes such as this can lead to discomfort and conflict. Therefore, strong leadership is essential at all levels to drive beneficial change without increasing risk or creating organizational chaos. Make sure you have the right leadership roles in place as the company moves towards its digital initiatives to ensure its success.</p>\n<!-- [![Digital Transformation](guide-to-modern-cover.webp)](https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/) -->\n<div class=\"custom-thumbnail\">\n  <a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\">\n    <img src=\"/3387b2d0b106772b417eccc3f7ec862a/guide-to-modern-cover.webp\" alt=\"Digital Transformation\" title=\"Digital Transformation\" >\n  </a>\n</div>\n<h3 id=\"5-lack-of-right-talent\" style=\"position:relative;\"><a href=\"#5-lack-of-right-talent\" aria-label=\"5 lack of right talent permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Lack of right talent</h3>\n<p>According to a new <a href=\"https://www.mulesoft.com/lp/reports/connectivity-benchmark\">Mulesoft study</a>, two-thirds of IT decision makers confessed to being unable to deliver on digital projects due to an IT delivery gap. The absence of business-aligned skills and talent is the single biggest obstacle to progress on digital transformation. </p>\n<p>In our experience, organisations with the right skills win twice – first, they transform faster; second, they put in place the talents necessary to keep projects on track for longer.</p>\n<p>So, given the rapid pace of digital transformation and technological advancement, companies must make bringing in the right talent and filling their skills gaps a top priority if they hope to get ahead of their competition. </p>\n<h3 id=\"6-lack-of-collaboration-with-customers\" style=\"position:relative;\"><a href=\"#6-lack-of-collaboration-with-customers\" aria-label=\"6 lack of collaboration with customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Lack of collaboration with customers</h3>\n<p>With the disruptive technologies emerging, many companies will transform or perish. Only those that create a culture of innovation, embrace new ways of working, and put the customers at the heart of their strategy will succeed.</p>\n<p>Unfortunately, old habits like the silo mentality that operates in a vacuum to deliver technology solutions are no longer sufficient. Organizations must adopt a customer-centric mentality and innovate from the inside out. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Successful digital transformation involves the full breadth of an enterprise – a strategy that spans business units and locations, as well as IT groups and departments. It can no longer be implemented by business units “going it alone” or by IT “managing the back end.” Instead, successful digital transformation requires leadership to drive disruptive change across teams, locations, functions and technology.</p>\n<p>If you or your company are currently going through digital transformation, see how <a href=\"https://www.loginradius.com/customer-identity-management-b2c-ciam/\">LoginRadius can help you speed this up</a>!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=4-barriers-building-digital-business-overcome\"><img src=\"/1bebf239d110701b9b534d7eb481a5ac/image5.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 02, 2018","updated_date":null,"description":"The world is becoming increasingly digital because consumers demand faster service and convenience from their business transactions. This shift toward digitalization requires businesses to change the way they operate. Learn about the major barriers that traditional companies face in the online space and how to overcome them.","title":"4 Barriers to Building a Digital Business and How to Overcome Them","tags":["customer-experience"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/0e21e3ce8df513d5ba242b6dc61f0c07/58556/4-barriers-building-digital-business-overcome.webp","srcSet":"/static/0e21e3ce8df513d5ba242b6dc61f0c07/61e93/4-barriers-building-digital-business-overcome.webp 200w,\n/static/0e21e3ce8df513d5ba242b6dc61f0c07/1f5c5/4-barriers-building-digital-business-overcome.webp 400w,\n/static/0e21e3ce8df513d5ba242b6dc61f0c07/58556/4-barriers-building-digital-business-overcome.webp 800w,\n/static/0e21e3ce8df513d5ba242b6dc61f0c07/99238/4-barriers-building-digital-business-overcome.webp 1200w,\n/static/0e21e3ce8df513d5ba242b6dc61f0c07/90fb1/4-barriers-building-digital-business-overcome.webp 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Today, I’m very excited to announce that LoginRadius has raised $17 million Series A funding, led by ForgePoint Capital and Microsoft’s…","fields":{"slug":"/identity/loginradius-announces-17m-series-funding-forgepoint-microsoft/"},"html":"<p><a href=\"https://www.loginradius.com/press/loginradius-announces-series-a-funding-from-forgepoint-and-microsoft-venture/\"><img src=\"/fa7a78b2c8ae160f6704287a6d651f65/funding-img.webp\"></a></p>\n<p>Today, I’m very excited to announce that <a href=\"https://www.loginradius.com/\">LoginRadius</a> has raised $17 million Series A funding, led by ForgePoint Capital and Microsoft’s venture fund, M12. In connection with the funding, both companies will also be joining our board to further our partnership, product and innovation cycles.</p>\n<p>Since LoginRadius’ launch in 2012, we have been relentlessly focused on customer identity and have experienced triple digital annual growth for the past two years.</p>\n<p>This funding opens huge possibilities for the company, in terms of helping us accelerate product innovation, and to expand globally to help serve the fast-growing $20 billion customer identity market.</p>\n<p>You can read the full Press Release <a href=\"https://www.loginradius.com/press/loginradius-announces-series-a-funding-from-forgepoint-and-microsoft-venture/\">here</a>.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 24, 2018","updated_date":null,"description":"LoginRadius, led by ForgePoint Capital and Microsoft's venture fund, M12, has raised $17 million in Series A funding. Both businesses will also join our board in conjunction with the funding to further our collaboration, product and innovation cycles.","title":"LoginRadius Announces $17M Series A Funding from ForgePoint and Microsoft","tags":["industry-news","other"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/fdb8610707cb15170f7eb2bbee9fe5be/58556/loginradius-announces-17m-series-funding.webp","srcSet":"/static/fdb8610707cb15170f7eb2bbee9fe5be/61e93/loginradius-announces-17m-series-funding.webp 200w,\n/static/fdb8610707cb15170f7eb2bbee9fe5be/1f5c5/loginradius-announces-17m-series-funding.webp 400w,\n/static/fdb8610707cb15170f7eb2bbee9fe5be/58556/loginradius-announces-17m-series-funding.webp 800w,\n/static/fdb8610707cb15170f7eb2bbee9fe5be/99238/loginradius-announces-17m-series-funding.webp 1200w,\n/static/fdb8610707cb15170f7eb2bbee9fe5be/90fb1/loginradius-announces-17m-series-funding.webp 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"A JSON Web Token (JWT) is a JSON object that is defined in RFC 7519 as a safe way of transmitting information between two parties…","fields":{"slug":"/engineering/jwt/"},"html":"<p><em>A JSON Web Token (JWT) is a JSON object that is defined in</em> <a href=\"https://tools.ietf.org/html/rfc7519\"><em>RFC 7519</em></a> <em>as a safe way</em> of <em>transmitting information between two parties. Information in the JWT is digitally-signed, so that it can be verified and trusted.</em></p>\n<p><strong>JWT Properties</strong></p>\n<ul>\n<li>Less verbose -  JWT is compact in size and can be passed in the URL, POST parameter, or HTTP header.</li>\n<li>Self-contained - JWT carries all of information needed for exchanging information and authentication.</li>\n<li>Versatile - JWT works in .NET, Python, Node.js, Java, PHP, Ruby, Go, JavaScript, and Haskell.</li>\n</ul>\n<p><strong>JWT Use Cases</strong></p>\n<ul>\n<li>Information Exchange - JWT can be used between two parties to exchange information. JWT is digitally-signed and can be used in a secure public/private key pair. Information is verified using the public key on the other end.</li>\n<li>Authentication - JWT can contain user information in the payload and can be used in the session to authenticate the user. Once authenticated, users can access protected resources in an application using the JWT included in the request. So, every request will be authenticated by verifying the JWT.</li>\n</ul>\n<p>JWT contains three parts: Header, Payload, and Signature which are separated by a dot.</p>\n<p><code>Header.Payload.Signature</code></p>\n<p><strong>Header</strong></p>\n<p>The JWT Header consists of 2 parts:</p>\n<ul>\n<li>The token type (typ): JWT </li>\n<li>Algorithm used to sign the token (alg)</li>\n</ul>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"json\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">{  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">&quot;typ&quot;</span><span class=\"mtk1\"> : </span><span class=\"mtk8\">&quot;JWT&quot;</span><span class=\"mtk1\">,  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">&quot;alg&quot;</span><span class=\"mtk1\"> : </span><span class=\"mtk8\">&quot;HS256&quot;</span><span class=\"mtk1\">  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>Header Algorithm Types:</p>\n<ul>\n<li>Symmetric Algorithms - This algorithm type uses a single secret key to both sign and verify the JWT token. For example: HMAC algorithms.</li>\n<li>Asymmetric Algorithms - This algorithm type uses a private key to sign the token and a public key to verify the signature. For example: RSA and ECDSA algorithms.</li>\n</ul>\n<p><strong>alg Value</strong></p>\n<p><strong>Digital Signature or MAC Algorithm</strong></p>\n<table>\n<thead>\n<tr>\n<th>Algo</th>\n<th align=\"center\">Description</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>HS256</td>\n<td align=\"center\">HMAC using SHA-256 hash algorithm</td>\n</tr>\n<tr>\n<td>HS384</td>\n<td align=\"center\">HMAC using SHA-384 hash algorithm</td>\n</tr>\n<tr>\n<td>HS512</td>\n<td align=\"center\">HMAC using SHA-512 hash algorithm</td>\n</tr>\n<tr>\n<td>RS256</td>\n<td align=\"center\">RSASSA using SHA-256 hash algorithm</td>\n</tr>\n<tr>\n<td>RS384</td>\n<td align=\"center\">RSASSA using SHA-384 hash algorithm</td>\n</tr>\n<tr>\n<td>RS512</td>\n<td align=\"center\">RSASSA using SHA-512 hash algorithm</td>\n</tr>\n<tr>\n<td>ES256</td>\n<td align=\"center\">ECDSA using P-256 curve and SHA-256 hash algorithm</td>\n</tr>\n<tr>\n<td>ES384</td>\n<td align=\"center\">ECDSA using P-384 curve and SHA-384 hash algorithm</td>\n</tr>\n<tr>\n<td>ES512</td>\n<td align=\"center\">ECDSA using P-521 curve and SHA-512 hash algorithm</td>\n</tr>\n</tbody>\n</table>\n<p>The Base64Url-encoded Header<strong>,</strong> which is first part of our JWT, looks like the following:</p>\n<p><code>eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9</code></p>\n<p><strong>Payload</strong></p>\n<p>The Payload, also known as the JWT claim, contains all of the information we want to transmit.</p>\n<p>Different types of claims can be used to build the Payload:</p>\n<ul>\n<li><strong>Registered Claim</strong> -  These claims are optional but recommended as they contain some metadata about the token:</li>\n</ul>\n<table>\n<thead>\n<tr>\n<th>Code</th>\n<th>Name</th>\n<th align=\"center\">Description</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>iss</td>\n<td>issuer</td>\n<td align=\"center\">Identifies the principal that issued the JWT.</td>\n</tr>\n<tr>\n<td>sub</td>\n<td>subject</td>\n<td align=\"center\">Identifies the principal that is the subject of the JWT.</td>\n</tr>\n<tr>\n<td>aud</td>\n<td>audience</td>\n<td align=\"center\">Identifies the recipients that the JWT is intended for.</td>\n</tr>\n<tr>\n<td>exp</td>\n<td>Expiration time</td>\n<td align=\"center\">Identifies the expiration time on or after which the JWT MUST NOT be accepted for processing.</td>\n</tr>\n<tr>\n<td>nbf</td>\n<td>Not before</td>\n<td align=\"center\">Identifies the time before which the JWT MUST NOT be accepted for processing.</td>\n</tr>\n<tr>\n<td>iat</td>\n<td>Issue at</td>\n<td align=\"center\">Identifies the time at which the JWT was issued.</td>\n</tr>\n<tr>\n<td>jti</td>\n<td>JWT id</td>\n<td align=\"center\">Unique identifier for the JWT, can be used to prevent the JWT from being replayed.</td>\n</tr>\n</tbody>\n</table>\n<ul>\n<li><strong>Public Claim</strong> - These claims are defined by you, such as user name, and other important information.</li>\n<li><strong>Private Claim</strong> - A producer and consumer may agree to use claim names that are private. These are subject to collision, so use them with caution.</li>\n</ul>\n<p>Example Payload:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"json\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">{  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">&quot;sub&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;1234567890&quot;</span><span class=\"mtk1\">,  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">&quot;name&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;Frank Emic&quot;</span><span class=\"mtk1\">,  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">&quot;jti&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk8\">&quot;4b5fcea6-2a5e-4a9d-97f2-3d8631ea2c5a&quot;</span><span class=\"mtk1\">,  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">&quot;iat&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk7\">1521191902</span><span class=\"mtk1\">,  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">&quot;exp&quot;</span><span class=\"mtk1\">: </span><span class=\"mtk7\">1521195630</span><span class=\"mtk1\">  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>This example contains a combination of registered and public claims. “sub”,”jti”,”iat”, and “exp” are registered claims and “name” is a public claim.</p>\n<p>The Base64Url-encoded Payload, which is the second part of our JWT, looks like the following:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"json\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">eyJzdWIiOiIxMjM</span><span class=\"mtk7\">0</span><span class=\"mtk1\">NTY</span><span class=\"mtk7\">3</span><span class=\"mtk1\">ODkwIiwibmFtZSI</span><span class=\"mtk7\">6</span><span class=\"mtk1\">IkZyYW</span><span class=\"mtk7\">5</span><span class=\"mtk1\">rIEVtaWMiL  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">CJqdGkiOiI</span><span class=\"mtk7\">0</span><span class=\"mtk1\">YjVmY</span><span class=\"mtk7\">2</span><span class=\"mtk1\">VhNi</span><span class=\"mtk7\">0</span><span class=\"mtk1\">yYTVlLTRhOWQtOTdmMi</span><span class=\"mtk7\">0</span><span class=\"mtk1\">zZDg</span><span class=\"mtk7\">2</span><span class=\"mtk1\">MzFlYTJjNWEiLCJpYXQiOjE</span><span class=\"mtk7\">1</span><span class=\"mtk1\">MjExOTE</span><span class=\"mtk7\">5</span><span class=\"mtk1\">MDIsImV</span><span class=\"mtk7\">4</span><span class=\"mtk1\">cCI</span><span class=\"mtk7\">6</span><span class=\"mtk1\">MTUyMTE</span><span class=\"mtk7\">5</span><span class=\"mtk1\">NTYzMH</span><span class=\"mtk7\">0</span></span></code></pre>\n<p><strong>Signature</strong></p>\n<p>The final part of our JWT is the Signature. To create the Signature, we need 3 components:</p>\n<ul>\n<li>Header</li>\n<li>Payload</li>\n<li>Algorithm used to sign the Header and Payload</li>\n</ul>\n<p>var encodedString = base64UrlEncode(header) + \".\" + base64UrlEncode(payload);<br>\nHMACSHA256(encodedString, 'secret');</p>\n<p>The secret is the Signature held by the server in order to verify tokens and sign new ones.</p>\n<p>The above Base64Url-encoded Header and Payload are combined with a dot, and then digitally-signed using the secret. This generates the Signature as the third part of the our JWT:</p>\n<p>wGDoDSxfKj3Ns379NVxocwM9TOiwxhxWl</p>\n<p><strong>Putting It All Together</strong></p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"json\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">eyJhbGciOiJIUzI</span><span class=\"mtk7\">1</span><span class=\"mtk1\">NiIsInR</span><span class=\"mtk7\">5</span><span class=\"mtk1\">cCI</span><span class=\"mtk7\">6</span><span class=\"mtk1\">IkpXVCJ</span><span class=\"mtk7\">9</span><span class=\"mtk1\">.eyJzdWIiOiIxMjM</span><span class=\"mtk7\">0</span><span class=\"mtk1\">NTY</span><span class=\"mtk7\">3</span><span class=\"mtk1\">ODkwIiwibmFtZSI</span><span class=\"mtk7\">6</span><span class=\"mtk1\">IkZyYW</span><span class=\"mtk7\">5</span><span class=\"mtk1\">rIEVtaWMiL  </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">CJqdGkiOiI</span><span class=\"mtk7\">0</span><span class=\"mtk1\">YjVmY</span><span class=\"mtk7\">2</span><span class=\"mtk1\">VhNi</span><span class=\"mtk7\">0</span><span class=\"mtk1\">yYTVlLTRhOWQtOTdmMi</span><span class=\"mtk7\">0</span><span class=\"mtk1\">zZDg</span><span class=\"mtk7\">2</span><span class=\"mtk1\">MzFlYTJjNWEiLCJpYXQiOjE</span><span class=\"mtk7\">1</span><span class=\"mtk1\">MjExOTE</span><span class=\"mtk7\">5</span><span class=\"mtk1\">MDIsImV</span><span class=\"mtk7\">4</span><span class=\"mtk1\">cCI</span><span class=\"mtk7\">6</span><span class=\"mtk1\">MTUyMTE</span><span class=\"mtk7\">5</span><span class=\"mtk1\">NTYzMH</span><span class=\"mtk7\">0</span><span class=\"mtk1\">.wGDoDSxfKj</span><span class=\"mtk7\">3</span><span class=\"mtk1\">Ns</span><span class=\"mtk7\">379</span><span class=\"mtk1\">NVxocwM</span><span class=\"mtk7\">9</span><span class=\"mtk1\">TOiwxhxWl</span></span></code></pre>\n<p>This is our final JWT, containing the Header, Payload, and Signature joined together with dots. It can be passed as a URL parameter, a POST parameter, or in the  HTTP header to authenticate or exchange information.</p>\n<p>Note: JWT does not hide information; it just encodes information using the digitally-signed signature and verifies that the information has not been altered over the network. So, do not add any sensitive information in the JWT claim.</p>\n<p><strong>Conclusion</strong></p>\n<p>JWT comprises three encoded parts: Header, Payload, and Signature. It can be passed as a URL or POST parameter, or in an HTTP header. Due to JWT's lightweight, self-containing, and versatile strucutre, it remains a popular tool for information exchange and authentication.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n</style>","frontmatter":{"date":"July 11, 2018","updated_date":null,"description":null,"title":"What is JSON Web Token","tags":["JWT","JSON Web Token"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/fca016963236696b6d07a52d211c1354/58556/jwt.webp","srcSet":"/static/fca016963236696b6d07a52d211c1354/61e93/jwt.webp 200w,\n/static/fca016963236696b6d07a52d211c1354/1f5c5/jwt.webp 400w,\n/static/fca016963236696b6d07a52d211c1354/58556/jwt.webp 800w,\n/static/fca016963236696b6d07a52d211c1354/99238/jwt.webp 1200w,\n/static/fca016963236696b6d07a52d211c1354/135cd/jwt.webp 1280w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Mayank Agarwal","github":"mayankagrwal","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":876,"currentPage":147,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}