{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/72","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"For an end-user, convenience is everything. For this reason, the development process that most developers follow focuses primarily on making…","fields":{"slug":"/growth/why-should-implement-social-login-authentication/"},"html":"<p>For an end-user, convenience is everything. For this reason, the development process that most developers follow focuses primarily on making the application as easy to use and convenient as possible. This focus would then result in the creation of a new login option, Social Logins.</p>\n<h2 id=\"what-is-social-login-authentication\" style=\"position:relative;\"><a href=\"#what-is-social-login-authentication\" aria-label=\"what is social login authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Social Login Authentication?</h2>\n<p>In a nutshell, <a href=\"https://www.loginradius.com/social-login/\">social login</a> contributes to a more efficient form of user management. The concept of social login authentication or social authentication involves creating a single sign-on for applications. This means that users can sign up for a range of applications or websites without having to repeatedly input their credentials.</p>\n<p>The login credentials usually come from a social media platform like Twitter, Facebook, and more, which the user can use to automatically input the credentials they require. Thus, the process of user social login authentication will be cut short significantly for users. </p>\n<h2 id=\"how-does-social-login-work\" style=\"position:relative;\"><a href=\"#how-does-social-login-work\" aria-label=\"how does social login work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Social Login Work?</h2>\n<p>Social logins is usually manifested using the following steps:</p>\n<ol>\n<li>Social login is typically visible to a user when they click on an application and are gearing up to register to it as a new user or log in as a repeat user. To sign in with social media, the application will then place a series of CIAM (customer identity and access management) authentication options in front of the user. These options are essentially suggesting that the users can provide the required login credentials using the following social networking link.\n</li>\n<li>Upon choosing a link, the respective social media platform will notice a sign-in or log-in request.</li>\n<li>The user will then receive a notification asking to grant access to the app or the website.</li>\n<li>Finally, the social media provider will confirm the identity of the user, who will then obtain access to the application or site.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\"><img src=\"/f0987625b2230ea1076747d328219a08/Social-Login.webp\" alt=\"social-login\"></a></p>\n<p>Depending on the social network provider and their respective CIAM management practices, the process of social login authentication differs slightly. This is because each platform collects different user information and implements distinct consumer data security strategies.</p>\n<p>Therefore, the social logins of popular social media platforms involve the following distinctions:</p>\n<ul>\n<li>A user who chooses to log in to a website or application using the Facebook login will allow the said site to access all the information present on their Facebook account. However, the user does have control over what information is accessible to the third-party site that they are logging into by agreeing to a series of permissions.\n</li>\n<li>A Google sign-in would allow third-party websites to access customer information like age range, friend lists, and the ability to interact with the customer's public feed. The third-party website or application will also be able to send emails to the customer.</li>\n<li>When it comes to LinkedIn, the user will not be able to control permissions as in the above two cases. The user's professional information will be accessible to the website upon receiving approval from LinkedIn to collect user information.</li>\n<li>The <a href=\"https://www.loginradius.com/sign-in-with-apple/\">Apple Sign-in</a> is a different story altogether as users will be granting access to their Apple IDs. To increase the authentication security social login, users will have to carry out two-factor authentication with each login.</li>\n</ul>\n<p>Therefore, depending on what information a developer would like to access, they will have to choose a social network provider accordingly.</p>\n<h2 id=\"why-should-you-add-social-login-to-your-applications\" style=\"position:relative;\"><a href=\"#why-should-you-add-social-login-to-your-applications\" aria-label=\"why should you add social login to your applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should You Add Social Login to Your Applications?</h2>\n<ul>\n<li><strong>Competitive Advantage</strong>: Social login should be the default for startups today, offering a significant competitive edge. Users can access your site without the need for a lengthy registration process.</li>\n<li><strong>Convenience for Users</strong>: Prioritize user convenience by allowing them to log in with their existing social media accounts. This eliminates the need for users to remember multiple passwords or create new accounts.</li>\n<li><strong>Efficient User Management</strong>: Social login streamlines user management, creating a single sign-on solution. Users can sign up for various applications without repeatedly inputting their credentials.</li>\n<li><strong>Cost-Effective Implementation</strong>: Implementing social login is cost-effective for developers, as many social media platforms offer free APIs for integration.</li>\n<li><strong>Enhanced Engagement</strong>: With user permission, developers can tailor experiences based on users' social media profiles, leading to increased user engagement.</li>\n</ul>\n<p>Also Read:  <a href=\"https://www.loginradius.com/blog/identity/social-authentication/\">Implementing Social Authentication Solution with LoginRadius</a></p>\n<h2 id=\"the-advantages-of-social-logins-as-an-authentication-solution\" style=\"position:relative;\"><a href=\"#the-advantages-of-social-logins-as-an-authentication-solution\" aria-label=\"the advantages of social logins as an authentication solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Advantages of Social Logins as an Authentication Solution</h2>\n<p>To determine if implementing social authentication is worth it, it will help to outline what benefits it offers. This CIAM authentication solution has a range of benefits for both users and developers alike. For developers, social login provides the following advantages:</p>\n<ul>\n<li>Improve User Management    </li>\n</ul>\n<p>Using a CIAM authentication option like social login, developers can ensure that a user is a real person. This essentially acts like an additional layer of verification aiding in identity management. It will also help to protect against spam and other harmful login options.</p>\n<ul>\n<li>Cost-effective Customer Data Security</li>\n</ul>\n<p>Developers need not spend time or money on introducing social authentication on their platforms. This is because of the availability of APIs present on the social media platforms like <a href=\"https://www.loginradius.com/blog/engineering/login-with-facebook/\">Facebook Login</a> and the Google+ API. In most cases, these APIs are free to use.</p>\n<ul>\n<li>Increase Engagement    </li>\n</ul>\n<p>In case the user agrees to permit the third-party website or application to access their information present on social media platforms, a developer can create an experience that aligns with the user's preferences. Therefore, the application is more likely to engage the user.</p>\n<p>When it comes to users, the use of social logins will bring about the following benefits:</p>\n<ul>\n<li>Management of Few Accounts    </li>\n</ul>\n<p>Users will not have to deal with several accounts at a time. This aspect will be especially useful as one would not have to remember different passwords. Therefore, the chances of a user being unable to log in decrease greatly.</p>\n<ul>\n<li>Convenient Sign-in</li>\n</ul>\n<p>The sign-in process is especially easy as users need not fill long forms to register themselves to the website. The predictability of the registering process will also mean that users are more likely to sign up. Therefore, users can have an infinitely better experience with the third-party website.</p>\n<ul>\n<li>Consumer Trust    </li>\n</ul>\n<p>Users that are wary of what information is accessible to third parties can use social login to control this accessibility. Therefore, one has more control over their information while signing in quickly.</p>\n<h2 id=\"problems-with-social-login\" style=\"position:relative;\"><a href=\"#problems-with-social-login\" aria-label=\"problems with social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Problems With Social Login</h2>\n<p>Among the many benefits that social logins offer users and developers, certain issues crop up. This includes problems like data breaches of social media platforms, improper password practices, and lack of privacy and compliance. However, the responsibility of mitigating these risks falls on developers of third-party websites and social media platforms.</p>\n<p>Despite the few reservations that users may have regarding the safety of social logins, this authentication solution is comparatively safe. To ensure that social logins have an extra layer of social security authentication, users can also back it up with <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multi-factor authentication</a>. This added layer will mean that bad actors are less likely to breach users' social media accounts and the websites they link to.</p>\n<h2 id=\"reap-the-benefits-of-social-login-with-loginradius\" style=\"position:relative;\"><a href=\"#reap-the-benefits-of-social-login-with-loginradius\" aria-label=\"reap the benefits of social login with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reap the Benefits of Social Login with LoginRadius!</h2>\n<ul>\n<li><strong>Streamlined User Management</strong>: Social login acts as an extra layer of verification, aiding in identity management and reducing spam.</li>\n<li><strong>Cost-Efficient Security</strong>: Leverage free APIs from platforms like Facebook Login and Google+, saving time and resources.</li>\n<li><strong>Increased Engagement</strong>: Personalize user experiences based on social media profiles, leading to higher engagement.</li>\n<li><strong>Simplified Account Management</strong>: Users can easily manage multiple accounts without remembering numerous passwords.</li>\n<li><strong>Seamless Sign-In Process</strong>: Registration becomes a breeze, with users skipping lengthy forms for a smoother experience.</li>\n<li><strong>User Trust and Control</strong>: Empower users with control over their data, enhancing trust and privacy.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Implementing social login authentication offers numerous benefits for both developers and users. It streamlines the user experience, improves security, and enhances engagement. Despite potential concerns, such as data breaches, the benefits of social login, especially when coupled with multi-factor authentication, outweigh the risks. Consider integrating social login into your applications today to stay competitive and provide a seamless experience for your users.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1: Why implement social login?</strong></p>\n<p>Social login helps streamline registration and authentication mechanisms for enhanced user experience since users can use existing social media accounts to sign up or sign in. </p>\n<p><strong>2. What is the meaning of social authentication?</strong></p>\n<p>Social authentication allows users to use their social media accounts to authenticate themselves without creating a new account.</p>\n<p><strong>3. How do you implement social media login?</strong></p>\n<p>Organizations can implement social login by using a robust CIAM solution like LoginRadius. </p>\n<p><strong>4. What is the difference between SSO and social login?</strong></p>\n<p>Single Sign-On (SSO) allows users to access multiple applications with one set of credentials. At the same time, social login is an authentication mechanism that specifically uses social media credentials for user authentication.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=why-should-implement-social-login-authentication\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-Consultation\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 16, 2021","updated_date":null,"description":"If you're building a startup today, social login should be the default, not an afterthought. It will give you a huge competitive advantage, because your users won't have to register or even create an email address to use your site.","title":"Why Should You Implement Social Login Authentication?","tags":["social login authentication","data security","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/b8ec734d40cb9722076b14d2027bf1bd/d356d/social-login-1.webp","srcSet":"/static/b8ec734d40cb9722076b14d2027bf1bd/61e93/social-login-1.webp 200w,\n/static/b8ec734d40cb9722076b14d2027bf1bd/1f5c5/social-login-1.webp 400w,\n/static/b8ec734d40cb9722076b14d2027bf1bd/d356d/social-login-1.webp 612w","sizes":"(max-width: 612px) 100vw, 612px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction We all have gone through proving our identity somehow, and many of us won’t understand its importance.  Imagine you’re about to…","fields":{"slug":"/identity/what-is-identity-verification/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>We all have gone through proving our identity somehow, and many of us won’t understand its importance. </p>\n<p>Imagine you’re about to book a hotel in another state, and you go to the counter, show your identity verification documents like passport or identity card, and take the keys to your room. </p>\n<p>This is what identity proofing is. The process of verifying an individual’s identity whether it matches their claimed identity or not. It’s quite a simple process. Isn’t it? </p>\n<p>However, things aren’t that easy as they might seem, especially when it comes to digital identities. </p>\n<p><a href=\"https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2019/consumer_sentinel_network_data_book_2019.pdf\">As per stats</a>, around 3.4 million identities were compromised to a breach in 2019, which is pretty problematic. </p>\n<p>So, does it mean that cybercriminals are exploiting certain loopholes in the current identity verification system? </p>\n<p>Unfortunately, yes. </p>\n<p>Let’s understand how identity verification works in the digital era and uncover various digital identity verification methods. </p>\n<h2 id=\"what-is-identity-verification\" style=\"position:relative;\"><a href=\"#what-is-identity-verification\" aria-label=\"what is identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity Verification?</h2>\n<p>Identity verification is a necessary process that ensures an individual’s identity matches the one that is supposed to be. </p>\n<p>The identity verification process involves comparing the set of unique characteristics and traits associated with an individual with the one claiming the same. </p>\n<p>Identity verification is essential to ensure an actual individual is behind a process and prevent fraud through authentication and authorization. </p>\n<p>Whether online or offline, identity verification is an essential requirement for most procedures and processes, including online/offline banking, booking flights, or applying for a passport. </p>\n<h2 id=\"what-is-digital-identity-verification\" style=\"position:relative;\"><a href=\"#what-is-digital-identity-verification\" aria-label=\"what is digital identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Identity Verification?</h2>\n<p>Digital identity implies how you are represented and digitally documented online, sometimes through social login, work email address, or personal email ID. </p>\n<p>In a nutshell, it's a process that validates a person's identifying characteristics or traits and verifies they really are who they claim to be by leveraging computer technology.</p>\n<h2 id=\"why-verification-for-digital-identity-became-necessary\" style=\"position:relative;\"><a href=\"#why-verification-for-digital-identity-became-necessary\" aria-label=\"why verification for digital identity became necessary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Verification for Digital Identity Became Necessary?</h2>\n<p>Since technology has helped us perform complex tasks like a breeze, the associated cybersecurity threats can’t be overlooked. </p>\n<p>Every year, millions of people compromise their identities since cybercriminals are always on a hunt for frail networks that can be easily bypassed. This means weak authentication or a loophole in the overall <a href=\"https://www.loginradius.com/blog/identity/what-is-iam/\">identity management system</a> can be fatal for an organization. </p>\n<p>Hackers are able to impersonate users within a network and gain access to sensitive business information, which is further exploited for diverse purposes. </p>\n<p>Hence a more robust line of defense is becoming the need of the hour in the form of digital identity verification as organizations have to face financial losses worth millions along with brand tarnishing just because of an increasing number of identity thefts. </p>\n<h2 id=\"digital-identity-verification-use-cases\" style=\"position:relative;\"><a href=\"#digital-identity-verification-use-cases\" aria-label=\"digital identity verification use cases permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital Identity Verification Use Cases</h2>\n<p>Digital identity verification serves a multitude of purposes across various sectors. Here are some common use cases:</p>\n<ul>\n<li><strong>Financial Services</strong>: Banks and financial institutions use digital identity verification to authenticate customers for account openings, loans, and transactions.</li>\n<li><strong>Healthcare</strong>: Healthcare providers verify patient identities for telemedicine appointments, prescription refills, and accessing medical records.</li>\n<li><strong>E-Commerce</strong>: Online retailers use identity verification to prevent fraud in purchases, especially for high-value items.</li>\n<li><strong>Travel and Hospitality</strong>: Airlines and hotels verify identities for booking tickets and check-ins, enhancing security and preventing identity theft.</li>\n<li><strong>Government Services</strong>: Government agencies use digital identity verification for citizen services like tax filings, voting, and license renewals.</li>\n</ul>\n<h2 id=\"how-to-analyze-digital-identity-verification-solutions\" style=\"position:relative;\"><a href=\"#how-to-analyze-digital-identity-verification-solutions\" aria-label=\"how to analyze digital identity verification solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Analyze Digital Identity Verification Solutions</h2>\n<p>When evaluating digital identity verification solutions, consider the following factors:</p>\n<ul>\n<li><strong>Security Features</strong>: Look for solutions with robust encryption, multi-factor authentication (MFA), and biometric verification for enhanced security.</li>\n<li><strong>User Experience</strong>: A seamless user experience is crucial. Ensure the solution offers easy integration, smooth onboarding, and minimal friction for users.</li>\n<li><strong>Compliance</strong>: Verify that the solution complies with industry standards and regulations such as GDPR, HIPAA, and PCI-DSS.</li>\n<li><strong>Scalability</strong>: Choose a solution that can scale with your business growth, accommodating increasing user volumes and diverse verification needs.</li>\n<li><strong>Cost-effectiveness</strong>: Evaluate the pricing structure, considering factors like transaction volume, support costs, and implementation expenses.</li>\n</ul>\n<h2 id=\"how-is-digital-identity-verification-different-from-authentication\" style=\"position:relative;\"><a href=\"#how-is-digital-identity-verification-different-from-authentication\" aria-label=\"how is digital identity verification different from authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Digital Identity Verification Different from Authentication?</h2>\n<p>While digital identity verification and authentication are closely related, they serve distinct purposes:</p>\n<ul>\n<li><strong>Identity Verification</strong>: Verifies the user's identity against a trusted source, ensuring they are who they claim to be. It involves validating personal information and documents.</li>\n<li><strong>Authentication</strong>: Confirms a user's identity during access attempts. It typically involves verifying credentials (username, password) or using additional factors like biometrics or one-time passwords (OTP).</li>\n</ul>\n<p>In essence, identity verification establishes trust in the user's identity, while authentication grants access based on that verified identity.</p>\n<h2 id=\"what-are-the-benefits-of-digital-identity-verification\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-digital-identity-verification\" aria-label=\"what are the benefits of digital identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Benefits of Digital Identity Verification?</h2>\n<p>When it comes to the advantages of digital identity verification, the list is endless. Here are some of the benefits associated with digital identity verification: </p>\n<p><strong>1. Robust Security</strong></p>\n<p>Adding multiple layers of authentication to your current network through <a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\">multi-factor authentication</a> (MFA) can help enhance overall security. </p>\n<p>MFA is considered the most reliable way to authenticate users that prevents unauthorized access and eventually helps to comply with specific industry regulations.</p>\n<p>For example, PCI-DSS requires MFA to be implemented in certain situations to prevent unauthorized users from accessing systems. So, even when application updates lead to unknown and unattended consequences, MFA compliance ensures that it remains virtually non-intrusive.</p>\n<p><strong>2. Mitigates the Risks Associated with Human Verification Measures</strong></p>\n<p>The traditional methods for verifying an identity solely rely on human verification measures that include comparing a person’s picture on a government-issued identity with the ones asking to avail certain services (online/offline).</p>\n<p>These measures are widely used to judge the identity, whether it’s fake or genuine. </p>\n<p>However, unauthorized professionals can easily bypass these verification processes by altering the documents through several free tools available in the market. </p>\n<p>Using a reliable identity verification system reduces human judgment-related risks and mitigates human error in verifying an individual’s identity. </p>\n<p><strong>3. Improves Customer Experience</strong></p>\n<p>Customer experience is everything, and if it’s reinforced with the highest level of security, it’s the game-changer for any enterprise or public sector service provider. </p>\n<p>The cutting-edge identity verification system offered by LoginRadius offers user-friendly experiences for potential customers right from the onboarding stage and during the entire consumer life cycle. </p>\n<p>The robust CIAM (consumer identity and access management) solution by LoginRadius enables secure authentication and adds multiple layers of authentication through multi-factor authentication and adaptive authentication (risk-based authentication). </p>\n<p>Customers can quickly verify their identity either through their social media accounts or through a one-time password (OTP), which enhances the overall user experience. </p>\n<h2 id=\"how-does-the-identity-verification-process-work\" style=\"position:relative;\"><a href=\"#how-does-the-identity-verification-process-work\" aria-label=\"how does the identity verification process work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does the Identity Verification Process Work?</h2>\n<p>The identity verification process through the identity and access management system works by performing three main tasks viz. identification, <a href=\"https://www.loginradius.com/blog/identity/authentication-vs-authorization-infographic/\">authentication, and authorization</a>.</p>\n<p>In other words, a CIAM solution functions to provide the right people access to devices, hardware, software applications, or any IT tool to perform a specific task.</p>\n<p><a href=\"https://www.loginradius.com/resource/digital-consumer-landscape-ebook/\"><img src=\"/4c0a735dd3c300b19dbd8be6fbeb61a2/EB-Bridging-Trust-Gap.webp\" alt=\"EB-Bridging-Trust-Gap\"></a></p>\n<p>The CIAM includes the following core components:</p>\n<ul>\n<li>A database that includes the identities and access rights of users and consumers</li>\n<li>CIAM tools to provision, monitor, change and remove access privileges</li>\n<li>A framework for auditing login and access history</li>\n</ul>\n<p>The list of access rights must be up-to-date all the time with the entry of new users or the change of roles of current users. </p>\n<p>The responsibilities of identity and access management typically come under IT or departments that handle data processing and cybersecurity.</p>\n<h2 id=\"types-of-identity-verification-methods\" style=\"position:relative;\"><a href=\"#types-of-identity-verification-methods\" aria-label=\"types of identity verification methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Identity Verification Methods</h2>\n<p>Identity verification is the necessary implementation for secure and genuine access to resources of web and mobile applications. It helps to authorize the user and provide access control for applications based on the user’s credentials. </p>\n<p>Here are some ways through which identities of consumers can be verified: </p>\n<ul>\n<li><strong>Email Verification:</strong> Email is still considered the primary means of authentication because other mechanisms are not as optimized or approach everyone. So it is safe to say that most of your application users use their Gmail accounts for creating their new accounts. The credentials used in setting up the email verification can be used to sign in to an account. </li>\n<li><strong>Biometric Verification:</strong> Biometrics are physical characteristics and traits of an individual that are unique to them. These characteristics can be used for authentication purposes. Most common <a href=\"https://www.loginradius.com/resource/mobile-biometric-authentication-datasheet\">biometric authentication</a> characteristics include fingerprints, iris, face, and voice. </li>\n<li>\n<p><strong>Phone Verification:</strong> With phone verification, customers use their telephone numbers to identify themselves. This process occurs in three simple steps.</p>\n<ul>\n<li>The customer fills out the registration form with their phone number, later acting as the username.</li>\n<li>LoginRadius sends a temporary one-time passcode (OTP) registration via an SMS message or automated call.</li>\n<li>The customer verifies their phone number by entering the OTP on the website or mobile app.</li>\n</ul>\n</li>\n<li>\n<p><strong>Social Verification:</strong> Social login/verification enables users to use existing login credentials from a social networking platform, including Facebook, Google, Twitter, and more, allowing simplified logins and registrations. LoginRadius simplifies social authentication and improves the overall user experience. </p>\n<p>Our social authentication solution flawlessly combines the APIs of over 40 social networks that create a unified social API fully equipped to handle all the specific features of these platforms.</p>\n</li>\n</ul>\n<h2 id=\"identity-verification-regulations-and-standards\" style=\"position:relative;\"><a href=\"#identity-verification-regulations-and-standards\" aria-label=\"identity verification regulations and standards permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Verification Regulations and Standards</h2>\n<p>Several countries have different standards and regulations for identity verification, which service providers should consider before serving the citizens of that particular country. </p>\n<p>If you’re relying on a CIAM solution like LoginRadius, you need not worry about identity verification regulations and standards. </p>\n<p>The <a href=\"https://www.loginradius.com/\">LoginRadius Identity Platform</a> is designed to comply with all significant data security and privacy laws and with the terms of various social networks. Our legal team constantly monitors changes in the laws, and we perform regular security audits to ensure that our compliance is always up to date.</p>\n<p>The LoginRadius Identity Platform is designed to handle consent management and ensure continued compliance with all major privacy regulations, including the EU’s GDPR and California’s CCPA.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Organizations that aren’t able to earn consumers’ trust gradually end up losing business. This is perhaps the reason why stringent authentication practices should be in place. </p>\n<p>Since cybercriminals easily exploit inadequate identity verification systems, the end result is compromised consumer identity and brand tarnishing. </p>\n<p>Businesses need to consider relying on a robust CIAM solution that helps in securely verifying user identities without hampering user experience. </p>\n<p>LoginRadius’ cutting-edge CIAM can be the ultimate choice for preserving crucial consumer data and offering a robust authentication mechanism backed with a great user experience. </p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is digital ID verification?</strong></p>\n<p>Digital ID verification is the process of confirming a person's identity online using digital methods.</p>\n<p><strong>2. How do you digitally verify your identity?</strong></p>\n<p>Digitally verifying your identity typically involves providing specific information or documents through an online platform, such as uploading a photo of your government-issued ID or answering security questions.</p>\n<p><strong>3. What is digital identity verification with example?</strong></p>\n<p>Digital identity verification is used in various industries like finance and healthcare. An example would be opening a bank account online, where the bank verifies your identity using the information and documents you provide.</p>\n<p><strong>4. What is virtual identity verification?</strong></p>\n<p>Virtual identity verification is the process of verifying an individual's identity through digital channels without physical presence, often using methods like video calls or AI analysis of facial features or voice patterns. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-identity-verification\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 13, 2021","updated_date":null,"description":"Identity verification is a necessary process that ensures an individual’s identity matches the one that is supposed to be. This post helps better understand what digital identity verification is, how it works, and the types of digital identity verification systems.","title":"What is Digital Identity Verification and Why is it Necessary?","tags":["identity verification","digital identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9607843137254901,"src":"/static/fabc1da4c101c2912487781c0af671bc/58556/what-is-identity-verification-cover.webp","srcSet":"/static/fabc1da4c101c2912487781c0af671bc/61e93/what-is-identity-verification-cover.webp 200w,\n/static/fabc1da4c101c2912487781c0af671bc/1f5c5/what-is-identity-verification-cover.webp 400w,\n/static/fabc1da4c101c2912487781c0af671bc/58556/what-is-identity-verification-cover.webp 800w,\n/static/fabc1da4c101c2912487781c0af671bc/cc834/what-is-identity-verification-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rajeev Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Conversion rate is an all-important metric that every website keeps a close eye on. To increase this rate, businesses turn to Conversion…","fields":{"slug":"/growth/9-facts-about-social-login-and-cro/"},"html":"<p>Conversion rate is an all-important metric that every website keeps a close eye on. To increase this rate, businesses turn to Conversion Rate Optimization or CRO marketing.</p>\n<p>CRO marketing focuses majorly on improving the experience that a user may have, which may result in them making purchases. To ensure that this takes place, businesses that also have websites use login services like <a href=\"https://www.loginradius.com/social-login/\">social login</a>. These services allow them to cater to customers better.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\"><img src=\"/f0987625b2230ea1076747d328219a08/Product-Social-Login.webp\" alt=\"Product-Social-Login\"></a></p>\n<h2 id=\"essential-facts-to-know-before-implementing-login-identity-solutions\" style=\"position:relative;\"><a href=\"#essential-facts-to-know-before-implementing-login-identity-solutions\" aria-label=\"essential facts to know before implementing login identity solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Essential Facts To Know Before Implementing Login Identity Solutions</h2>\n<p>A marketing team usually includes social login as a pivotal part of their strategy as it can contribute to the overall consumer experience. In addition to allowing businesses to amass a host of registered customers, they can also personalize the website based on the user’s preferences. This ability will later <a href=\"https://www.loginradius.com/blog/fuel/leverage-website-for-more-conversions/\">boost the ROI and conversion</a> of the business.</p>\n<p>Also, user registration  options like social login authentication will allow a company to capitalize on the following aspects:</p>\n<ol>\n<li>Reduce Incomplete Login Forms</li>\n</ol>\n<p>Users often experience a significant amount of frustration as they are required to fill long registration forms to get access to websites. This is bad news for the eCommerce sites that have such forms. Social logins will allow businesses to obtain all the necessary data they desire to eradicate this problem, which will also be accurate and complete.</p>\n<ol start=\"2\">\n<li>Increase Social Engagement</li>\n</ol>\n<p>The use of social logins will also allow businesses to access important customer information regarding their age, gender, or personal preferences. A marketing team will use all this information to formulate a better social media marketing campaign. Therefore, companies can formulate their campaigns in a way that will best resonate with the given demographic.</p>\n<ol start=\"3\">\n<li>Influence Social Media Recommendations</li>\n</ol>\n<p>Consumers are heavily influenced by the recommendations they see online. This fact is especially true if the recommendations come from another user similar to them. Therefore, marketing teams can significantly contribute to their conversion rate as users send out word-of-mouth referrals on extremely popular social media platforms.</p>\n<ol start=\"4\">\n<li>Extensive Data Collection</li>\n</ol>\n<p>Allowing users to register using social logins will mean that businesses can get to know their customers better. They can form a cohesive idea of what users belonging to a particular demographic may like. Therefore, a company can use social logins to create feedback loops to better understand its audience and <a href=\"https://www.loginradius.com/blog/fuel/how-customer-retention-can-help-businesses-grow/\">improve customer retention</a>.</p>\n<p>  <img src=\"/99f5744ab0597aa7dc03e0e251755164/conversion-rate-increase.webp\" alt=\"conversion-rate-increase\"> </p>\n<ol start=\"5\">\n<li>Dislike Towards Account Creation</li>\n</ol>\n<p><a href=\"http://www.prweb.com/releases/2012/1/prweb9086226.htm\">54%</a> of users state that they refrain from joining a website that asks them to fill a registration form. There are essentially two reasons why users dislike creating new accounts on third-party websites. Firstly, users try to avoid filling long registration forms on these websites or applications. The other reason is that consumers use login services like social logins to register as they prefer to have a single password for the multiple accounts that the user has.</p>\n<ol start=\"6\">\n<li>Recovering Login Information</li>\n</ol>\n<p>According to some studies, <a href=\"https://web.archive.org/web/20171209150724/http://www1.janrain.com/rs/janrain/images/Industry-Research-Value-of-Social-Login-2013.pdf\">1 in 3</a>  users states that they are unable to remember their login information, especially for third-party websites that they do not visit frequently. Of these, a major portion also states that they will not put in a lot of effort into recovering it. Therefore, social logins will help to reduce the need for users to remember credentials. This will, in turn, improve the conversion rate.</p>\n<p>Also Download: <a href=\"https://www.loginradius.com/resource/digital-identity-trends-2020/\">Consumer Digital Identity Trend Report 2020</a></p>\n<ol start=\"7\">\n<li>Eliminating Irrelevant Promotions</li>\n</ol>\n<p>The ability of businesses to collect customer information through social logins will also help reduce the instances of users receiving irrelevant promotions. A recent poll revealed that <a href=\"https://cxl.com/blog/social-login/#5-100-of-the-blue-research-poll-participants-reported-receiving\">100%</a> of respondents saw promotions that were not relevant to their likes. With social logins, businesses can filter what consumers see and will most likely purchase.</p>\n<ol start=\"8\">\n<li>Chances of Free Promotion</li>\n</ol>\n<p>Implementing social logins and increasing the number of registrations will further improve the chances of the company receiving a promotion from users. Once this takes place, a company will receive free promotion and make more people aware of their brand.</p>\n<ol start=\"9\">\n<li>Secure User Registration Option</li>\n</ol>\n<p>According to a research paper, around <a href=\"http://www.webhostingbuzz.com/blog/wp-content/uploads/2013/03/Who-s-sharing-what.webp\">77%</a> of users believe that social logins are a safe and highly effective method to register users. The reason being that in addition to implementing important customer data security  measures, it can also <a href=\"https://www.loginradius.com/blog/fuel/consumer-management-to-consumer-engagement/\">encourage user engagement</a>.</p>\n<p>Considering all these benefits that social login authentication offers, a marketing company can orient their social media marketing and user engagement to be more effective. Finally, a marketing team will surely improve their conversion rates and see a drastic improvement in sales.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=9-facts-about-social-login-and-cro\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-Consultation\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 12, 2021","updated_date":null,"description":"Naturally, a marketing team should strive to create a user experience that will lead to more conversions. And, fortunately, social login makes this highly achievable. It allows users to easily sign on to your website with social media profiles, and also allows the consumer to customize their preferences based on their previous activity and interaction with the brand.","title":"9 Facts About Social Login & CRO That You Should Know About","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/dd8131133b6ffe75dd02bb806d3d18e6/58556/conversion-rate-optimization.webp","srcSet":"/static/dd8131133b6ffe75dd02bb806d3d18e6/61e93/conversion-rate-optimization.webp 200w,\n/static/dd8131133b6ffe75dd02bb806d3d18e6/1f5c5/conversion-rate-optimization.webp 400w,\n/static/dd8131133b6ffe75dd02bb806d3d18e6/58556/conversion-rate-optimization.webp 800w,\n/static/dd8131133b6ffe75dd02bb806d3d18e6/99238/conversion-rate-optimization.webp 1200w,\n/static/dd8131133b6ffe75dd02bb806d3d18e6/7c22d/conversion-rate-optimization.webp 1600w,\n/static/dd8131133b6ffe75dd02bb806d3d18e6/fb1e9/conversion-rate-optimization.webp 6332w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rashmi Mathur","github":null,"avatar":null}}}},{"node":{"excerpt":"The paradigm shift that the world has witnessed amid the global pandemic has altered the way broadcasters distribute content.  With the…","fields":{"slug":"/identity/ott-simplify-authentication/"},"html":"<p>The paradigm shift that the world has witnessed amid the global pandemic has altered the way broadcasters distribute content. </p>\n<p>With the significant <a href=\"https://pages.conviva.com/rs/138-XJA-134/images/RPT_Conviva_State_of_Streaming_Q1_2021.pdf\">increase in the over-the-top (OTT) audience</a> in the last year, the media industry has undoubtedly changed everyone’s leisure time. </p>\n<p>However, the sudden increase in OTT users has also increased the security challenges, and many OTT platforms witnessed massive identity thefts. </p>\n<p>Since the world isn’t going to shift back to conventional entertainment any soon (or maybe never), delivering rich omnichannel experiences backed with robust security becomes the need of the hour for the media industry. </p>\n<p>Enterprises need to put their best foot forward to securely authenticate and authorize users to avoid any chance of sneak into the network that may lead to financial losses or brand reputation tarnishing. </p>\n<p>In this post, we’ll understand the importance of secure authentication through a consumer identity and access management (CIAM) solution and how it paves the path for securing consumer identities on different devices for OTT platforms. </p>\n<h2 id=\"why-ciam-solution-for-ott-platforms\" style=\"position:relative;\"><a href=\"#why-ciam-solution-for-ott-platforms\" aria-label=\"why ciam solution for ott platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why CIAM Solution for OTT Platforms?</h2>\n<p>Amid the global pandemic, when everyone was locked inside their homes, and the internet became their second home, OTT platforms witnessed record subscriptions. </p>\n<p>This means every platform had to cater to a vast number of individuals and manage heaps of identities. </p>\n<p>However, most of the platforms weren’t relying on a secure mechanism to handle such a huge number of identities, which led to compromised identities causing losses worth millions of dollars. </p>\n<p>Moreover, delivering a rich omnichannel experience for users accessing the network from different devices becomes challenging for vendors. </p>\n<p>Here’s where a <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">consumer identity and access management</a> (CIAM) solution comes into play. </p>\n<p>With a CIAM solution in place, any OTT platform can securely handle billions of identities without hampering user experience on any device. </p>\n<p>Moreover, a robust CIAM like LoginRadius can help OTT platforms to autoscale their servers whenever the demand increases exponentially. </p>\n<p>Let’s understand how a CIAM solution can help OTT platforms simplify authentication on different devices. </p>\n<h2 id=\"benefits-of-identity-management-through-a-ciam\" style=\"position:relative;\"><a href=\"#benefits-of-identity-management-through-a-ciam\" aria-label=\"benefits of identity management through a ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Identity Management through a CIAM</h2>\n<p>When it comes to the advantages of a leading CIAM like LoginRadius, the list is endless. Here we’ve clubbed some of the benefits of a CIAM for OTT platforms. Let’s have a look: </p>\n<h3 id=\"single-sign-on-sso\" style=\"position:relative;\"><a href=\"#single-sign-on-sso\" aria-label=\"single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Single Sign-On (SSO)</h3>\n<p>Honestly, nobody likes to remember long credentials, especially if they can utilize the true potential of frictionless login across all the applications and connected devices.</p>\n<p>While SSO is on the verge of becoming an industry standard for authentication, OTT platforms need to quickly gear up for enhancing the user experience through SSO and Federated SSO.</p>\n<p>OTT users perceive your enterprise as a single entity, and they expect you to treat them like a single customer.</p>\n<p>If you have multiple websites and mobile apps under the same company umbrella, there’s no reason you can’t meet this expectation.</p>\n<p><a href=\"https://www.loginradius.com/web-and-mobile-sso/\">Web SSO</a> authentication from LoginRadius brings everything together.</p>\n<p>Each customer has one account. One set of credentials that they can use anywhere they interact with your brand.</p>\n<p>Since the market is flooded with plenty of OTT platforms and publication websites, the ones offering a seamless experience to the users would surely get more signups and subscriptions.</p>\n<p><strong>Also read:</strong> <a href=\"https://www.loginradius.com/resource/how-media-and-publication-companies-use-loginradius-identity-platform/\">How Media and Publication Companies Use the LoginRadius Identity Platform</a></p>\n<h3 id=\"access-management---for-restricting-content\" style=\"position:relative;\"><a href=\"#access-management---for-restricting-content\" aria-label=\"access management   for restricting content permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Access Management - For Restricting Content</h3>\n<p>With the increasing access to media over OTT platforms, the entertainment industry’s biggest challenge is setting age restrictions for specific content.</p>\n<p>While most media platforms aren’t focusing on creating sub-profiles, the competitors are already leveraging access management for a single identity used by multiple users.</p>\n<p>Whether we talk about a particular category of content for premium users or setting age restrictions, access management plays a crucial role in enhancing the user experience for every business.</p>\n<p>Access management through a CIAM solution like LoginRadius helps improve user experience and eventually plays a crucial role in enhancing overall data and privacy security.</p>\n<p>LoginRadius’ cloud-based CIAM solution helps businesses seamlessly manage access without hampering the overall user experience. This allows OTT platforms to gain more signups, increase retention rates, and scale business growth.</p>\n<h3 id=\"progressive-profiling\" style=\"position:relative;\"><a href=\"#progressive-profiling\" aria-label=\"progressive profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Progressive Profiling</h3>\n<p>Media businesses need to understand that registration fatigue could be why they lose a potential subscriber.</p>\n<p>Admit it; nobody wants to share heaps of personal details in a single go, especially during the sign-up process. Keeping the subscription form compact is the best way to ensure a quick sign-up from the users’ end.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/\">Progressive profiling</a> lets you gather important details about a subscriber over time and not everything in a single go. This not only improves user experience but eventually helps to build credibility in the long run.</p>\n<p>LoginRadius enables you to gather consumer data through various stages of the consumer's journey to share their information as they interact with your business.</p>\n<p><a href=\"https://www.loginradius.com/resource/a-complete-guide-to-website-authentication/\"><img src=\"/7856d1613067a2c6665143c1f80dab34/GD-to-web-auth.webp\" alt=\"GD-to-web-auth\"></a></p>\n<h3 id=\"multi-factor-authentication---for-enhanced-layers-of-security\" style=\"position:relative;\"><a href=\"#multi-factor-authentication---for-enhanced-layers-of-security\" aria-label=\"multi factor authentication   for enhanced layers of security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication - For Enhanced Layers of Security</h3>\n<p>While the number of media platform subscriptions surged amid the global pandemic, the fact that cyber-attacks on diverse platforms increased exponentially can’t be overlooked.</p>\n<p>With millions of data breaches and identity thefts in the media industry alone, a CIAM solution with multi-factor authentication can be the ultimate solution.</p>\n<p>LoginRadius’<a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\"> Multi-factor authentication</a> coupled with risk-based authentication helps businesses in creating a secure login experience for subscribers.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>With the increasing number of data breaches and compromised identities worldwide, OTT platforms should consider getting a robust CIAM solution in place. </p>\n<p>Whether it’s delivering a seamless omnichannel experience across multiple devices or managing billions of identities, a CIAM solution is becoming the need of the hour. </p>\n<p>Enterprises can <a href=\"https://www.loginradius.com/contact-sales/\">leverage LoginRadius CIAM</a> that helps to scale business growth through a state-of-the-art omnichannel experience reinforced by stringent security.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=ott-simplify-authentication\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 10, 2021","updated_date":null,"description":"In this post, we’ll understand the importance of secure authentication through a consumer identity and access management (CIAM) solution and how it paves the path for safeguarding consumer identities on different devices for OTT platforms.","title":"How OTT Services can Simplify Authentication on Various Devices","tags":["ciam solution","mfa","progressive profiling"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5625,"src":"/static/a6980666605631a7fae416273e58edfd/58556/ott-simplify-authentication-cover.webp","srcSet":"/static/a6980666605631a7fae416273e58edfd/61e93/ott-simplify-authentication-cover.webp 200w,\n/static/a6980666605631a7fae416273e58edfd/1f5c5/ott-simplify-authentication-cover.webp 400w,\n/static/a6980666605631a7fae416273e58edfd/58556/ott-simplify-authentication-cover.webp 800w,\n/static/a6980666605631a7fae416273e58edfd/cc834/ott-simplify-authentication-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Manish Tiwari","github":null,"avatar":null}}}},{"node":{"excerpt":"When it comes to finding and interacting with insurance carriers, consumers have high expectations. They demand a secure and reliable…","fields":{"slug":"/growth/enhance-customer-experience-in-insurance-companies-with-ciam/"},"html":"<p>When it comes to finding and interacting with insurance carriers, consumers have high expectations. They demand a secure and reliable consumer experience in addition to excellent coverage and competitive costs. Savvy online consumers expect the same individualized attention they get when chatting with a live agent over the phone due to digital transformation. They demand that experience be consistent no matter which device they use.</p>\n<p>A <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">consumer identity and access management</a> (CIAM) solution is vital for insurance businesses aiming to develop trusted digital connections with their users and deliver tailored experiences that enhance revenues, build brand loyalty, and expedite internal processes.</p>\n<h2 id=\"concerns-of-insurance-companies\" style=\"position:relative;\"><a href=\"#concerns-of-insurance-companies\" aria-label=\"concerns of insurance companies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Concerns of Insurance Companies</h2>\n<p>The seamless user onboarding of new consumers, the overall <a href=\"https://www.loginradius.com/resource/how-customer-identity-drives-digital-transformation-for-insurance-companies-2/\">consumer experience</a>, and good authentication services and identification process when individuals use their online apps are some of the primary concerns. Other issues include managing multiple brands within a single organization and managing personal data both within and outside the company.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-customer-identity-drives-digital-transformation-for-insurance-companies-2/\"><img src=\"/1ded886401ef86146b2a0ecdc3f79aac/DS-dig-trans-insurance.webp\" alt=\"DS-dig-trans-insurance\"></a>   </p>\n<h2 id=\"what-businesses-use-ciam\" style=\"position:relative;\"><a href=\"#what-businesses-use-ciam\" aria-label=\"what businesses use ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Businesses Use CIAM</h2>\n<p>Businesses use Consumer Identity and Access Management (CIAM) systems to manage social networks and associated features. Consumers may sign up for and log in to online apps and services using CIAM solutions. They aid in protecting data privacy and preventing identity theft and other forms of corruption and theft.</p>\n<h2 id=\"how-ciam-can-assist-insurance-companies\" style=\"position:relative;\"><a href=\"#how-ciam-can-assist-insurance-companies\" aria-label=\"how ciam can assist insurance companies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How CIAM can Assist Insurance Companies</h2>\n<p>A CIAM platform helps with smooth and safe experiences throughout the online insurance lifecycle. It can assist in the following ways:</p>\n<h3 id=\"access-management\" style=\"position:relative;\"><a href=\"#access-management\" aria-label=\"access management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Access Management</h3>\n<p>Create and manage secure IDs for your prospective consumers for easy, frictionless access to insurance information across all platforms and touchpoints.</p>\n<ul>\n<li>With single sign-on and multi-factor authentication, you can simplify and secure access to digital assets.</li>\n<li>With extensive preferences and <a href=\"https://www.loginradius.com/consent-management/\">consent management</a> solutions, you can improve consumer connections.</li>\n<li>Use real-time consumer profile information to provide customized user experiences.</li>\n</ul>\n<h3 id=\"smooth-user-interaction\" style=\"position:relative;\"><a href=\"#smooth-user-interaction\" aria-label=\"smooth user interaction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Smooth User Interaction</h3>\n<p>Users must have a smooth integration when retrieving their data once they have created an account that provides access to their online insurance resources. The authentication procedure should provide for just-in-time, just-enough verification without interfering with the user's journey or jeopardizing security.</p>\n<p>The proper CIAM solution combines authentication flexibility with cutting-edge technologies such as <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">password-less authentication</a>, reauthentication, step-up, and platform independence.</p>\n<h3 id=\"secure-consumer-data\" style=\"position:relative;\"><a href=\"#secure-consumer-data\" aria-label=\"secure consumer data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Secure Consumer Data</h3>\n<p>With complete authentication, access management, and data governance capabilities, you can safeguard your company's reputation. Reliable CIAM software follows the industry's best security and privacy best practices.</p>\n<ul>\n<li><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-factor authentication</a> demands an extra layer of security for additional safeguard.</li>\n<li>Rigorous data analysis and scoped permissions, such as role-based and attribute-based access control (RBAC/ABAC), can help reduce risk.</li>\n<li>The consumer care portal's features can streamline user provisioning, consumer service, and consumer support.</li>\n</ul>\n<h3 id=\"services-to-multiple-users\" style=\"position:relative;\"><a href=\"#services-to-multiple-users\" aria-label=\"services to multiple users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Services to multiple users</h3>\n<p>An insurance company gears the majority of its information towards average end users like us. However, insurance firms also service businesses and frequently work with agents and brokers to generate new business.</p>\n<p>Businesses usually employ a mandate model, in which they provide permissions to specific people within their organization to manage insurance company relationships, which necessitates access to the insurance company infrastructure. Likewise, agents require access to essential applications in order to submit orders and assist the end-user.</p>\n<p>You want to encourage business users and agencies regardless of the business agreement; you don't want to have the regulatory burden while still being in charge. Business users and agents can establish and manage users within their designated scope by assigning authority and approvals.</p>\n<h3 id=\"frictionless-consumer-on-boarding\" style=\"position:relative;\"><a href=\"#frictionless-consumer-on-boarding\" aria-label=\"frictionless consumer on boarding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Frictionless Consumer On-boarding</h3>\n<p>Organizations must understand consumers' channels of engagement for getting products and services to develop a best-in-class safe consumer experience. It all starts with  <a href=\"https://www.loginradius.com/blog/fuel/importance-customer-onboarding/\">user onboarding</a> for new consumers with a seamless user journey tailored to the specific demands of the brand with which the user is registering.</p>\n<p>Because there are various points of interest in the <a href=\"https://www.loginradius.com/blog/identity/user-onboarding-revamp-application/\">onboarding process</a>, it always necessitates a meaningful discussion. On the one hand, the onboarding and signup process must be seamless in order to provide a positive consumer experience. On the other hand, the need for the appropriate level of security is pressing.</p>\n<p>Insurance companies will have to make trade-offs between protection and the client experience when developing the secure trip. Users get a smooth journey—creating better economic opportunities for digital banking. If they strike the appropriate balance, it <a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">reduces the risk</a> of opportunistic attackers.</p>\n<h2 id=\"bottom-line\" style=\"position:relative;\"><a href=\"#bottom-line\" aria-label=\"bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bottom line</h2>\n<p>Insurance companies often operate in a fast-paced environment, serving both consumers and businesses. They also deal with a complex IT infrastructure resulting from the multiple acquisitions that make up a typical contemporary insurance company.</p>\n<p><a href=\"https://www.loginradius.com/\">Implementing the right CIAM</a> solution is critical in the digital world of insurance firms in order to achieve their objectives and go above and beyond. This <a href=\"https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/\">CIAM digital strategy</a> can assist in the transformation of a conventional life insurance product into a more modern digital banking offering geared at wider consumer segments while still utilizing the traditional agent channel.\n<a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=enhance-customer-experience-in-insurance-companies-with-ciam\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-Consultation\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 09, 2021","updated_date":null,"description":"Unaided consumer interactions are a lost opportunity. The main goal of an insurance company should be to reduce the time taken in all their consumer interactions and increase the consumer experience level. This can only happen by implementing excellent systems and processes, which is where a CIAM comes into play.","title":"Enhance Your Consumer Experience in Insurance Companies With CIAM","tags":["ciam solution","mfa","passwordless authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.694915254237288,"src":"/static/466804b54dfb16cd18ce90fb5f6edcea/8829b/couple-meeting-with-insurance-agent.webp","srcSet":"/static/466804b54dfb16cd18ce90fb5f6edcea/61e93/couple-meeting-with-insurance-agent.webp 200w,\n/static/466804b54dfb16cd18ce90fb5f6edcea/1f5c5/couple-meeting-with-insurance-agent.webp 400w,\n/static/466804b54dfb16cd18ce90fb5f6edcea/8829b/couple-meeting-with-insurance-agent.webp 680w","sizes":"(max-width: 680px) 100vw, 680px"}}},"author":{"id":"Deependra Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Azure Key Vault is a highly secure, dependable, and simple method to store your keys and secrets in the cloud. This article…","fields":{"slug":"/engineering/guest-post/using-azure-key-vault-with-an-azure-web-app-in-c-sharp/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Azure Key Vault is a highly secure, dependable, and simple method to store your keys and secrets in the cloud. This article talks about:</p>\n<ul>\n<li>Azure Key Vault</li>\n<li>Why it is useful?</li>\n<li>How to set up and configure it?</li>\n<li>How to read a secret value stored inside it in C#?</li>\n</ul>\n<p>Use the following steps to read a secret stored in an Azure Key Vault instance.</p>\n<ol>\n<li>Create a Web App in the Azure Portal</li>\n<li>Enable Managed Service Identity for your Web App</li>\n<li>\n<p>Create and Configure Azure Key Vault</p>\n<ul>\n<li>Create a new Azure Key Vault Instance</li>\n<li>Create an App Secret in Azure key Vault</li>\n<li>Authorize the Web App to Access Key Vault</li>\n</ul>\n</li>\n<li>\n<p>Create a new ASP.NET 5 Core application</p>\n<ul>\n<li>Install NuGet Packages</li>\n<li>Read Azure Key Vault Secrets in .NET Core</li>\n<li>Specify the \"VaultUri\" in AppSettings</li>\n<li>Access Secrets from AzureKeyVault</li>\n<li>Retrieve Secret Value from AzureKeyVault</li>\n<li>Register the Dependencies in the ConfigureServices method</li>\n</ul>\n</li>\n<li>Deploy the Application to Azure</li>\n<li>Execute the Application</li>\n</ol>\n<h2 id=\"prerequisites\" style=\"position:relative;\"><a href=\"#prerequisites\" aria-label=\"prerequisites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prerequisites</h2>\n<p>To execute the code examples provided in this article, you should have each of the following:</p>\n<ol>\n<li>Visual Studio 2019 (preferred)</li>\n<li>Azure Account</li>\n</ol>\n<p>If you don't have an Azure account, you can create one for free here: <a href=\"https://portal.azure.com\">Azure Login</a></p>\n<h2 id=\"what-is-azure-key-vault\" style=\"position:relative;\"><a href=\"#what-is-azure-key-vault\" aria-label=\"what is azure key vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Azure Key Vault?</h2>\n<p>Azure Key Vault is a cloud service that helps you store your application's secrets securely: You can store and manage the keys, passwords, certificates, and other secrets. You can also leverage Azure Key Vault to set parameters shared among multiple applications, including applications running in App Service.</p>\n<p>It enables you to isolate the sensitive and non-sensitive data in your application. For example, you can use application settings to store default parameters or key-value pairs containing some default settings used by the application. On the contrary, you can use Azure Key Vault to store API keys, secret keys, database connection strings, or Client IDs used in your application.</p>\n<h2 id=\"understanding-managed-identity\" style=\"position:relative;\"><a href=\"#understanding-managed-identity\" aria-label=\"understanding managed identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding Managed Identity</h2>\n<p>Managed identity is a concept that eliminates the need of having to store credentials once an application has been deployed in the cloud. By using managed identity, you can securely access a variety of Azure services without having to store any credentials like connection strings or passwords. Managed identity may be used to connect to Key Vault from an Azure Function App or an Azure Web App, as well as to connect to Azure Blob Storage from an Azure Web App.</p>\n<p>Managed identities are of the following two types:</p>\n<ul>\n<li><strong>System-assigned</strong> -- this is activated directly on the Azure cloud service. For example, you can create a managed identity for your web app that will be automatically deleted once the web app instance is deleted</li>\n<li><strong>User-assigned</strong> -- this is a stand-alone Azure resource that is created independent of the actual service instance. You can assign this identifier to one or more Azure resources simultaneously. As an example, you can set this identity to both an Azure Web App and an Azure Function at the same time</li>\n</ul>\n<h2 id=\"create-a-web-app-in-the-azure-portal\" style=\"position:relative;\"><a href=\"#create-a-web-app-in-the-azure-portal\" aria-label=\"create a web app in the azure portal permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a Web App in the Azure Portal</h2>\n<p>You'll now create an Azure Web App instance with the permissions to access Azure Key Vault. Adhere to the steps given below that would guide you to create a new Azure Web App instance while you’re within the Azure portal:</p>\n<ol>\n<li>In the Azure Portal, click on \"Create a resource\" from the Home screen</li>\n<li>\n<p>Select \"Web App\" from the list</p>\n<p><img src=\"/57d9ac8ea06cb76e6f5576f578435282/881710611150de6c542f6656de3b727e.webp\" alt=\"Create a new resource in Azure\"></p>\n</li>\n<li>Specify the name and a region for your web app</li>\n<li>\n<p>Mention the resource group and app service plan for your web app</p>\n<p><img src=\"/d90fa23db0a92306eb07d5ec3d4bcee1/5624143e58bd0b77651c034c295db13c.webp\" alt=\"Create a Web App\"></p>\n</li>\n<li>In the Publish section, there are two choices: \"Code\" and \"Docker Container\". Choose \"Code\"</li>\n<li>Specify \".NET 5\" as the Runtime stack</li>\n<li>Set the Operation system to \"Windows\"</li>\n<li>For the region, specify the one that is closest to you</li>\n<li>You can leave the other options with their default values, and then, click on \"Review + Create\"</li>\n<li>Verify the configuration you've specified. If all is good, click \"Create\"</li>\n</ol>\n<p>Once the Web App has been created successfully, you'll be able to see it on the Home screen of the Azure Portal.</p>\n<h3 id=\"enable-managed-service-identity-for-your-web-app\" style=\"position:relative;\"><a href=\"#enable-managed-service-identity-for-your-web-app\" aria-label=\"enable managed service identity for your web app permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable Managed Service Identity for your Web App</h3>\n<p>To enable the system-assigned managed identity for the Azure Web App we just created, follow the steps given below:</p>\n<ol>\n<li>Select \"Identity\" from the left-side menu in the Azure Web App</li>\n<li>Change the \"Status\" toggle pertaining to the System-assigned tab to \"On\"</li>\n<li>Copy the \"Object ID\" that would be available after a few seconds</li>\n</ol>\n<p><img src=\"/c8e29ace7a489a5ddd80e9b9db7b1615/2e9e15c8ac1dfa31c0399b8d95112706.webp\" alt=\"Enable Managed Service Identity for your Web App\"></p>\n<h2 id=\"create-and-configure-azure-key-vault\" style=\"position:relative;\"><a href=\"#create-and-configure-azure-key-vault\" aria-label=\"create and configure azure key vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create and Configure Azure Key Vault</h2>\n<p>In this section, you’ll examine how to create and configure an Azure Key Vault instance.</p>\n<h3 id=\"create-a-new-azure-key-vault-instance\" style=\"position:relative;\"><a href=\"#create-a-new-azure-key-vault-instance\" aria-label=\"create a new azure key vault instance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a new Azure Key Vault Instance</h3>\n<p>You'll now create an Azure Key Vault in the Azure Portal and then add a secret to it. To create a new Azure Key Vault instance, navigate to the Azure Portal and follow the steps below:</p>\n<ol>\n<li>Select \"Create a resource\" in the Azure Portal menu or the Home page</li>\n<li>Specify \"Key Vault\" in the search box</li>\n<li>When the results are listed, choose \"Key Vault\"</li>\n<li>Click \"Create\"</li>\n</ol>\n<p><img src=\"/6c8f917aee70615430854be919ff8e50/9216ad5fd03240b518e4facf1d4e7127.webp\" alt=\"Create a new Key Vault Instance in Azure\"></p>\n<ol start=\"5\">\n<li>In the \"Create key vault\" screen provide the name, subscription, resource group name, and location. Leave the other options to their default values.</li>\n</ol>\n<p><img src=\"/0dfb9165ad5300ef2460b4b3d726bacd/9af0907aec14ae465c57c97a6c4ec146.webp\" alt=\"Specify name, subscription, resource group name, and location for the Key Vault Instance\"></p>\n<ol start=\"6\">\n<li>Click “Review + Create”</li>\n<li>Review the entered configuration. If all is fine, click \"Create\"</li>\n</ol>\n<h3 id=\"create-an-app-secret-in-azure-key-vault\" style=\"position:relative;\"><a href=\"#create-an-app-secret-in-azure-key-vault\" aria-label=\"create an app secret in azure key vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create an App Secret in Azure Key Vault</h3>\n<p>Now that you've created a Key Value instance, you'll add a secret to it and then make the secret accessible to the Azure Web App we created earlier. Follow the steps below to create a secret:</p>\n<ol>\n<li>Select \"Secrets\" from the \"Settings\" section of the \"Key Vault configuration\" page</li>\n<li>Click \"Generate/Import\" to add a secret</li>\n<li>Select \"Manual\" from the \"Upload options\" dropdown</li>\n<li>Next, mention the name and value of the secret</li>\n<li>Optionally specify the \"Content type\"</li>\n<li>Optionally set the \"activation and expiration date\" options</li>\n<li>Click \"Create\"</li>\n</ol>\n<p><img src=\"/f6f53232c190c95e6fbc50a51b76e891/f0c25e31cb9de4940c50cf37bf04e26d.webp\" alt=\"Create a new Secret\"></p>\n<h3 id=\"authorize-the-web-app-to-access-your-key-vault\" style=\"position:relative;\"><a href=\"#authorize-the-web-app-to-access-your-key-vault\" aria-label=\"authorize the web app to access your key vault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authorize the Web App to access Your Key Vault</h3>\n<p>To provide access to the secret you created, follow the steps below:</p>\n<ol>\n<li>Select \"Access policies\" from the \"Key Vault\" screen</li>\n<li>Click \"Add Access Policy\"</li>\n<li>Provide the \"Get\" and \"List\" permissions</li>\n<li>In the “Select a Principal” option, specify the value for the \"Object ID\" you\ncopied earlier for the Azure Web App</li>\n<li>Paste, search and then select it from the list</li>\n<li>Click \"Add\"</li>\n<li>Click \"Save\" to persist the changes and complete the process</li>\n</ol>\n<p><img src=\"/b195a1beb31cd4919a63d540e122f898/20064fe32ee34d74ab431409b7b3fcf6.webp\" alt=\"Add Access Policy for the Key Vault\"></p>\n<h2 id=\"create-a-new-aspnet-5-core-application\" style=\"position:relative;\"><a href=\"#create-a-new-aspnet-5-core-application\" aria-label=\"create a new aspnet 5 core application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a New ASP.NET 5 Core application</h2>\n<p>First of all, you'll create an ASP.NET Core 5 web application. The project type comes bundled with all the template files to create a web application, even before you add something. Follow the steps given below to create a new ASP.NET Core Web application within the Visual Studio 2019 IDE.</p>\n<ol>\n<li>Launch Visual Studio 2019</li>\n<li>In the start window, choose \"Create a new project\"</li>\n<li>In the \"Add a new project\" window, choose \"ASP.NET Core Web API\" from the list of the project templates</li>\n</ol>\n<p><img src=\"/75aa26fbfa2d48a9fc16ccd19179ef2f/68f5590f4a272da6dca010ff6f0bcfde.webp\" alt=\"Create a new project in Visual Studio\"></p>\n<ol start=\"4\">\n<li>Select \"C#\" as the programming language from the \"Language\" list</li>\n<li>Click \"Next\"</li>\n<li>In the \"Configure your new project\" screen, enter the name and location of the new project</li>\n<li>Then, choose \"Next\"</li>\n<li>In the \"Additional information\" window, ensure that .NET 5.0 (current) is selected as the framework version</li>\n</ol>\n<p><img src=\"/aa9816824fdcce3708272e3a4bc1d406/307b2784a56ac53e9fac3730a568c92d.webp\" alt=\"Specify additional information for the new ASP.NET Core 5 project\"></p>\n<ol>\n<li>Since you'll not be using authentication, HTTPS or Docker, or OpenAPI, ensure that all these checkboxes are disabled</li>\n<li>Click \"Create\" to complete the process</li>\n</ol>\n<p>A new ASP.NET 5 Core application will be created in Visual Studio.</p>\n<h3 id=\"install-the-nuget-packages\" style=\"position:relative;\"><a href=\"#install-the-nuget-packages\" aria-label=\"install the nuget packages permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Install the NuGet Packages</h3>\n<p>To work with AzureKeyVault, you must install <code>Microsoft.Extensions.Azure</code> and <code>Azure.Security.KeyVault.Secrets</code> packages. While you can use the former for injecting dependencies for accessing Azure services, you can use the latter to access secrets via a SecretClient instance.</p>\n<p>You may install these packages in one of two ways: Either via the NuGet Package Manager integrated into the Visual Studio 2019 IDE or by running the following command(s) in the Package Manager Console:</p>\n<p><code>Install-Package Microsoft.Extensions.Azure</code></p>\n<p><code>Install-Package Azure.Security.KeyVault.Secrets</code></p>\n<h3 id=\"read-azure-key-vault-secrets-in-net-core\" style=\"position:relative;\"><a href=\"#read-azure-key-vault-secrets-in-net-core\" aria-label=\"read azure key vault secrets in net core permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Read Azure Key Vault Secrets in .NET Core</h3>\n<p>In this section, you’ll examine how to read secrets from AzureKeyVault.</p>\n<h4 id=\"specify-the-vault-uri-in-appsettings\" style=\"position:relative;\"><a href=\"#specify-the-vault-uri-in-appsettings\" aria-label=\"specify the vault uri in appsettings permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Specify the Vault Uri in AppSettings</h4>\n<p>Create a section named \"KeyVault\" in the <code>appsettings.json</code> file and specify a key named \"VaultUri\" in there as shown below:</p>\n<p><code>\"KeyVault\": {</code></p>\n<p><code>\"VaultUri\": \"https://applicationsecretsdemo.vault.azure.net/\"</code></p>\n<p><code>}</code></p>\n<h4 id=\"access-secrets-from-azurekeyvault\" style=\"position:relative;\"><a href=\"#access-secrets-from-azurekeyvault\" aria-label=\"access secrets from azurekeyvault permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Access Secrets from AzureKeyVault</h4>\n<p>To access the secrets stored in the AzureKeyVault, you can take advantage of SecretClient pertaining to the  <code>Azure.Security.KeyVault.Secrets</code> namespace. Create an interface named \"IKeyVaultManager\" with the following code in there:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">interface</span><span class=\"mtk1\"> </span><span class=\"mtk10\">IKeyVaultManager</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">public </span><span class=\"mtk10\">Task</span><span class=\"mtk1\">&lt;</span><span class=\"mtk4\">string</span><span class=\"mtk1\">&gt; </span><span class=\"mtk11\">GetSecret</span><span class=\"mtk1\">(</span><span class=\"mtk4\">string</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>Create a class named \"KeyVaultManager\" that extends the \"IKeyVaultManager\" interface and implements the <code>GetSecret</code> method as follows:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">KeyVaultManager</span><span class=\"mtk1\">:</span><span class=\"mtk10\">IKeyVaultManager</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">private</span><span class=\"mtk1\"> </span><span class=\"mtk4\">readonly</span><span class=\"mtk1\"> </span><span class=\"mtk10\">SecretClient</span><span class=\"mtk1\"> </span><span class=\"mtk12\">_secretClient</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk11\">KeyVaultManager</span><span class=\"mtk1\">(</span><span class=\"mtk10\">SecretClient</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretClient</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\"> </span><span class=\"mtk12\">_secretClient</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">secretClient</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">async</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Task</span><span class=\"mtk1\">&lt;</span><span class=\"mtk4\">string</span><span class=\"mtk1\">&gt; </span><span class=\"mtk11\">GetSecret</span><span class=\"mtk1\">(</span><span class=\"mtk4\">string</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">try</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk10\">KeyVaultSecret</span><span class=\"mtk1\"> </span><span class=\"mtk12\">keyValueSecret</span><span class=\"mtk1\"> = </span><span class=\"mtk4\">await</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">_secretClient</span><span class=\"mtk1\">.</span><span class=\"mtk11\">GetSecretAsync</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk12\">keyValueSecret</span><span class=\"mtk1\">.</span><span class=\"mtk12\">Value</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">catch</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">throw</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>The \"KeyVaultManager\" class leverages the \"SecretClient\" class to retrieve secrets stored inside the AzureKeyVault.</p>\n<h4 id=\"the-keyvaluecontroller-class\" style=\"position:relative;\"><a href=\"#the-keyvaluecontroller-class\" aria-label=\"the keyvaluecontroller class permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The KeyValueController Class</h4>\n<p>The \"KeyValueController\" takes advantages of the \"KeyValueManager\" class to read the secret value for a given secret name and returns the value stored in there.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">KeyVaultController</span><span class=\"mtk1\"> : </span><span class=\"mtk10\">ControllerBase</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">private</span><span class=\"mtk1\"> </span><span class=\"mtk4\">readonly</span><span class=\"mtk1\"> </span><span class=\"mtk10\">IKeyVaultManager</span><span class=\"mtk1\"> </span><span class=\"mtk12\">_secretManager</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk11\">KeyVaultController</span><span class=\"mtk1\">(</span><span class=\"mtk10\">IKeyVaultManager</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretManager</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">_secretManager</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">secretManager</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">[</span><span class=\"mtk10\">HttpGet</span><span class=\"mtk1\">]</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">async</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Task</span><span class=\"mtk1\">&lt;</span><span class=\"mtk10\">IActionResult</span><span class=\"mtk1\">&gt; </span><span class=\"mtk11\">Get</span><span class=\"mtk1\">([</span><span class=\"mtk10\">FromQuery</span><span class=\"mtk1\">] </span><span class=\"mtk4\">string</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">try</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">if</span><span class=\"mtk1\"> (</span><span class=\"mtk12\">string</span><span class=\"mtk1\">.</span><span class=\"mtk11\">IsNullOrEmpty</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">))</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk11\">BadRequest</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">string</span><span class=\"mtk1\"> </span><span class=\"mtk12\">secretValue</span><span class=\"mtk1\"> = </span><span class=\"mtk4\">await</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">_secretManager</span><span class=\"mtk1\">.</span><span class=\"mtk11\">GetSecret</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretName</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">if</span><span class=\"mtk1\"> (!</span><span class=\"mtk12\">string</span><span class=\"mtk1\">.</span><span class=\"mtk11\">IsNullOrEmpty</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretValue</span><span class=\"mtk1\">))</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk11\">Ok</span><span class=\"mtk1\">(</span><span class=\"mtk12\">secretValue</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">else</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk11\">NotFound</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;Secret key not found.&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">catch</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk11\">BadRequest</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;Error: Unable to read secret&quot;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h4 id=\"register-the-dependencies-in-the-configureservices-method\" style=\"position:relative;\"><a href=\"#register-the-dependencies-in-the-configureservices-method\" aria-label=\"register the dependencies in the configureservices method permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Register the Dependencies in the ConfigureServices Method</h4>\n<p>You should specify the necessary code for dependency injection to work in the \"ConfigureServices\" method of the \"Startup\" class as shown in the code snippet given below:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">void</span><span class=\"mtk1\"> </span><span class=\"mtk11\">ConfigureServices</span><span class=\"mtk1\">(</span><span class=\"mtk10\">IServiceCollection</span><span class=\"mtk1\"> </span><span class=\"mtk12\">services</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">services</span><span class=\"mtk1\">.</span><span class=\"mtk11\">AddAzureClients</span><span class=\"mtk1\">(</span><span class=\"mtk12\">azureClientFactoryBuilder</span><span class=\"mtk1\"> =&gt;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">azureClientFactoryBuilder</span><span class=\"mtk1\">.</span><span class=\"mtk11\">AddSecretClient</span><span class=\"mtk1\">(</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">Configuration</span><span class=\"mtk1\">.</span><span class=\"mtk11\">GetSection</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&quot;KeyVault&quot;</span><span class=\"mtk1\">));</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">});</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">services</span><span class=\"mtk1\">.</span><span class=\"mtk11\">AddSingleton</span><span class=\"mtk1\">&lt;</span><span class=\"mtk10\">IKeyVaultManager</span><span class=\"mtk1\">,</span><span class=\"mtk10\">KeyVaultManager</span><span class=\"mtk1\">&gt;();</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk12\">services</span><span class=\"mtk1\">.</span><span class=\"mtk11\">AddControllersWithViews</span><span class=\"mtk1\">();</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h2 id=\"deploy-the-application-to-azure\" style=\"position:relative;\"><a href=\"#deploy-the-application-to-azure\" aria-label=\"deploy the application to azure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Deploy the Application to Azure</h2>\n<p>To deploy the application, follow the steps below:</p>\n<ol>\n<li>Right-click on the project in the \"Solution Explorer Window\"</li>\n<li>Select \"Publish\"</li>\n<li>Select \"Azure\" as the target from the \"Publish\" window as shown below:</li>\n</ol>\n<p><img src=\"/349e447be0993ca5822cb69e276b56be/8e627ca65b5d868ab7fca443032bc43c.webp\" alt=\"Deploy the application to Azure\"></p>\n<ol start=\"4\">\n<li>Select \"Azure App Service (Windows)\" as the specific target as shown below:</li>\n</ol>\n<p><img src=\"/dbe0774af8cb99c0e13057819bf1f974/f80e91e7daf51e89558a3e863ce72e2a.webp\" alt=\"Specify the Azure service to host your application\"></p>\n<ol start=\"5\">\n<li>Specify, or associate, the \"App Service instance\" with your application</li>\n</ol>\n<p><img src=\"/be6c907167a64104119ae61a187c96b6/89177ae5689c32f917b8d609f07f8ecc.webp\" alt=\"Publish your application\"></p>\n<ol start=\"6\">\n<li>Click \"Finish\"</li>\n</ol>\n<h2 id=\"execute-the-application\" style=\"position:relative;\"><a href=\"#execute-the-application\" aria-label=\"execute the application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Execute the Application</h2>\n<p>Lastly, you can use Postman to send a <code>Http Get</code> request to the endpoint to retrieve the stored secret as shown below:</p>\n<p><img src=\"/941c829d619a3d0b457d6a6c5f738eeb/383d2af1fcf9e2a16f2960de147ca549.webp\" alt=\"Execute the application\"></p>\n<h2 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summary</h2>\n<p>Azure key vault helps you to keep your application's secrets out of the application. You can use it to isolate secrets from your code files. These secrets include connection strings, API keys, environment variables, etc. You can take advantage of Azure Key Vault to keep secrets out of source control or out of your application in a centralized storage place. In this article, you've used managed identity to connect an Azure web app in .NET to an Azure Key Vault and retrieve secret value from there.</p>\n<p>The complete source code of the application discussed in this article can be found here: <a href=\"https://github.com/LoginRadius/engineering-blog-samples/pull/118\">Source Code</a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk10 { color: #4EC9B0; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n</style>","frontmatter":{"date":"August 09, 2021","updated_date":null,"description":"In this tutorial, you'll learn how to work with Azure Key Vault in C#.","title":"How to Use Azure Key Vault With an Azure Web App in C#","tags":["Azure","Key Vault","C#"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/5805f256d7d45f4c053d796f640836c2/58556/image.webp","srcSet":"/static/5805f256d7d45f4c053d796f640836c2/61e93/image.webp 200w,\n/static/5805f256d7d45f4c053d796f640836c2/1f5c5/image.webp 400w,\n/static/5805f256d7d45f4c053d796f640836c2/58556/image.webp 800w,\n/static/5805f256d7d45f4c053d796f640836c2/99238/image.webp 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Joydip Kanjilal","github":"joydipkanjilal","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":426,"currentPage":72,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}