{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/75","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"The world is facing an uphill battle amid the global pandemic that has forced small and medium businesses to adopt diverse digital sales…","fields":{"slug":"/identity/risk-management-essentials-enterprise/"},"html":"<p>The world is facing an uphill battle amid the global pandemic that has forced small and medium businesses to adopt diverse digital sales channels.</p>\n<p>Since these businesses collect consumer data, which is swiftly accumulating, there’s a significant concern regarding the overall security.</p>\n<p>Talking about the stats,<a href=\"https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance\"> WHO reported 450 active official email addresses and passwords</a> were leaked online along with thousands of other credentials – all linked with people working to lessen the COVID-19 impact.</p>\n<p>The more alarming thing is the fact that cybercriminals are continuously exploiting consumer data and have accelerated outbreaks by taking advantage of the chaotic time and the weaker first line of defense as businesses move to remote working ecosystems.</p>\n<p>So does it mean that businesses collecting consumer identities are now at more significant risk, especially those who have recently stepped into the digital commerce space?</p>\n<p>Yes, undoubtedly! Enterprises that are collecting, managing, and storing consumer identities in any form need to put their best foot forward in protecting sensitive consumer information, which, if not done at the earliest, may lead to undesirable consequences.</p>\n<p>Whether it’s the media industry or the education industry,<a href=\"https://www.loginradius.com/blog/identity/cyber-threats-business-risk-covid-19/\"> every industry is at a considerable risk of a security breach.</a>  </p>\n<p>In this post, we’ve outlined the aspects that can mitigate the risk during the uncertain times of COVID-19 and can help secure your business in a post-pandemic world.</p>\n<h3 id=\"1-creating-a-strong-password-policy-to-secure-remote-operation\" style=\"position:relative;\"><a href=\"#1-creating-a-strong-password-policy-to-secure-remote-operation\" aria-label=\"1 creating a strong password policy to secure remote operation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Creating a Strong Password Policy to Secure Remote Operation</h3>\n<p>Since remote working accounted for<a href=\"https://resources.malwarebytes.com/files/2020/08/Malwarebytes_EnduringFromHome_Report_FINAL.pdf\"> 20% of cybersecurity incidents</a> during the pandemic, securing the newly-adopted remote working ecosystem should be the #1 priority of businesses.</p>\n<p>To protect your organization's network, enforce a firm password security policy with the following practices:</p>\n<ul>\n<li><strong>Long passwords</strong>: The minimum length should be 15 characters, more if possible.</li>\n<li><strong>Mix characters</strong>: The password should be a combination of uppercase and lowercase letters, numbers, and symbols. The more complex your password is, the harder it will be for brute-force attackers.</li>\n<li><strong>Do not allow dictionary words</strong>: Do not use everyday dictionary words or even a combination of words. For example, \"chocolate\" is a bad password, so is \"dark chocolate\". Go for a passphrase instead. They are a string of related words with no sentence structure. Here is an example: hotdog food ketchup relish mustard mayo.</li>\n<li><strong>Don’t use memorable keyboard paths</strong>: Do not use sequential keyboard paths like qwerty, a1s2d3f4, or asdfgh.</li>\n<li><strong>Change passwords regularly</strong>: Change passwords at a regular interval. It can be once every month or twice a month.</li>\n<li><strong>Use a password manager</strong>: Password managers can auto-generate and store strong passwords on your behalf. They save your passwords in an encrypted, centralized location and allow you to access them with a master password.</li>\n</ul>\n<h3 id=\"2-embrace-multi-factor-authentication-mfa-to-prevent-unauthorized-access\" style=\"position:relative;\"><a href=\"#2-embrace-multi-factor-authentication-mfa-to-prevent-unauthorized-access\" aria-label=\"2 embrace multi factor authentication mfa to prevent unauthorized access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Embrace Multi-Factor Authentication (MFA) to Prevent Unauthorized Access</h3>\n<p>Cybercriminals are already bypassing weak lines of defense, which means a stringent action plan must be in place to</p>\n<p>When it comes to preventing unauthorized access to resources and sensitive information within a network, MFA can be the game-changer.</p>\n<p>For the most secure user sign-ins, you should combine elements like biometrics, SMS/text messages, emails, and security questions. Use<a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\"> extra layers of protection</a>, like text verification, email verification, or time-based security codes.</p>\n<p>LoginRadius’ CIAM (consumer identity and access management) solution provides multiple layers of security to ensure consumer data and enterprise information remain highly secure.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-GD-to-MFA.webp\" alt=\"EB-GD-to-MFA\"></a></p>\n<h3 id=\"3-cyber-awareness-training-to-avoid-human-error\" style=\"position:relative;\"><a href=\"#3-cyber-awareness-training-to-avoid-human-error\" aria-label=\"3 cyber awareness training to avoid human error permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Cyber Awareness Training to Avoid Human Error</h3>\n<p>Most cyber criminals try to sneak into a network by targeting employees through several attacks, including phishing, social engineering, and malware attacks.</p>\n<p>Suppose the employees of an organization aren’t aware of the latest attacks and how they can enhance their security while working. In that case, it may lead to a security breach causing millions of dollars of losses to the organization.</p>\n<p>Businesses must minimize human error as most of the attacks are successful just because of human error.</p>\n<p>Frequent cyber awareness training sessions must be organized within the enterprise to ensure that employees are aware of phishing emails and social engineering attacks and can handle these issues at their end.</p>\n<h3 id=\"4-unleash-the-potential-of-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#4-unleash-the-potential-of-risk-based-authentication-rba\" aria-label=\"4 unleash the potential of risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Unleash the Potential of Risk-Based Authentication (RBA)</h3>\n<p>Risk-based authentication is perhaps the best weapon against unauthorized access and to enhance network security.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">RBA is a mechanism</a> that automatically adds another stringent layer of authentication whenever the system detects any unusual login attempt or an attempt that seems fishy.</p>\n<p>For instance, if a user tries to log in from his/her town and in a few minutes, a similar login request is made from another country (even if the login credentials are the same), the user would need to prove identity through another authentication process. An alert regarding the same would also be sent to the admin.</p>\n<h3 id=\"5-data-encryption--the-need-of-the-hour\" style=\"position:relative;\"><a href=\"#5-data-encryption--the-need-of-the-hour\" aria-label=\"5 data encryption  the need of the hour permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Data Encryption- The Need of the Hour</h3>\n<p>To ensure data security on mobile devices and build trustworthiness, encryption must be in place. In this process, data is encoded to be inaccessible to unauthorized users and helps to protect sensitive data and private information.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">Encryption</a> can also improve the security of communication between servers and client apps.</p>\n<p>Although encryption is basic, it's an essential aspect of data security. Organizations must do all that they can to protect their customer's information online as well as their own. Hence, it's becoming more and more common for technology encryption to be activated on apps and websites.</p>\n<h2 id=\"final-words\" style=\"position:relative;\"><a href=\"#final-words\" aria-label=\"final words permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Words</h2>\n<p>With the rising number of identity thefts and security breaches amid the global pandemic, enterprises that haven’t yet deployed a consumer identity and access management solution should immediately put their best foot forward to reinforce their security mechanism.</p>\n<p><a href=\"https://www.loginradius.com/contact-sales/\">LoginRadius</a> can be the most acceptable alternative for both the enterprises and startups that are collecting customer data and need to ensure a secure ecosystem without hampering the overall user experience.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=risk-management-essentials-enterprise\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 20, 2021","updated_date":null,"description":"Cybercriminals continuously exploit consumer data and have accelerated outbreaks by taking advantage of the chaotic time, and the weaker first line of defense as businesses adopt new working ecosystems. This post covers all the aspects that require immediate consideration to minimize the risk of identity theft or a security breach.","title":"COVID-19 and Beyond: 5 Risk Management Essentials for Your Enterprise","tags":["risk management","cybersecurity","ciam solution","password management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/fcf2926caac8812410816eca189741aa/58556/risk-management-essentials-enterprise-cover.webp","srcSet":"/static/fcf2926caac8812410816eca189741aa/61e93/risk-management-essentials-enterprise-cover.webp 200w,\n/static/fcf2926caac8812410816eca189741aa/1f5c5/risk-management-essentials-enterprise-cover.webp 400w,\n/static/fcf2926caac8812410816eca189741aa/58556/risk-management-essentials-enterprise-cover.webp 800w,\n/static/fcf2926caac8812410816eca189741aa/99238/risk-management-essentials-enterprise-cover.webp 1200w,\n/static/fcf2926caac8812410816eca189741aa/7c22d/risk-management-essentials-enterprise-cover.webp 1600w,\n/static/fcf2926caac8812410816eca189741aa/25f09/risk-management-essentials-enterprise-cover.webp 1920w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Username and password were considered the only way to authenticate a user when we look back into ancient times. However, with advancements…","fields":{"slug":"/identity/webauth-secures-user-login/"},"html":"<p>Username and password were considered the only way to authenticate a user when we look back into ancient times.</p>\n<p>However, with advancements in technology, authentication has witnessed significant progress in the past couple of years.</p>\n<p>Today, when it comes to securing user accounts and offering the finest user experience, WebAuthn leaves no stone untouched in delivering a seamless authentication experience.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/webauthn-authentication-application/\">WebAuth</a> has offered endless benefits to enterprises striving to manage and secure consumer identities and data as it sets a new bar for user authentication.</p>\n<p>Moreover, with robust authentication backed by a flawless user experience, including passwordless experience, WebAuthn provides a long list of opportunities to businesses.</p>\n<p>In this post, we’ll learn more about WebAuthn and how it paves the path for a secure and seamless user login experience.</p>\n<h2 id=\"what-is-webauth\" style=\"position:relative;\"><a href=\"#what-is-webauth\" aria-label=\"what is webauth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is WebAuth</h2>\n<p>For those who aren’t aware of the term ‘WebAuthn’- it is a new standard for authentication, which is published by the World Wide Web Consortium and is supported by the FIDO alliance.</p>\n<p>WebAuthn works by offering a way for users to authenticate through third-party authentication providers. These third-party authentication providers can be built into the operating system, like Windows Hello, or Android biometrics, and even external authenticators, including a USB authenticator.</p>\n<p>Since the use of WebAuthn is now becoming an industry-standard in the digital world, enterprises must gear up to leverage their true potential when it comes to securing consumer data.</p>\n<h2 id=\"how-webauthn-works\" style=\"position:relative;\"><a href=\"#how-webauthn-works\" aria-label=\"how webauthn works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How WebAuthn Works</h2>\n<p>WebAuthn is supported on various web browsers including Firefox, Chrome, Edge, and Safari. It’s a part of the <a href=\"https://www.loginradius.com/resource/fido2-authentication-standard-datasheet\">FIDO2 framework</a> and this framework is a set of technologies that enables authentication without the reliance on passwords between servers, authenticators, and web browsers.</p>\n<p>The Web Authentication API (WebAuthn) allows servers to quickly register and provide authentication to users that are using public-key cryptography instead of username and passwords.</p>\n<p>In this overall process, a private-public key pair, i.e., the credential is created for a web application and the private key is securely stored on a particular user’s device. On the other hand, the public key along with the credential ID (randomly generated) is further sent to the server for storage. The server further uses that particular public key to prove the identity of a user.</p>\n<p>Also, the public key here is no secret. The reason is, it becomes useless without a corresponding private key. Now even if the attacker has the public key, it’s of no use.</p>\n<h2 id=\"how-does-it-work-for-user-login\" style=\"position:relative;\"><a href=\"#how-does-it-work-for-user-login\" aria-label=\"how does it work for user login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does it Work for User Login</h2>\n<p>WebAuthn is widely used to provide biometric MFA (multi-factor authentication) where voice, fingerprint, or a retina scan is considered as a unique factor to a particular user.</p>\n<p>Today, most of the devices have a biometric device, like a smartphone, which can use the unique data that further creates and manages credentials, which can be accessed only by the owner.</p>\n<p>Since WebAuthn supports MFA, it can help to replace the standard website or web application password as it’s a far more secure way of authenticating.</p>\n<p>Whenever a user needs to prove their identity, the smart biometric can be utilized to authenticate a user on a particular platform without the need to enter credentials again and again.</p>\n<p>Let’s understand this with a real-life example where we can use WebAuthn for handling authentication after an individual has registered with a web application.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-GD-to-MFA.webp\" alt=\"EB-GD-to-MFA\"></a></p>\n<p>Suppose the user is registered from their phone and navigates to the web application to log in. In that case, they are prompted to enter their password or biometric, which is associated with that particular account. The user can simply use their biometric to log in without the need to enter lengthy passwords.</p>\n<p>Apart from this, the website or web application owner can also use it for multi-factor authentication that further reinforces overall login security.</p>\n<p>In this entire scenario, the user login is secured as attackers that have access to user credentials cannot access the account as MFA kicks in and demands the user to go through another stringent authentication process.</p>\n<h2 id=\"implementing-passwordless-authentication-with-loginradius\" style=\"position:relative;\"><a href=\"#implementing-passwordless-authentication-with-loginradius\" aria-label=\"implementing passwordless authentication with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Passwordless Authentication with LoginRadius</h2>\n<p>The best way to provide seamless registration and authentication for your customers is with a <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">passwordless login</a> solution through WebAuthn. This gives your users a hassle-free way to access their accounts—with no passwords needed! </p>\n<p>The LoginRadius Identity Platform is an out-of-the-box way for you to do this easily. The identity and access management platform is fully customizable too, so you can simplify your customer experience to suit your company’s needs.</p>\n<h2 id=\"how-does-loginradius-passwordless-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-loginradius-passwordless-authentication-work\" aria-label=\"how does loginradius passwordless authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does LoginRadius Passwordless Authentication Work?</h2>\n<p><strong>Step 1:</strong> On the website login page, a customer will be asked to enter the email address. It will act as their username too.</p>\n<p><strong>Step 2:</strong> LoginRadius will send a temporary verification link to the associated email address. You can custom-set the duration that link will remain active before it expires.</p>\n<p><strong>Step 3:</strong> The customer is prompted to click the verification link, which is then authenticated and redirected to the website the customer originated from.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>As the number of data breaches increases due to credential misuse, adding robust layers of security for your consumers is the need of the hour.</p>\n<p>WebAuthn could be a game-changer for any business striving to <a href=\"https://www.loginradius.com/customer-security/\">win consumer trust</a> as it offers a great user experience backed with the highest level of security.</p>\n<p>If you wish to deliver the next level of login experience to your consumers that not only ensures robust security but eventually helps to scale your business growth, LoginRadius is what you need.</p>\n<p><a href=\"https://www.loginradius.com/contact-sales/\">Reach us</a> for a personalized demo and know-how LoginRadius works for your business.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=webauth-secures-user-login\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 20, 2021","updated_date":null,"description":"WebAuthn is a new standard for authentication, which is published by the World Wide Web Consortium and is supported by the FIDO alliance. In this post, we’ve highlighted the role of WebAuthn and how it helps to create a secure login experience for consumers.","title":"How WebAuth Secures Your Users’ Login","tags":["passwordless authentication","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0df4fb4774d60c2a75c0bf7a37f97ba8/58556/webauth-secures-user-login-cover.webp","srcSet":"/static/0df4fb4774d60c2a75c0bf7a37f97ba8/61e93/webauth-secures-user-login-cover.webp 200w,\n/static/0df4fb4774d60c2a75c0bf7a37f97ba8/1f5c5/webauth-secures-user-login-cover.webp 400w,\n/static/0df4fb4774d60c2a75c0bf7a37f97ba8/58556/webauth-secures-user-login-cover.webp 800w,\n/static/0df4fb4774d60c2a75c0bf7a37f97ba8/cc834/webauth-secures-user-login-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Many industries have foreseen the rising digitization of both residential and commercial procedures, products, and services. It includes…","fields":{"slug":"/growth/consumer-identity-role-in-the-digital-banking/"},"html":"<p>Many industries have foreseen the rising digitization of both residential and commercial procedures, products, and services. It includes both commercials as well as industrial processes, goods, and services.</p>\n<p>The banking sector has already adapted to such digitalization and is aiming to procure more consumers via online means and strategies.</p>\n<p>These initiatives sought to improve <a href=\"https://www.loginradius.com/blog/identity/financial-industry-identity-management/\">user banking authentication</a>, increase self-service in banking transactions, and reduce operational inefficiencies, among other things. That is the quantity, time, and complexity of the \"bureaucracy\" required to comply with any activity, allowing the process to be sped up significantly.</p>\n<h2 id=\"banks-have-accepted-and-adapted-digital-means\" style=\"position:relative;\"><a href=\"#banks-have-accepted-and-adapted-digital-means\" aria-label=\"banks have accepted and adapted digital means permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Banks Have Accepted and Adapted Digital Means</h2>\n<p>Banking firms have quickly adapted to shifts in their clients' tastes and consumption patterns, which are becoming increasingly localized on the Internet and through mobile devices. Clients are no longer going to a branch to create an account, get a mortgage, or transfer money.</p>\n<p>They now need to conduct their operations from the comfort of their own homes, or from wherever. All of this is available at the push of a button. It makes them feel in charge of the transaction, ensuring that it is completed quickly and simply.</p>\n<h2 id=\"a-challenge-that-remains-constant\" style=\"position:relative;\"><a href=\"#a-challenge-that-remains-constant\" aria-label=\"a challenge that remains constant permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Challenge that Remains Constant</h2>\n<p>Regardless of these broader trends, banks' security remains a top priority. The use of digital banking is on the rise, as are the risks it generates.</p>\n<p>Even today, online users use weak passwords or don't change their passwords frequently enough. It fails secure internet banking authentication. Most importantly, consumers are failing to realize how cybercrime is increasingly targeting mobile platforms and systems.</p>\n<p>Financial affairs control and <a href=\"https://www.loginradius.com/industry-finance-and-banking/\">safe banking authentication</a> are now moved to each of the clients' mobile phones. It is no more being safeguarded in guarded offices and big headquarters safes. This disintermediation fosters identity theft or fabrication, fraud, and, as a result, money laundering and criminal financing.</p>\n<h2 id=\"passwords-are-not-enough\" style=\"position:relative;\"><a href=\"#passwords-are-not-enough\" aria-label=\"passwords are not enough permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwords Are Not Enough</h2>\n<p>Safeguarding against cyberattacks is only one aspect of identity management. In a digital environment where data is exploding in volume and velocity, and clients use many platforms to obtain financial services, managing identities is becoming increasingly difficult and costly.</p>\n<p>To put that in context, identity solutions for digital marketing and access management currently account for more than 30% of a big financial institution's overall information security budget.</p>\n<p>The instruments that assure the legality of these distant movements are the electronic signature and systems for certified evidence retention. The main problem, however, is identity identification, which ensures the transaction's authenticity and intentionality. It is no longer sufficient to protect a basic user code and password.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><img src=\"/3b805aa6360a4f8988029e88494d1c9d/Product-Passwordless-Login.webp\" alt=\"Product-Passwordless-Login\"></a></p>\n<h2 id=\"what-to-do-to-highlight-consumer-identity\" style=\"position:relative;\"><a href=\"#what-to-do-to-highlight-consumer-identity\" aria-label=\"what to do to highlight consumer identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What To Do To Highlight Consumer Identity</h2>\n<p>The solution currently rests in cutting-edge technologies that combine fluid usability, accessibility from any smartphone, and the implementation of various tests and precise security measures. We're discussing MFA (Multi-factor authentication banking) solutions.</p>\n<h3 id=\"elements-of-mfa\" style=\"position:relative;\"><a href=\"#elements-of-mfa\" aria-label=\"elements of mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Elements of MFA</h3>\n<p>Anything that the user knows (e.g., a password or PIN), anything that the user owns (e.g., a mobile device), and something the user is; are the three fundamental aspects of an MFA (i.e., like a fingerprint, or voice). Multi-factor authentication banking is based on the idea that a second or third authentication element will make up for the deficiency of the first, and vice versa.</p>\n<p>Mobile banking multi-factor authentication  operates by requesting extra information for verification (factors). The one-time password is one of the most prevalent MFA elements that consumers face (OTP).</p>\n<p>Also Read: <a href=\"https://www.loginradius.com/blog/identity/financial-industry-identity-management/\">7 Benefits of Multi-Factor Authentication</a></p>\n<h3 id=\"biometric-way-to-ensure-complete-security\" style=\"position:relative;\"><a href=\"#biometric-way-to-ensure-complete-security\" aria-label=\"biometric way to ensure complete security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric way to ensure complete security</h3>\n<p>Biometric authentication for online banking is a computer-assisted technique of identifying consumers based on biological features and qualities such as fingerprints, finger vein patterns, iris recognition, and voice recognition. Because biometric authentication is unique to each person and difficult to counterfeit, biometric verification and authentication are widely used in immigration control, law enforcement, and forensic research.</p>\n<p>The advantages of <a href=\"https://www.loginradius.com/blog/identity/biometric-authentication-mobile-apps/\">biometric authentication</a> must exceed the expense and complication of deployment for the target user. When it comes to analyzing alternative biometric solutions for comfort, banks must engage in discussion before using the technique.</p>\n<h2 id=\"meet-the-evolving-consumer-demands-while-protecting-data\" style=\"position:relative;\"><a href=\"#meet-the-evolving-consumer-demands-while-protecting-data\" aria-label=\"meet the evolving consumer demands while protecting data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Meet The Evolving Consumer Demands While Protecting Data</h2>\n<p>User onboarding expectations have increased in tandem with the evolution of digital services. When it comes to internet banking, consumers increasingly demand user-friendly solutions and streamlined efficiency. If this isn't available, they may easily move to a rival, like with internet purchasing.</p>\n<p>Digital identity, as the boundary of online services, is critical to online banking. Consumer-friendly identity and user management in banking are critical not just for offering seamless experiences, but also for protecting sensitive consumer information. Banks may adopt safe and consumer-centric digital access control by using a CIAM approach to MFA or 2-factor authentication (2FA).</p>\n<p>As a result, several financial institutions are deploying client identification and access management systems.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Public and commercial banks are emphasizing cybersecurity controls and tactics in digitalization and e-commerce, where criminality takes on more subtle and undetectable forms.</p>\n<p>If identification is the real cash, then digital identity and banking authentication is undoubtedly the new banking. And financial institutions have all of the investments necessary to make this new approach effective in the digital ecosystems of the coming years.</p>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius</a> provides seamless, call or SMS-based Multi-Factor Authentication with a visible layer of security protection. You get to choose whether this security system is mandatory or optional for your consumers. The SMS and call systems hold zero lag with global coverage! <a href=\"https://www.loginradius.com/contact-sales/\">Contact the team</a> today!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=consumer-identity-role-in-the-digital-banking\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-Consultation\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 19, 2021","updated_date":null,"description":"Digital identity, as the boundary of online services, is critical to online banking. Consumer-friendly identity and user management in banking are critical not just for offering seamless experiences, but also for protecting sensitive consumer information.","title":"Role of Consumer Identity Authentication in Digital Banking","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/85268c047696dc3236d83acb30661eb6/58556/Digital-banking-platform-making-opt.webp","srcSet":"/static/85268c047696dc3236d83acb30661eb6/61e93/Digital-banking-platform-making-opt.webp 200w,\n/static/85268c047696dc3236d83acb30661eb6/1f5c5/Digital-banking-platform-making-opt.webp 400w,\n/static/85268c047696dc3236d83acb30661eb6/58556/Digital-banking-platform-making-opt.webp 800w,\n/static/85268c047696dc3236d83acb30661eb6/99238/Digital-banking-platform-making-opt.webp 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"It is scientifically proven that helping others makes people happy. Probably no one knows this better than the developer community around…","fields":{"slug":"/engineering/loginradius-sponsorship-freecodecamp/"},"html":"<p>It is scientifically proven that helping others makes people happy. Probably no one knows this better than the developer community around the world, which continues to amaze by contributing extensively to free and open source software.</p>\n<p>And there is <a href=\"https://www.freecodecamp.org/\">freeCodeCamp</a> community, a nonprofit started in 2014 by <a href=\"https://twitter.com/ossia\">Quincy Larson</a>. It has been helping thousands of aspiring developers learn web development and find their first software jobs. The community features a self-paced learning platform that helps learn various web technologies, including Bootstrap, D3, jQuery, and React, among many others.</p>\n<p>Being a nonprofit, freeCodeCamp entirely works based on charitable donations and contributions of developers to maintain its learning platform. In fact, it is so efficient that with every $5 in donation, it can provide more than 250 hours of learning. And it is so effective that some of its alumni work for marquee tech companies like Apple, Google, Microsoft, and Amazon, among others.</p>\n<p>In 2013, just a year before freeCodeCamp was established, we founded LoginRadius with a vision to secure every identity on this planet. From our early beginnings, we have developed LoginRadius CIAM to empower developers to build more secure applications and simplify the implementation of customer identity and access management on their production applications to save development and maintenance time. Today, burgeoning startups to Fortune 500 companies trust LoginRadius, and we're now collectively handling 1.17 billion user identities for our customers worldwide.</p>\n<p>We are as obsessed as freeCodeCamp to support and enable the developer community to do much more and make this world a better place. And we wanted to continuously help the freeCodeCamp community in any way possible.</p>\n<p>Today, we are a <a href=\"https://www.freecodecamp.org/news/sponsors/\">proud sponsor</a> of freeCodeCamp and supporting the community's developers. </p>\n<p><a href=\"https://accounts.loginradius.com/auth.aspx?action=register\">Signup here</a> if you're a developer from the freeCodeCamp community. And we'll offer $200 credits so you can leverage LoginRadius CIAM — beyond the free developer tier — to implement highly secure, user-centric customer identity and access management.</p>\n<p>This is indeed a moment of joy and pride for everyone at LoginRadius. We would like to extend our gratitude to freeCodeCamp for letting us be a part of its journey in strengthening the developer community.</p>\n<p>By the way, if you want to share your expertise with the developer community, please feel free to write for the LoginRadius Blog portal. We have an open for contributions policy so anyone around the world can <a href=\"https://github.com/LoginRadius/engineering-portal/blob/master/CONTRIBUTING.md\">contribute</a>. Find more details on our public <a href=\"https://github.com/LoginRadius/engineering-portal\">GitHub repo</a>.</p>\n<p><img src=\"https://media.giphy.com/media/xUPGcGJJMFeAPhqrfi/giphy.gif\" alt=\"Squad Goals\"></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 16, 2021","updated_date":null,"description":"LoginRadius now supports the freeCodeCamp community through a sponsorship program. We also offer $200 credits to freeCodeCamp developers to help them rapidly implement world-class customer identity and access management in their applications.","title":"One Vision, Many Paths: How We’re Supporting freeCodeCamp","tags":["LoginRadius","sponsorship","freeCodeCamp"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/e2d9670f74a3203d6424fc773fbaf35b/58556/cover.webp","srcSet":"/static/e2d9670f74a3203d6424fc773fbaf35b/61e93/cover.webp 200w,\n/static/e2d9670f74a3203d6424fc773fbaf35b/1f5c5/cover.webp 400w,\n/static/e2d9670f74a3203d6424fc773fbaf35b/58556/cover.webp 800w,\n/static/e2d9670f74a3203d6424fc773fbaf35b/cc834/cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Raghunath Reddy","github":"raghunath-r-a","avatar":null}}}},{"node":{"excerpt":"Introduction In C# 9.0, there are multiple features introduced. One of them is the Init-Only setters property feature. To use this feature…","fields":{"slug":"/engineering/csharp-init-only-setters-property/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In C# 9.0, there are multiple features introduced. One of them is the <strong>Init-Only setters property</strong> feature. To use this feature, there are two pre-requisite.</p>\n<ol>\n<li>You should have the .NET 5 SDK installed in your system. If not, you can download and install it from <a href=\"https://dotnet.microsoft.com/download/dotnet/5.0\">here</a>.</li>\n<li>You should have at least a 16.7 version or the latest version of Visual Studio 2019. If not, then you have to update your Visual Studio 2019 to the latest version.</li>\n</ol>\n<p>After this setup, you are ready to go with the Init-Only setters property feature.</p>\n<p>Before knowing more about this feature, first, we will understand how we are using properties currently in C#.</p>\n<h2 id=\"how-we-are-using-the-properties-currently\" style=\"position:relative;\"><a href=\"#how-we-are-using-the-properties-currently\" aria-label=\"how we are using the properties currently permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How we are using the properties currently</h2>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk12\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> { </span><span class=\"mtk12\">get</span><span class=\"mtk1\">; </span><span class=\"mtk12\">set</span><span class=\"mtk1\">; }</span></span></code></pre>\n<p>This is the way how we are using the properties, but whenever if we don't want to change the value of a property outside of a class and make them readable publicly, then we generally define the property as below.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk12\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> { </span><span class=\"mtk12\">get</span><span class=\"mtk1\">; </span><span class=\"mtk10\">private</span><span class=\"mtk1\"> </span><span class=\"mtk12\">set</span><span class=\"mtk1\">; }</span></span></code></pre>\n<p>In that case, the Id property can not be set outside of the class, and to set this property, we have to introduce a constructor or a public method that can set the value of the Id field. Like below</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Company</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> { </span><span class=\"mtk4\">get</span><span class=\"mtk1\">; </span><span class=\"mtk4\">private</span><span class=\"mtk1\"> </span><span class=\"mtk4\">set</span><span class=\"mtk1\">; }</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk11\">Company</span><span class=\"mtk1\">(</span><span class=\"mtk4\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">id</span><span class=\"mtk1\">) </span><span class=\"mtk3\">// Constructor</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">id</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">void</span><span class=\"mtk1\"> </span><span class=\"mtk11\">SetId</span><span class=\"mtk1\">(</span><span class=\"mtk4\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">id</span><span class=\"mtk1\">) </span><span class=\"mtk3\">//Public method</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">id</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>Below are the problems which arise by using the above method</p>\n<ol>\n<li>We are not able to set the property value by using the <em>object initialization</em></li>\n<li>If we want to set the property as <em>immutable</em> (Value can not be changed), then we can not achieve this because any public method can change the value of that property, so here the property is <em>mutable</em> (Value can be changed).</li>\n</ol>\n<p>To fix those issues, In C# 9.0 Init-Only setters property feature was introduced. Have a look at this.</p>\n<h2 id=\"init-only-setters-property\" style=\"position:relative;\"><a href=\"#init-only-setters-property\" aria-label=\"init only setters property permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Init-Only Setters Property</h2>\n<p>Init-Only setters property gives us the flexibility to set the value of a property by using the object initializer as well the property is also immutable. So that will resolve the above issues, which were with the <em>private set</em> property.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Company</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> { </span><span class=\"mtk4\">get</span><span class=\"mtk1\">; init; }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk10\">Company</span><span class=\"mtk1\"> </span><span class=\"mtk12\">comp</span><span class=\"mtk1\">=</span><span class=\"mtk4\">new</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Company</span><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk12\">Id</span><span class=\"mtk1\">=</span><span class=\"mtk7\">1</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}; </span><span class=\"mtk3\">// It works fine if we initialize here</span></span></code></pre>\n<p>As we can, it is perfectly fine to set the value during object initialization.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Company</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> { </span><span class=\"mtk4\">get</span><span class=\"mtk1\">; init; }</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">     </span><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk11\">Company</span><span class=\"mtk1\">(</span><span class=\"mtk4\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">id</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">Id</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>We can define the constructor as well to initialize the Init-Only setters property. </p>\n<p>If we will try to create a method in the class and want to change the value Init-Only setters property, then it will give us the compile-time error.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"c#\" data-index=\"6\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">Company</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> { </span><span class=\"mtk4\">get</span><span class=\"mtk1\">; init; }</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">public</span><span class=\"mtk1\"> </span><span class=\"mtk4\">void</span><span class=\"mtk1\"> </span><span class=\"mtk11\">SetId</span><span class=\"mtk1\">(</span><span class=\"mtk4\">int</span><span class=\"mtk1\"> </span><span class=\"mtk12\">Id</span><span class=\"mtk1\">)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">Id</span><span class=\"mtk1\"> = </span><span class=\"mtk12\">Id</span><span class=\"mtk1\">; </span><span class=\"mtk3\">// Compile-time Error</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we learned how we are setting the properties in C# currently and the new C# 9.0 feature Init-Only Setters Property. Also, we understood how this feature helps us to set the property value with the object initialization.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk10 { color: #4EC9B0; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk3 { color: #6A9955; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n</style>","frontmatter":{"date":"July 15, 2021","updated_date":null,"description":"In this article, we will talk about Init-Only Setters Property in C#.","title":"C# Init-Only Setters Property","tags":["C#","Properties","Init"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/879023ad1196d757394d7314a2cb202d/58556/coverimage.webp","srcSet":"/static/879023ad1196d757394d7314a2cb202d/61e93/coverimage.webp 200w,\n/static/879023ad1196d757394d7314a2cb202d/1f5c5/coverimage.webp 400w,\n/static/879023ad1196d757394d7314a2cb202d/58556/coverimage.webp 800w,\n/static/879023ad1196d757394d7314a2cb202d/99238/coverimage.webp 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Hemant Manwani","github":"hemant404","avatar":null}}}},{"node":{"excerpt":"Introduction Adaptive authentication is a game-changer for enterprises that require strong fencing to protect consumer and enterprise data…","fields":{"slug":"/identity/adaptive-authentication/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Adaptive authentication is a game-changer for enterprises that require strong fencing to protect consumer and enterprise data. Here’s a quick read depicting the role and need for adaptive authentication instead of just multi-factor authentication.</p>\n<p>With technology evolving leaps and bounds, identity and access management become stringently important for businesses collecting user information.</p>\n<p>However, managing the identities of millions of consumers wasn’t a tough nut to crack earlier as it is today.</p>\n<p>Especially in the most unpredictable times of COVID-19 when the world is witnessing a <a href=\"https://www.statista.com/statistics/1175574/increase-cyber-fraud-coronavirus-outbreak/\">substantial surge in the number of security breaches</a>.</p>\n<p>Security layers backed by multi-factor authentication (MFA) were considered entirely secure when enterprises had a limited number of consumers.</p>\n<p>We’re talking about the era when no one expected the abrupt rise of SaaS applications for the enhanced business process containing heaps of sensitive data (client and organization).</p>\n<p>For many enterprises, this meant the need to implement multi-factor authentication, which, however, proved to be fruitful but may not work in a high-risk event.</p>\n<p>So, does it mean that multi-factor authentication isn’t the best authentication mechanism?</p>\n<p>Yes, as things have drastically changed now.</p>\n<p>Let’s quickly learn about the next level of authentication- “Adaptive Authentication,” and how it’s paving a path for a robust security ecosystem in today’s era.</p>\n<h2 id=\"the-need-for-adaptive-authentication\" style=\"position:relative;\"><a href=\"#the-need-for-adaptive-authentication\" aria-label=\"the need for adaptive authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Need for Adaptive Authentication</h2>\n<p>Usernames and passwords alone can’t guarantee enough security for users and the enterprise since attackers are continuously bypassing frailer defense systems.</p>\n<p>Moreover, multi-factor authentication also seems ineffective in certain situations when the risk is relatively high, and it raises the need for a rigid security mechanism.</p>\n<p>In recent years, adaptive authentication has been integrated with <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) platforms and is considered the best approach since authenticated users can only access data and resources.</p>\n<p>Let’s dig deeper into this and understand the ultimate approach to best secure user identities and data and sensitive business information.</p>\n<h2 id=\"what-is-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-multi-factor-authentication\" aria-label=\"what is multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Multi-Factor Authentication?</h2>\n<p>Multi-factor authentication (MFA) is a multi-layered protection framework that verifies users’ login or other transaction identities to provide access to certain resources.</p>\n<p>A few examples of multi-factor authentication are codes created by mobile apps, answers to personal security questions, codes sent to an email address, fingerprints, etc.</p>\n<p>Read this post to get the detailed information regarding <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multi-factor authentication</a>, how it works, and how to quickly set up multi-factor authentication.</p>\n<h2 id=\"what-is-adaptive-authentication\" style=\"position:relative;\"><a href=\"#what-is-adaptive-authentication\" aria-label=\"what is adaptive authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Adaptive Authentication?</h2>\n<p>Just like multi-factor authentication, adaptive authentication also verifies an identity but eventually considers certain security risk factors.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/What-is-adaptive-authentication/\">Adaptive Authentication</a> (also known as Risk-based Authentication) or adaptive multifactor authentication is a method to send notifications or prompt the consumers to complete an additional step(s) to verify their identities when the authentication request is deemed malicious according to your organization's security policy.</p>\n<p>In a nutshell, Adaptive Authentication analyzes the user interaction with your application and intelligently builds a risk profile based on the consumer behavior or your organization's security policy.</p>\n<p>And when we talk about adaptive authentication example, let’s consider a scenario where a user tries to log into its account from a different device/location or changes the pattern of logging in into his/her account. Here, the smart system will detect an unusual activity and would eventually add another stringent layer of authentication. </p>\n<p>This approach improves overall security by ensuring that high-risk consumers have the highest level of adaptable and flexible security in place.</p>\n<p>Apart from this, adaptive authentication is considered far smarter than multi-factor authentication since it responds to the device that attempts to log in, the IP address, and the geographical location of the attempt.</p>\n<p>This means the mechanism automatically implements robust authentication controls whenever a login seems to be suspicious.</p>\n<p><a href=\"https://www.loginradius.com/resource/fixing-broken-authentication-with-adaptive-mfa/\"><img src=\"/8cd06df3a6214819919656d4dece050d/LoginRadius-Adaptive-MFA.webp\" alt=\"LoginRadius-Adaptive-MFA\"></a></p>\n<h2 id=\"adaptive-authentication-and-strong-customer-authentication\" style=\"position:relative;\"><a href=\"#adaptive-authentication-and-strong-customer-authentication\" aria-label=\"adaptive authentication and strong customer authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Adaptive Authentication and Strong Customer Authentication</h2>\n<p>Adaptive authentication and strong customer authentication are two important methods used by businesses to protect against fraudulent activities and ensure secure transactions. </p>\n<p>Adaptive authentication or adaptive multifactor authentication involves the use of multiple authentication factors, such as passwords, biometric data, and security tokens, to verify the identity of users based on risk factors such as the location and type of device being used. </p>\n<p>SCA is a regulatory requirement under the European Union's Payment Services Directive 2 (PSD2), which mandates the use of at least two independent authentication factors for all electronic transactions. </p>\n<p>This ensures that only authorized individuals can access sensitive data or perform financial transactions. Together, adaptive authentication and SCA provide a multi-layered approach to security, enhancing user protection and mitigating the risk of cyber attacks.</p>\n<h2 id=\"working-mechanism-of-adaptive-authentication\" style=\"position:relative;\"><a href=\"#working-mechanism-of-adaptive-authentication\" aria-label=\"working mechanism of adaptive authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Working Mechanism of Adaptive Authentication</h2>\n<p>Whenever an authentication request is estimated as a malicious attempt, based on the risk factors defined for your application, it triggers one or more of the following actions as per your predefined requirements:</p>\n<ul>\n<li>Email Notification: An email with a notification regarding the authentication request is sent to the consumer. If found malicious, the consumer can inform their service provider to take the necessary action.</li>\n<li>SMS Notification: An SMS notification is sent to the consumer regarding the authentication request. This further helps in identifying a malicious request, which can be reported quickly.</li>\n<li>Multi-Factor Authentication: The consumer is asked to verify their identity through the second factor of authentication. This can be either email verification, phone verification, or a security question-based authentication.</li>\n<li>Blocking User Access: After multiple access requests, the account is blocked immediately once a specific risk criterion is met. Now the consumer needs to get in touch with the service provider to get unblocked.</li>\n<li>Security Questions: Security questions offer a way to authenticate users once they are under suspicion. Consumers need to answer certain questions to prove their identity.</li>\n</ul>\n<h2 id=\"the-biggest-advantage-of-adaptive-authentication\" style=\"position:relative;\"><a href=\"#the-biggest-advantage-of-adaptive-authentication\" aria-label=\"the biggest advantage of adaptive authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Biggest Advantage of Adaptive Authentication</h2>\n<p>Adaptive authentication increases your conversion rates!</p>\n<p>Yes, here’s how it’s achieved.</p>\n<p>Besides the fact that adaptive authentication offers the highest level of security for both consumers and enterprises, it also ensures a frictionless authentication process for normal conditions.</p>\n<p>Yes, unlike multi-factor authentication that creates a lengthy authentication process each time a user tries to log in, adaptive authentication only kicks in whenever it finds a suspicious login attempt.</p>\n<p>This means a user won’t need to prove their identity through multiple layers of authentication in everyday scenarios. Instead, the user would only be required to go through the authentication process if the system finds any unusual activity from the user’s end or detects a risk.</p>\n<p>Must read: <a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">What is Risk-Based Authentication?</a></p>\n<p>When users get a flawless experience while signing in, there are more chances of conversion when compared to a login process involving an exhausting authentication process.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Adaptive authentication or adaptive multifactor authentication is the key to business success backed by enhanced security for both the consumers and enterprises.</p>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius’ CIAM</a> offers a top-notch adaptive authentication solution through its “Risk-Based Authentication” mechanism.</p>\n<p>Enterprises seeking the highest level of consumer and organization data security without hampering the user experience should consider relying on LoginRadius’ cutting-edge CIAM solution.</p>\n<p>Need more help? <a href=\"https://www.loginradius.com/contact-sales2/\">Reach us</a> to know how LoginRadius’ “Adaptive Authentication” can help secure your consumer identities and business information.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=adaptive-authentication\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-Consultation\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 15, 2021","updated_date":null,"description":"Adaptive authentication is a game-changer for enterprises that require strong fencing to protect consumer and enterprise data. Here’s a quick read depicting the role and need for adaptive authentication instead of just multi-factor authentication.","title":"Adaptive Authentication- Is it the Next Breakthrough in Customer Authentication?","tags":["adaptive authentication","mfa","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.550387596899225,"src":"/static/0ad652787a6d7a6ee03e5743c0e4fe77/58556/adaptive-authentication.webp","srcSet":"/static/0ad652787a6d7a6ee03e5743c0e4fe77/61e93/adaptive-authentication.webp 200w,\n/static/0ad652787a6d7a6ee03e5743c0e4fe77/1f5c5/adaptive-authentication.webp 400w,\n/static/0ad652787a6d7a6ee03e5743c0e4fe77/58556/adaptive-authentication.webp 800w,\n/static/0ad652787a6d7a6ee03e5743c0e4fe77/99238/adaptive-authentication.webp 1200w,\n/static/0ad652787a6d7a6ee03e5743c0e4fe77/7c22d/adaptive-authentication.webp 1600w,\n/static/0ad652787a6d7a6ee03e5743c0e4fe77/25f09/adaptive-authentication.webp 1920w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":444,"currentPage":75,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}