{"componentChunkName":"component---src-pages-author-author-yaml-id-js","path":"/author/ashish-kumar-yadav/","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"id":"238fbe77-f97a-5dcf-b8c5-ed4790bb88ae","html":"<h2 id=\"an-overview\" style=\"position:relative;\"><a href=\"#an-overview\" aria-label=\"an overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>An Overview</h2>\n<p>With growing numbers of websites and consumers on those websites, authenticating each one of them becomes an arduous task. Also, it becomes an important aspect to protect and secure the consumer's data available on your application.  To protect sensitive consumer data, two-factor authentication became a mandatory requirement in today's digital world.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-two-factor-authentication/+\">Two-factor authentication</a> can be done via multiple channels. One is by using google authenticator codes, and the other is sending OTP on the consumer's email. But the easiest and convenient way is to do it via SMS.</p>\n<p>SMS stands for <strong>Short Messaging Service</strong>, which you guessed right. The text messages that we get on our mobile phones. This SMS holds an One Time Password (OTP), used to validate the consumer login. So basically, it can be used as a backend agent who reaches out to the original consumer and provides him access to any network, system, or web application.</p>\n<h2 id=\"how-does-sms-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-sms-authentication-work\" aria-label=\"how does sms authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does SMS Authentication Work?</h2>\n<p>A short messaging service (SMS) is generally used to carry any information to the end-user. It can be information like promotional messages, notifications, or personal texts, but they also carry authentication codes (OTPs). </p>\n<p>Using SMS authentication is quite simple and easy to understand. When a consumer tries to log in to a website, system, or network, he provides the login credentials. On successfully authenticating the login credentials, the server now does a two-factor authentication. It ensures that the consumer trying to log in is who he says he is. To authenticate the user, a text SMS and an OTP are sent to the consumer's registered mobile number. When that OTP is entered, the consumer gets authenticated, and then only they can access the contents of the system/application.</p>\n<p>SMS authentication is based on one of the three types of <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multifactor authentication</a>, i.e., <strong>Possession based authentication</strong>. In this type of MFA, the consumer is authenticated via something that only he can possess, which is the mobile handset.</p>\n<h2 id=\"merits-and-demerits-of-using-sms-authentication\" style=\"position:relative;\"><a href=\"#merits-and-demerits-of-using-sms-authentication\" aria-label=\"merits and demerits of using sms authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Merits and Demerits of Using SMS Authentication</h2>\n<p>Everything in this world holds both the concepts of merits and demerits, and so does SMS authentication. Let's first discuss the merits that it has.</p>\n<ol>\n<li><strong>Additional Layer of security:</strong> Two-factor authentication is now widely used to protect consumers' account data. SMS authentication provides an extra layer of protection that too without any complexity. At least it is far better than having no additional security check.</li>\n<li><strong>Ease of usage</strong>: It is the human behaviour that we always look for an easy way to get our work done. Now imagine having a complex two factor authentication setup. Users will end up frustrated doing complex authentications. Here SMS authentication rises as an easy and secure option.</li>\n<li><strong>Ease of usage</strong>: It is human behavior that we always look for an easy way to get our work done. Now imagine having a complex two-factor authentication setup. Users will end up frustrated doing complex authentications. Here SMS authentication rises as an easy and secure option.</li>\n<li><strong>Low Cost:</strong> Sending SMS to consumers includes minor charges, which helps a lot for the organization with a large consumer base.</li>\n</ol>\n<p>Even after being so convenient and easy to operate, there are some demerits also. These demerits are capable enough to make the organizations think that it is enough to protect the business. Let's discuss them one by one:</p>\n<ol>\n<li><strong>SIM Highjacking or Device theft:</strong> It looks effortless to send the verification code on a mobile number and authenticate consumers based on that. But the Option of SMS authentication can be harmful if the SIM/device got lost or stolen by someone. As in this case, SIMs can easily be used on other mobile phones, and they will still receive the validation code.</li>\n<li><strong>Hacking:</strong> Earlier, it was complicated to intercept GSM-based SMS, but as the technologies are evolving, hackers have also got more power in their hands. The regular text which is sent and received over mobile phones can easily be intercepted today.</li>\n<li><strong>Social Engineering Attacks:</strong> Compared to earlier days, more devices are now connected to the internet today. Today, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">a simple phishing link</a> via a text msg or any advertisement will do the job. If a consumer clicks on the link by mistake or falls into any such trap, all his data will be gained by hackers, including SMS.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-phone-authentication/\"><img src=\"/46289e0fd6e7fcb32b496b8922df717f/phone-auth-DS.webp\" alt=\"phone-auth-DS\"></a></p>\n<h2 id=\"should-businesses-use-sms-authentication\" style=\"position:relative;\"><a href=\"#should-businesses-use-sms-authentication\" aria-label=\"should businesses use sms authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Should Businesses Use SMS Authentication?</h2>\n<p>With all the demerit points discussed above and keeping all the security issues in mind, businesses might want to reconsider their authentication methodology. It is known very clearly that cybercrimes and hackers are overgrowing, especially after the internet revolution. </p>\n<p>Hacking groups and organizations are getting sophisticated daily, and SMS authentication has not evolved with such changes. We are still using a similar old mechanism to send text messages.</p>\n<p>Hence, intercepting a text message is easier as compared to earlier days.</p>\n<p>So to answer the big question, yes, it is better to have some two-factor authentication in the form of SMS authentication, but businesses should not rely entirely on it. They must think of other possible authentication mechanisms if they are collecting sensitive consumer data.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Dropping the idea of SMS authentication might look easy. Still, it is a bit difficult for some organizations because, as we already mentioned, SMS authentication is a very well-established method and has been used for a long time. The convenience provided in authenticating the end-users is also unparalleled. </p>\n<p>But businesses need to find an alternative for this as SMS authentication cannot be heavily relied upon. The key to achieving that is to find any other authentication method which is as easy, convenient, user-friendly, and secure at the same time. Going with the new trends in the technologies, <a href=\"https://www.loginradius.com/blog/identity/what-is-mob-biometric-authentication/\">Biometric Authentication</a> is one feasible solution. Well, we will indeed talk about that some other day :)</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=sms-authentication-protect-business\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"LoginRadius Book a Demo\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"SMS Authentication — Can it Really Protect Your Business?","author":{"id":"Ashish Kumar Yadav","github":null,"avatar":null},"date":"September 02, 2021","updated_date":null,"tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/eccefc9c9391b2f85a6f087bbca454c5/58556/sms-authentication-protect-business-cover.webp","srcSet":"/static/eccefc9c9391b2f85a6f087bbca454c5/61e93/sms-authentication-protect-business-cover.webp 200w,\n/static/eccefc9c9391b2f85a6f087bbca454c5/1f5c5/sms-authentication-protect-business-cover.webp 400w,\n/static/eccefc9c9391b2f85a6f087bbca454c5/58556/sms-authentication-protect-business-cover.webp 800w,\n/static/eccefc9c9391b2f85a6f087bbca454c5/cc834/sms-authentication-protect-business-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Ashish Kumar Yadav","slug":"/identity/sms-authentication-protect-business/"}}},{"node":{"id":"a9d262d7-8962-5575-b28a-690e916bfba1","html":"<h2 id=\"password-history-expiration-and-complexity-explained\" style=\"position:relative;\"><a href=\"#password-history-expiration-and-complexity-explained\" aria-label=\"password history expiration and complexity explained permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password History, Expiration, and Complexity: Explained!</h2>\n<p>Since the start of the digital revolution, the world has become smaller and humans have developed a culture of always being connected.</p>\n<p>Today we are surrounded by digital transactions, digital communication, digital social life, and whatnot. A massive chunk of all kinds of data is available on the internet, be it your personal or professional data. </p>\n<p>The internet knows about you more than you. Imagine what an individual can do if this data falls into the wrong hands. I am not here to instigate fear in you about the digital world, but you cannot neglect the possibility of this happening.</p>\n<p>We all are conscious about our privacy and data security, and a perfect real-life example can explain this. Most of us know when and where we have to switch to our internal privacy mode according to the situation. </p>\n<p><img src=\"https://apidocs.lrcontent.com/images/photo-1584433144859-1fc3ab64a957--colorized_733860bf4aaac3d743.55160141.webp\" alt=\"Password Secured Phone Image\" title=\"Password Secured Phone Image\"></p>\n<p>Passwords are the only measures that help us immensely to protect our data. So don't you think our protector should be more robust? Yes, it should be strong enough to withstand multiple attacks trying to steal your data.</p>\n<h3 id=\"what-are-passwords\" style=\"position:relative;\"><a href=\"#what-are-passwords\" aria-label=\"what are passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are Passwords?</h3>\n<p>I don't think that anyone needs an introduction to \"What is Password.” We are surrounded by passwords from the time we wake up till the time we sleep. \"A password is a combination of characters and symbols which uniquely identifies each individual.\" </p>\n<p>A password can be used in multiple scenarios, but the motive to use them is similar, i.e., to authenticate the individual's identity. Passwords are used mainly with a unique ID or \"Username,\"—together, the combination is referred to as Login credentials. </p>\n<p>Most of the passwords contain letters, numbers, special characters, and symbols, and they can vary in length. Before setting a password, you should ensure that the combination should be easy to remember but hard to crack, which means it should not be that easy that everyone can guess it, and it should not be much hard that you forget it after some time.</p>\n<p><img src=\"https://apidocs.lrcontent.com/images/password-2781614_960_720--colorized_2788360bf4b253cafb2.39488510.webp\" alt=\"Password Image\" title=\"Password Image\"></p>\n<h3 id=\"what-are-weak-passwords\" style=\"position:relative;\"><a href=\"#what-are-weak-passwords\" aria-label=\"what are weak passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are Weak Passwords?</h3>\n<p>Once an account is created on any website, it prompts us to set a new password for the site. The passwords we set that time can be categorized into two types, Weak and Strong passwords.</p>\n<p> Let’s see some very common practices for <a href=\"https://www.loginradius.com/blog/identity/2019/12/worst-passwords-list-2019/\">weak passwords</a>.</p>\n<ul>\n<li><strong>Simple Passwords:</strong> Passwords set without giving much thought about it are called simple passwords. For example: \"password\", \"qwerty\", \"123456\" etc. The password cracking software works in such a way that it looks for these types of obvious combinations.</li>\n<li><strong>Passwords with personal information:</strong> If you tend to use your personal information as a password, you are in big trouble as hackers can quickly get such data from your publicly available social profiles. Data such as your birthday, anniversary, or graduation year are personal information, and one should avoid using them.</li>\n<li><strong>Repeated Passwords:</strong> With multiple accounts, some users find it challenging to remember numerous passwords, so they tend to use the same passwords for each account. But if the hacker cracks the password for one account, all of his other accounts will be compromised.</li>\n</ul>\n<h3 id=\"how-can-we-create-strong-passwords\" style=\"position:relative;\"><a href=\"#how-can-we-create-strong-passwords\" aria-label=\"how can we create strong passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can We Create Strong Passwords?</h3>\n<p>By now, the need for a <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">strong password</a> must be clear for you, and you must be eager to know in what ways a password can be made stronger. Calm down! We are about to cover some important points by which password security can be enhanced many folds.</p>\n<p>There are various ways to enhance the security of your password; however, I am highlighting three such points which every business and individual needs to ponder while enhancing the security of their passwords. These are :</p>\n<ol>\n<li>Password History</li>\n<li>Password Complexity</li>\n<li>Password Expiration</li>\n</ol>\n<h3 id=\"password-history\" style=\"position:relative;\"><a href=\"#password-history\" aria-label=\"password history permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password History</h3>\n<p>Enabling this feature in your product/website can add an extra layer of security to it. This feature holds the history of passwords that are created for a particular account. </p>\n<p>Password reuse is now an important headache for organizations as users tend to use similar passwords as they have used in the past. Using the same password for a longer period of time gives more chances to the hacker to determine the password. </p>\n<p>The password history feature can have a limit up to which you can not use any such password which you have configured. For example, if you set the limit to 5, then you will be unable to use the last five previous passwords.</p>\n<p><img src=\"https://apidocs.lrcontent.com/images/phishing-3390518_960_720--colorized_2613960bf4d54d50e62.32324792.webp\" alt=\"Phising Attack representation\" title=\"Phising Attack representation\"></p>\n<p>In this way, consumers will be forced not to reuse their old passwords again and again. Setting a new password creates challenges for an attacker, and the account remains safe.</p>\n<p><strong>Read More:</strong> <a href=\"https://www.loginradius.com/resource/password-policy-datasheet\">A Comprehensive Framework for Passwords to UP Your Security Game!</a></p>\n<h3 id=\"password-complexity\" style=\"position:relative;\"><a href=\"#password-complexity\" aria-label=\"password complexity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password Complexity</h3>\n<p>From the above points, we have learned the importance of not using old passwords; let's understand how our new passwords should be. Creating a strong password requires a combination that can not be easily guessed by attackers after extracting some information from your social handles. </p>\n<p>If you have kept your password as plain text, let's say a name of your first dog or a favorite picnic spot, etc., which can be easily guessed by attackers once they get some data from the social network. In that case, your privacy and data are at risk of being compromised. To avoid this, you must create a complex and hard password. </p>\n<p>Now you will ask what are the ways by which you can create a strong and complex password and also remember it. I have sorted out few important points which can be followed while creating new passwords:</p>\n<ol>\n<li><strong>Passwords should be long enough:</strong> Short passwords are easy to crack as they have fewer numbers to be cracked but at the same time, cracking a long password is a herculean task. An ideal password should not be less than 12 characters.</li>\n<li><strong>Not using obvious dictionary words:</strong> Make sure you do not use any simple word that contains some meaning (ex orange@123, red#12). If you create a password that is exactly the same as a dictionary word, then it can not be foolproof. There can be instances where such passwords can be easily cracked.</li>\n<li><strong>Use random alphabets:</strong> The best and the safest passwords contain alphabets in a completely random manner. They can be in uppercase or lowercase. Their placement does not make any sense or meaning. For example, (J56yh#$fhB). These types of passwords are a tough nut to crack.</li>\n<li><strong>Do not use any personal information in passwords:</strong> Passwords that contain some personal information such as your date of birth, your graduation year, etc., poses a greater risk of being compromised. Therefore avoid using any personal information in your passwords.</li>\n<li><strong>Avoid memorable keyboard paths:</strong>  It is advised not to use any sequential keyboard path or any combination that you are very familiar with. For example (qwerty, reset@123,).</li>\n</ol>\n<h3 id=\"password-expiration\" style=\"position:relative;\"><a href=\"#password-expiration\" aria-label=\"password expiration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password Expiration</h3>\n<p>Most of the organizations which hold users' sensitive data use this policy of password expiration. This policy forces the user to update/change their passwords after a certain period of time. </p>\n<p>As a result, it chips down the time for attackers to guess the consumer's password. Earlier, consumers used to set up passwords for their accounts, and hackers had so much time to attempt cracking multiple times. </p>\n<p>But now, till the time they come up with a possible password, the consumer would have already changed the password. In this way, enabling the Password expiration policy adds an additional layer of security for your passwords.</p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>Protecting consumer's data is a top priority for many organizations as it is the basis of the trust that their consumers have placed in them. There are various other techniques which you can embed along with these three to push your password security to the next level. </p>\n<p>Some of them are using <strong>Two Factor Authentication</strong>, <a href=\"https://www.loginradius.com/resource/mobile-biometric-authentication-datasheet\"><strong>Biometric authentication</strong></a>, <strong>Brute Force Lockout</strong>, and many others. Together these can increase password security many folds. </p>\n<p>If you really want to survive in this digital world where everything is digital, you are required to have some basic understanding of how to protect yourself and your data from being compromised. Passwords are nothing but a key to your digital locker, and hence they will be as strong as you make them. Follow the above-mentioned few points and consider most of your data secure.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=password-history-expiration-complexity\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Password History, Expiration, and Complexity: Explained!","author":{"id":"Ashish Kumar Yadav","github":null,"avatar":null},"date":"June 08, 2021","updated_date":null,"tags":["authentication"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/3b2a55040701faca00b2b086098fa76b/58556/Passwordhistory_cover_pic.webp","srcSet":"/static/3b2a55040701faca00b2b086098fa76b/61e93/Passwordhistory_cover_pic.webp 200w,\n/static/3b2a55040701faca00b2b086098fa76b/1f5c5/Passwordhistory_cover_pic.webp 400w,\n/static/3b2a55040701faca00b2b086098fa76b/58556/Passwordhistory_cover_pic.webp 800w,\n/static/3b2a55040701faca00b2b086098fa76b/99238/Passwordhistory_cover_pic.webp 1200w,\n/static/3b2a55040701faca00b2b086098fa76b/7c22d/Passwordhistory_cover_pic.webp 1600w,\n/static/3b2a55040701faca00b2b086098fa76b/f8fd9/Passwordhistory_cover_pic.webp 5472w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Ashish Kumar Yadav","slug":"/identity/password-history-expiration-complexity/"}}},{"node":{"id":"1cbaa316-0d7a-5652-9264-efb29103ae2d","html":"<p>Before we hop into the technical definitions and complex examples of Single Sign-on, answer me a straightforward question.</p>\n<p>What is the most valuable and vital part of your website?</p>\n<p>Is it the algorithm that shortlists the consumers or the highly dynamic and interactive nature of your login page? Or is it the feedback given by some of your <strong><a href=\"https://www.loginradius.com/customers/\">happy consumers</a></strong>?</p>\n<p>Whatever it may be but from a hacker's point of view, none of that matters.</p>\n<p>The only thing they are always on the hunt for is <strong><a href=\"https://www.loginradius.com/blog/identity/2020/06/consumer-data-privacy-security/\">personal consumer data</a></strong>. Data like your consumers' names, email addresses, phone numbers, credit card details, passwords, etc., every entity that a consumer provides.</p>\n<p>With all the business going online in this digital era, where everything is on the internet, there is a possibility that probably there is not even a single person on this planet who enjoys filling out registration forms.</p>\n<p>Today, a single consumer interacts with various apps/websites which require them to log in or register before allowing them to use their services. There are relatively high chances of forgetting the username and the associated password while trying to log in.</p>\n<p>Unfortunately, when it comes to the protection of such data, 100% prevention is never possible. However, there are various methods to reduce this breach possibility to a bare minimum. One such way is Single Sign-On.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><img src=\"/38ac30c4d71f5266ea46766d200be40e/DS-LoginRadius-Single-Sign-on.webp\" alt=\"Single-sign-on-loginradius\"></a></p>\n<h2 id=\"what-is-single-sign-on\" style=\"position:relative;\"><a href=\"#what-is-single-sign-on\" aria-label=\"what is single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Single Sign-On</h2>\n<p><strong><a href=\"https://www.loginradius.com/single-sign-on/\">Single Sign-On (SSO)</a></strong> refers to the authentication process that allows your consumers to access various applications with a single set of login ID and password and an active login session. The following are the two examples of the Single Sign-On environments:</p>\n<ul>\n<li>Consumers  access multiple applications of the same provider. Consumers don't need to create and remember separate credentials for each application; they log in once and access the provider's various applications. Example: Google, Youtube, Gmail, etc.</li>\n<li>Employees access numerous applications daily. They don't need to create and remember separate credentials for each application; they can log in once and access various applications from the same organization. Example: HR Portal, Resource Portal, Organizational Account, etc.  </li>\n</ul>\n<p>The beauty of single sign-on lies in its simplicity. The feature authenticates you on a one-on-one designated platform, allowing you to utilize tons of available services without having to login and logout every time. Consumers can think of this as similar to the <strong><a href=\"https://www.loginradius.com/social-login/\">social login</a></strong> via Google, Facebook, Twitter, etc.</p>\n<h2 id=\"why-should-businesses-use-sso\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-sso\" aria-label=\"why should businesses use sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Use SSO</h2>\n<p>Being simple and convenient to the consumers, SSO is also widely considered to be more secure. This might raise some confusion and sound counter-iterative to what I've just mentioned above as one might think that how on earth it is more secure logging in once with one password instead of multiple passwords.</p>\n<p>The reasons below will clear your confusion:</p>\n<ul>\n<li>Stronger passwords: SSO enables the user to create and remember strong passwords because now users have to use only one password instead of using multiple passwords.</li>\n<li>Less repeated passwords: Creating different passwords for every other website leads the user to \"Password Fatigue,\" which leads them to repeat the same password multiple times. But after using SSO, all these scenarios are eliminated as it requires a one-time login.</li>\n<li>More effortless multi-factor authentication: A multi-factor authentication provides much more security than just relying on a single password. But suppose a consumer has implemented MFA on multiple sites, then it will become a hectic task to the first login and then validate MFA at each site. SSO eliminates this issue because it requires only one-time login and one-time MFA validation.</li>\n<li>Less time consumed in the password recovery process: Apart from the security benefits mentioned above, <strong><a href=\"https://www.loginradius.com/blog/identity/2019/11/benefits-single-sign-on-sso/\">Best SSO tool</a></strong> also reduces the time wastage of internal teams. Often, users forget their password, and a lot of time is wasted in recovering passwords for dozens of apps. If appropriately implemented, this has the potential to increase business productivity.</li>\n</ul>\n<h2 id=\"how-to-implement-sso\" style=\"position:relative;\"><a href=\"#how-to-implement-sso\" aria-label=\"how to implement sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How To Implement SSO</h2>\n<p>If learning about SSO was interesting, then, believe me, the implementation part is even more impressive. There are multiple ways to implement SSO. Let's get to them one by one.</p>\n<ul>\n<li>Web SSO: This is implemented when a single sign-on is required between two or more web applications. Web SSO is a browser-based session management method that utilizes browser storage mechanisms like sessionStorage, localStorage, cookies to maintain the user's session across your applications.</li>\n<li>Mobile SSO: This is implemented when a single sign-on is required between two or more mobile apps. The mobile SSO flow is similar to the Web SSO that we have covered above. The critical difference is that it allows you to have a single login across multiple apps once logged into an app for <strong><a href=\"https://www.loginradius.com/web-and-mobile-sso/\">web and mobile SSO</a></strong>.</li>\n<li>Federated SSO: This is implemented when a single sign-on is required between two or more web applications. The federated SSO comes in handy while implementing SSO with third-party applications. For interaction with third-party web applications, common standards and protocols are used to manage and map user identities via trust relationships.</li>\n<li>Cross-Device SSO: Cross-Device SSO is a feature that provides SSO between two different applications running on two different devices, i.e., mobile application and web application. Cross-Device SSO is used to set up SSO between a mobile device and a web application.</li>\n<li>Custom IDPs: This can be understood as Social Login. You can use it to configure a designed Social Login provider for your web application(s).</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about applying a simple approach of using Single Sign-On on the websites and how it will enhance businesses. Finally, before implementing any functionality on your website, analyze and consider the pros and cons from every possible angle.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=single-sign-on-a-beginners-guide\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Single Sign-On- A Beginner’s Guide","author":{"id":"Ashish Kumar Yadav","github":null,"avatar":null},"date":"March 23, 2021","updated_date":null,"tags":["single sign on","data security","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/5a63b7b5098d9a2c637d90cb64306797/58556/sso-loginradius.webp","srcSet":"/static/5a63b7b5098d9a2c637d90cb64306797/61e93/sso-loginradius.webp 200w,\n/static/5a63b7b5098d9a2c637d90cb64306797/1f5c5/sso-loginradius.webp 400w,\n/static/5a63b7b5098d9a2c637d90cb64306797/58556/sso-loginradius.webp 800w,\n/static/5a63b7b5098d9a2c637d90cb64306797/99238/sso-loginradius.webp 1200w,\n/static/5a63b7b5098d9a2c637d90cb64306797/7c22d/sso-loginradius.webp 1600w,\n/static/5a63b7b5098d9a2c637d90cb64306797/d4b3d/sso-loginradius.webp 6720w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Ashish Kumar Yadav","slug":"/identity/single-sign-on-a-beginners-guide/"}}},{"node":{"id":"c5430976-8273-5373-a56a-785fd8cb9c31","html":"<p>Security can be a headache for both IT professionals and consumers. Today, tens of thousands of websites store consumers' passwords and <strong><a href=\"https://www.loginradius.com/standard-login/\">standard login</a></strong> credentials. So, there is always a constant risk of data theft.</p>\n<p><strong><a href=\"https://www.loginradius.com/blog/identity/2021/02/brute-force-lockout/\">Password attackers</a></strong> are always looking for weak passwords so that they can easily hack consumers' accounts. To tackle this problem, we often mix up the complexity with security.  </p>\n<p>It should not be like that. Always remember that complexity impacts consumer retention. Which, of course, you do not want to happen.</p>\n<p>So, is there a solution where our process remains simple and at the same time secure? The answer is <strong><a href=\"https://www.loginradius.com/press/loginradius-launches-multi-factor-authentication/\">multi-factor authentication</a></strong>.</p>\n<h2 id=\"what-is-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-multi-factor-authentication\" aria-label=\"what is multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Multi-Factor Authentication</h2>\n<p>MFA or multi-factor authentication is a feature widely used by businesses to ensure that the consumers coming on their website are actually who they say they are.</p>\n<p>It is done by providing at least two pieces of proof or evidence to state their identity. Now, these pieces of evidence must come from a different category, like say:</p>\n<ul>\n<li>Something only they would know.</li>\n<li>Something that only they possess.</li>\n<li>Something that they are.</li>\n</ul>\n<p>MFA works in this way because, let’s suppose one of the factors is hacked by the attackers or invalid user, the chances of another factor also getting compromised are pretty low. That is why <strong><a href=\"https://www.loginradius.com/multi-factor-authentication/\">MFA authentication</a></strong> requires multiple  factors, and this is how it provides a higher level of API security to consumers’ identity data.</p>\n<p> <a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b2d3a16b02ab56f63d8a8a720ca22b86/EB-Buyer%E2%80%99s-Guide-to-Multi-Factor-Authentication.webp\" alt=\"book-a-demo-loginradius\"></a> </p>\n<h2 id=\"why-mfa-is-so-important\" style=\"position:relative;\"><a href=\"#why-mfa-is-so-important\" aria-label=\"why mfa is so important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why MFA is So Important</h2>\n<p><strong><a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">Secure passwords</a></strong> may remain the supreme and the most common authentication method of your online identity but believe me; they provide very little protection. Consumers often make it simple for the attacker to steal their credentials by choosing weak passwords or using the same passwords for multiple applications.</p>\n<p>As I mentioned above, with a huge number of websites and web portals comes a considerable number of consumer accounts and passwords. One of the biggest problems with traditional user ID and password is that they require how to <strong><a href=\"https://www.loginradius.com/developers/\">manage email and password login</a></strong> and database maintenance.</p>\n<p>It does not matter if they are encrypted or not; once the database is captured, it gives the attacker access to every detail like geographical locations, consumer’s interests, transaction pattern, etc.</p>\n<p>That is why it becomes imperative to use <strong><a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a></strong>, which means, even if the attacker gets access to the database, they still need to pass other security checks.</p>\n<h2 id=\"how-is-mfa-useful-for-businesses\" style=\"position:relative;\"><a href=\"#how-is-mfa-useful-for-businesses\" aria-label=\"how is mfa useful for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is MFA Useful for Businesses</h2>\n<p>There are typically three primary reasons for which MFA becomes quite enhance the consumer experience in <strong><a href=\"https://www.loginradius.com/blog/fuel/2021/01/consumer-experience-b2b-saas/\">B2B SaaS</a></strong> and they are as follows:</p>\n<ol>\n<li>Security: The primary benefit of multi-factor authentication is that it provides security by adding protection in layers. The more layers/factors in place, the more the risk of an intruder gaining access to critical systems and data is reduced.</li>\n<li>Compliance: Almost every organization has some level of local, state, or federal compliance to which they must adhere. Multi-factor authentication can achieve the necessary compliance requirements specific to your organization, which will mitigate audit findings and avoid potential fines.</li>\n<li>Increase flexibility and productivity: Finally, removing the burden of passwords by replacing them with alternatives can increase productivity and bring a better usability experience due to the increased flexibility of factor types. There could even be an opportunity for a potential reduction in operational costs in the right environment and situation.</li>\n</ol>\n<p>These are three main reasons which are most relevant to explain how and why <strong><a href=\"https://www.loginradius.com/blog/engineering/why-mfa-important/\">Importance of MFA</a></strong> to businesses to implement.</p>\n<p>Now that you’ve learned why MFA is critical, you may be keen to know how this feature works and how you can implement it.</p>\n<p><img src=\"/3a83684d7c861b0b39fcd8e3a3844a42/Type-of-mfa.webp\" alt=\"Types-of-mfa-loginradius\"></p>\n<h2 id=\"how-does-multi-factor-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-multi-factor-authentication-work\" aria-label=\"how does multi factor authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Multi-Factor Authentication Work</h2>\n<p>Multi-factor authentication, as the name suggests, for authentication requires multiple verification information. One of the most common factors that are widely used is <strong><a href=\"https://www.loginradius.com/developers/\">OTP-based authentication</a></strong>. OTP or one-time passwords are 4-6 digit codes you will receive via SMS and work as a one-time entry token. It is generated periodically whenever an authentication request is made.</p>\n<p>There are mainly three methods on which MFA authentication heavily relies, and those are:</p>\n<ol>\n<li>Things you know (knowledge): This method involves questions which only you can answer. For example: What is your mother’s maiden name? Or what is your child’s name? The purpose is to verify your identity via these questions because you are the only one who can answer these.</li>\n<li>Things you have (possession): This method involves verification from the things you have or possess, such as a mobile phone. A verification notification will be sent to your phone screen, and when you allow it from that screen only, you will be able to log-in to your account. Gmail is extensively using this feature.</li>\n<li>Things you are (inheritance): A fingerprint commonly verifies this factor. We also see verification being done by retinal scan. The purpose of this method is clear—only you can have your fingerprint, not anyone else.</li>\n</ol>\n<h2 id=\"how-to-implement-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#how-to-implement-multi-factor-authentication\" aria-label=\"how to implement multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Multi-Factor Authentication</h2>\n<p>Now that you have read all the benefits of using a phone login and you are planning to implement it for your business, your first question will be, \"How can I implement MFA on my website.\" Right ??</p>\n<p>Don't worry, I've got you covered.</p>\n<p>There are multiple ways to <strong><a href=\"https://www.loginradius.com/features/perfect/otp-login/\">implement multifactor authentication</a></strong>. Let's get to them one by one.</p>\n<ol>\n<li>Short Message Service (SMS): This process is completed by involving a short message service known as SMS and triggered at the login stages. When a user registers on a website along with the credentials, they are prompted to provide a valid phone number on which a verification SMS can be sent. Once the phone number is set up and verified, they need to go through an additional identity check where an SMS will be sent to their verified phone whenever they log in to the website.</li>\n<li>Electronic mail: In this process, when a user logs into the website with their credentials, a unique one-time code will be generated and sent to the user to their registered email address. The user will pick the code from the email and enter it into the webpage or app. In this way, the user will be verified.</li>\n<li>Push notification: In this process, when a user logs into the website with their credentials, a push notification is sent to the user's phone, which contains your business app. This notification generally appears on the main screen, and once the user confirms access from that screen, they will be logged in to their account automatically.</li>\n</ol>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about applying a simple approach of using Multi-factor authentication on websites and how it will enhance businesses. This feature increases the <strong><a href=\"https://www.loginradius.com/security/\">consumer’s account safety</a></strong>. Finally, before implementing any functionality on your website, analyze and consider the pros and cons from every possible angle.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=multi-factor-authentication-a-beginners-guide\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Multi-Factor Authentication - A Beginner’s Guide","author":{"id":"Ashish Kumar Yadav","github":null,"avatar":null},"date":"March 23, 2021","updated_date":null,"tags":["mfa","password security","compliance"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6,"src":"/static/6880cf497ea4b7ea401d558b6a5a63cf/58556/MFA-Loginradius.webp","srcSet":"/static/6880cf497ea4b7ea401d558b6a5a63cf/61e93/MFA-Loginradius.webp 200w,\n/static/6880cf497ea4b7ea401d558b6a5a63cf/1f5c5/MFA-Loginradius.webp 400w,\n/static/6880cf497ea4b7ea401d558b6a5a63cf/58556/MFA-Loginradius.webp 800w,\n/static/6880cf497ea4b7ea401d558b6a5a63cf/210c1/MFA-Loginradius.webp 900w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Ashish Kumar Yadav","slug":"/identity/multi-factor-authentication-a-beginners-guide/"}}},{"node":{"id":"8c0aefb3-2d34-5ef4-893b-81a603a1b01e","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Have you heard of phone login lately? We will get to it soon. </p>\n<p>With all the business going online in this digital era, there is probably a possibility that there is not even a single person on this planet who enjoys filling out registration forms. </p>\n<p>Today, a single consumer interacts with various apps/websites, which require them to log in or register before allowing them to use their services. There are relatively high chances of forgetting the username and the associated password while trying to log in.</p>\n<p>In this type of process, consumers may become frustrated and completely give up the sign-up process as it asks for a lot of information. Ultimately, businesses end up with lower consumer growth rates.</p>\n<p><img src=\"/68fe1376ba68f8ae19206f854d681796/PhoneLogin_overview.webp\" alt=\"PhoneLogin_overview\"></p>\n<p>But if the sign-up and login process is done right, it can trigger the retention of lots of new consumers. If done in an improper method, it may backfire and can have the exact opposite effect. </p>\n<p>So now the question is, what is the right process? How do we tame this beast? </p>\n<p>We tame it by following the best consumer experience practices and using the right analysis and optimization techniques.</p>\n<p>You might think that we can also implement a social login method like GitHub, Facebook, Google, etc., to skip traditional registration/login. </p>\n<p>Yes, you are right, we can do that! But there is a slight problem that sometimes consumers do not want their data to be shared with app developers. </p>\n<p>This is where <strong>Phone Login</strong> comes to the rescue.</p>\n<h2 id=\"introduction-to-phone-login\" style=\"position:relative;\"><a href=\"#introduction-to-phone-login\" aria-label=\"introduction to phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction to Phone Login</h2>\n<p>In the fast-paced digital landscape, the convenience and security of consumer interactions are paramount. Phone Login emerges as a powerful tool designed to streamline the often cumbersome processes of registration and login. As consumers juggle multiple apps and websites, each requiring their own set of credentials, the need for a more straightforward solution becomes evident. Phone Login steps in to simplify this process, allowing users to swiftly register or access their accounts using nothing but their mobile phones.</p>\n<p>Gone are the days of lengthy registration forms and forgotten passwords. With Phone Login, users input their phone number, receive a one-time password (OTP) on their mobile device, and gain instant access. This not only improves the user experience but also significantly reduces friction in the onboarding process for businesses.</p>\n<h2 id=\"crucial-considerations-in-phone-login-implementation\" style=\"position:relative;\"><a href=\"#crucial-considerations-in-phone-login-implementation\" aria-label=\"crucial considerations in phone login implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Crucial Considerations in Phone Login Implementation</h2>\n<h3 id=\"abuse-scenario-vigilance\" style=\"position:relative;\"><a href=\"#abuse-scenario-vigilance\" aria-label=\"abuse scenario vigilance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Abuse Scenario Vigilance</h3>\n<p>One crucial consideration in Phone Login implementation is being vigilant against abuse scenarios. The login endpoint could be vulnerable to attacks where repeated requests are sent with similar phone numbers, potentially slowing down the login page. To mitigate this risk, implementing checks on the frequency of requests from a single phone number can help maintain the system's integrity.</p>\n<h3 id=\"handling-phone-number-alterations\" style=\"position:relative;\"><a href=\"#handling-phone-number-alterations\" aria-label=\"handling phone number alterations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Handling Phone Number Alterations</h3>\n<p>Another important aspect to consider is how to handle scenarios where a user alters their phone number. To address this, a verification process can be implemented where the new number is verified before updating it in the user's account. This ensures that user information remains accurate and secure, preventing unauthorized access.</p>\n<h3 id=\"session-management-and-security\" style=\"position:relative;\"><a href=\"#session-management-and-security\" aria-label=\"session management and security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Session Management and Security</h3>\n<p>Effective session management is essential for <a href=\"https://www.loginradius.com/blog/identity/security-ux-can-coexist/\">security and user convenience</a>. Generated tokens play a vital role in this aspect, allowing for the expiration of sessions and the logging out of idle accounts. When a user enters the OTP received on their phone, the backend system verifies the token to ensure a secure login process.</p>\n<h3 id=\"telephony-api-integration\" style=\"position:relative;\"><a href=\"#telephony-api-integration\" aria-label=\"telephony api integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Telephony API Integration</h3>\n<p>To send OTPs to users' phones, integration with a telephony API is necessary. This API enables the system to send SMS messages with the OTP code for user verification. Choosing a reliable telephony API provider, such as LoginRadius, ensures the seamless delivery of OTPs to users, enhancing the overall user experience.</p>\n<h3 id=\"consumer-data-privacy\" style=\"position:relative;\"><a href=\"#consumer-data-privacy\" aria-label=\"consumer data privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consumer Data Privacy</h3>\n<p>Lastly, ensuring consumer data privacy is paramount. Phone Login should comply with data protection regulations to safeguard user information. This includes securely storing phone numbers, encrypting sensitive data, and obtaining user consent for using their phone numbers for verification purposes.</p>\n<h2 id=\"what-is-phone-login\" style=\"position:relative;\"><a href=\"#what-is-phone-login\" aria-label=\"what is phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Phone Login</h2>\n<p>Phone Login is a compelling and handy feature designed to enhance consumer experience and ease the process of login and registration.</p>\n<p>It is the process of registering or accessing a user's account by using a phone number. The user enters their phone number as username and receives a one-time password (OTP) on their mobile phone, entering which they can log in.</p>\n<p>It eliminates the hassle of filling lengthy registration forms and creating new passwords and usernames, thereby allowing users to quickly login or register just by using their mobile phones.</p>\n<p><img src=\"/3cc4a7cf7785c314d6be7437b9af604f/PhoneLogin.webp\" alt=\"PhoneLogin\"></p>\n<h2 id=\"why-should-businesses-use-phone-login\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-phone-login\" aria-label=\"why should businesses use phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Use Phone Login</h2>\n<p>As mentioned earlier, <a href=\"https://www.loginradius.com/resource/loginradius-ciam-phone-authentication/\">phone login simplifies the login and registrations process</a>. By using this feature, app developers and business owners can show their consumers that they understand what annoys them— and that they value their time. A rich consumer experience has always been seen providing a more significant consumer growth rate.</p>\n<p>This feature makes it easy for your consumers to register and log in within seconds using their phone numbers. To sign-in, they have to enter their phone number and the code they received (usually a one-time password ). </p>\n<p>And it should not be tough to understand that consumers will always tend to move in a comfortable and less time-consuming path.</p>\n<h2 id=\"benefits-of-phone-login-for-businesses\" style=\"position:relative;\"><a href=\"#benefits-of-phone-login-for-businesses\" aria-label=\"benefits of phone login for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Phone Login for Businesses</h2>\n<p><a href=\"https://www.loginradius.com/phone-login/\">Phone Login</a> becomes extremely useful for those businesses which rely heavily on consumer's phone numbers. For example, food delivery companies, cabs, and more. Other than these the following are a few benefits that will help any business.</p>\n<ul>\n<li>Easy and hassle-free registration for consumers as it skips the filling of lengthy forms.</li>\n<li>Consumers can register and login directly with their phone numbers.</li>\n<li>It avoids spam consumer registration on your website.</li>\n<li>It saves consumers time. A lot of it. By skipping traditional registration form filling.</li>\n<li>Consumers can also login without remembering their user ID and Password.</li>\n<li>Verify consumer mobile number by SMS OTP.</li>\n<li>All verified consumers are genuine, and hence it prevents fake orders.</li>\n<li>Order processing is fast because consumer identity is already verified by Phone Number and One-time password (OTP).</li>\n<li>As order processing is quick, the consumer trusts the merchant.</li>\n<li>Consumers can be notified quickly through mobile, even if they do not have internet or email access, and notifications are always read.</li>\n<li>Merchants shall reach consumers with their promotions and offers quickly through phone number</li>\n</ul>\n<p><img src=\"/86797b82228fc35c8d1dd3da04cb7816/Benifits_of_phoneLogin_in_business.webp\" alt=\"Benifits_of_phoneLogin_in_business\"></p>\n<p>Looking at the above benefits, business owners can easily enhance their business strategies and ultimately increase their consumer growth. You've got everything you need to communicate with your end-users in the most concrete and straightforward method.</p>\n<h2 id=\"how-to-implement-phone-login\" style=\"position:relative;\"><a href=\"#how-to-implement-phone-login\" aria-label=\"how to implement phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Phone Login</h2>\n<p>Now that you have read all the advantages of using a phone login and you are planning to implement it for your business, too, your first question will be, \"How can I implement this thing on my website.\" Right ??</p>\n<p>Don't worry, we've got you covered.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-phone-authentication/\"><img src=\"/46289e0fd6e7fcb32b496b8922df717f/phone-authentication.webp\" alt=\"phone-authentication\"></a></p>\n<p>This whole implementation is divided into two parts.\nThe user submits the phone number to the website's backend via GUI and obtains a token.\nUsers submit the obtained token in a web field, where it is verified. Upon successful verification, the user is logged into the website.</p>\n<p>Let's start with the first scenario where the user submits the phone number to the App backend through GUI. After submitting the number, they land on a new page which asks for a token. The application backend verifies the input number and combines it with extra information such as IP address, geographical location, and device information.</p>\n<p>This wholesome mixture of information is now submitted to the User service, which generates a token, and then they associate it with these requests. </p>\n<p>Here is an important aspect that you need to keep in mind: <strong>The generation of a token</strong>.</p>\n<p>See, this generated token will help us in many ways, and they are essential as well. These tokens can be used to expire the ongoing sessions or logging out of an idle account. And many more things like this, which increases the security of your user's account.</p>\n<p>Now our next challenge is how do we send OTP to the consumers. This will be done by your User Service, which will call a telephony API and will send the OTP to the consumers' phone number as an SMS. Many companies provide this functionality, and LoginRadius is one of them.</p>\n<p>On receiving the One-time password in SMS, the user will now enter the OTP in the form. Once again, the application backend comes into action and verifies the token which was sent by User Service.</p>\n<p>If the token is exactly the same as what was sent, the user is logged into the account. Simple!</p>\n<h2 id=\"what-things-to-take-care-of-while-implementing-phone-login\" style=\"position:relative;\"><a href=\"#what-things-to-take-care-of-while-implementing-phone-login\" aria-label=\"what things to take care of while implementing phone login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Things to Take Care of While Implementing Phone Login</h2>\n<p>Now that you know how to implement phone login, you must be excited to implement it for your website too. But there are a few things we need to keep in mind while implementing this feature.</p>\n<ul>\n<li>Be careful and vigilant about the multiple abuse scenarios where the login endpoint can get attacked by a code that keeps sending a request with a similar phone number. This can slow down your login page. To handle this, you can implement a check on how many times a consumer (phone number) can send requests.</li>\n<li>Another case is to consider the scenario if a consumer alters the phone number. You can use a similar method of first verifying the number and then updating it in the consumer’s account to handle this.\n<br /><br /></li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about applying a simple approach of using Phone Login on the websites and how it will enhance the businesses. This feature removes the consumer's mental load to remember each password created on different websites. Finally, before implementing any functionality on your website, analyze and consider the pros and cons from every possible angle. </p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-phone-login\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"What is Phone Login","author":{"id":"Ashish Kumar Yadav","github":null,"avatar":null},"date":"February 26, 2021","updated_date":null,"tags":["phone login","authentication","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6,"src":"/static/d26b5df225d96933799c9378128d393a/58556/PhoneLogin_cover_pic.webp","srcSet":"/static/d26b5df225d96933799c9378128d393a/61e93/PhoneLogin_cover_pic.webp 200w,\n/static/d26b5df225d96933799c9378128d393a/1f5c5/PhoneLogin_cover_pic.webp 400w,\n/static/d26b5df225d96933799c9378128d393a/58556/PhoneLogin_cover_pic.webp 800w,\n/static/d26b5df225d96933799c9378128d393a/99238/PhoneLogin_cover_pic.webp 1200w,\n/static/d26b5df225d96933799c9378128d393a/7c22d/PhoneLogin_cover_pic.webp 1600w,\n/static/d26b5df225d96933799c9378128d393a/25f09/PhoneLogin_cover_pic.webp 1920w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Ashish Kumar Yadav","slug":"/identity/what-is-phone-login/"}}}]},"authorYaml":{"id":"Ashish Kumar Yadav","bio":"Technical Support Engineer at LoginRadius. Handles day-to-day customer technical queries regarding integration and implementation of various web technologies. A firm believer of hard work. An active runner and a big fan of nature.","github":null,"stackoverflow":null,"linkedin":"ashish-yadav-5b1080127","medium":null,"twitter":null,"avatar":null}},"pageContext":{"id":"Ashish Kumar Yadav","__params":{"id":"ashish-kumar-yadav"}}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}