{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/24","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction It’s no secret that identity management has been a challenge for businesses. With the increase in the number of devices and…","fields":{"slug":"/identity/difference-between-identity-fabrics-zero-trust/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>It’s no secret that <a href=\"https://www.loginradius.com/blog/identity/identity-management-in-cloud-computing/\">identity management</a> has been a challenge for businesses. With the increase in the number of devices and services that need to be accessed, it’s become increasingly difficult to manage user identities and maintain security.</p>\n<p>Although there are several options available to address this issue, two competing models are gaining traction: Zero Trust and Identity Fabric.</p>\n<p>While these two approaches may seem similar on the surface, they are quite different in their approach to securing your network, and each may be better suited for different environments.</p>\n<p>In this article, we'll examine how Zero Trust and Identity Fabric work, and which is right for your organization.</p>\n<h2 id=\"what-is-identity-fabric\" style=\"position:relative;\"><a href=\"#what-is-identity-fabric\" aria-label=\"what is identity fabric permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity Fabric?</h2>\n<p>An Identity Fabric is a centralized system that allows you to share information about employees and other stakeholders across your organization. It's essentially a way to make sure that the information you use to make decisions is accurate and consistent, but it also means that if that data source gets compromised, all of your applications are vulnerable.</p>\n<p>Identity fabrics is designed to offer a new approach to security by providing a more efficient way to protect information at the application layer. It can be applied at several levels, that include:</p>\n<ul>\n<li>At the edge, where the Identity Fabric sits between the perimeter firewall and your servers or applications, protecting against threats that try to bypass perimeter defenses.</li>\n<li>In the data center itself, where it sits between your servers or applications and network traffic from outside sources such as customers or partners</li>\n<li>In addition, identity fabrics are also deployed as part of an overall strategy that also includes other types of controls such as encryption and tokenization.</li>\n</ul>\n<h2 id=\"what-is-zero-trust\" style=\"position:relative;\"><a href=\"#what-is-zero-trust\" aria-label=\"what is zero trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Zero Trust?</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/beginners-guide-zero-trust-security/\">Zero Trust</a> is an approach to security in which every interaction between two parties must be authenticated and authorized. This means no one has access to any data unless they've been granted permission by an administrator—and even then, only the parts of it they're allowed access to. </p>\n<p>Zero Trust works well for organizations that want to ensure their sensitive information isn't vulnerable when it leaves their servers—but it can be challenging to implement on a large scale.</p>\n<p>By using the Zero Trust strategy, you:</p>\n<ul>\n<li>Reduce business and organizational risks</li>\n<li>Gain control over cloud and container environments</li>\n<li>Reduce the risk of a data breach by creating perimeters around sensitive data</li>\n<li>Inspect users and devices for authentication, and permissions are assessed before any trust is gained.</li>\n</ul>\n<h2 id=\"what-are-the-critical-differences-between-identity-fabric-and-zero-trust\" style=\"position:relative;\"><a href=\"#what-are-the-critical-differences-between-identity-fabric-and-zero-trust\" aria-label=\"what are the critical differences between identity fabric and zero trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Critical Differences Between Identity Fabric and Zero Trust?</h2>\n<table>\n  <tr>\n   <td><strong>Identity Fabric</strong>\n   </td>\n   <td><strong>Zero Trust</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric is a term used to describe the composition of an individual’s identity, which could be any one or combination of things such as a username, a password, an email address, a phone number, etc.\n   </td>\n   <td>Zero Trust focuses on establishing an explicit trust relationship between two parties by requiring credentials (i.e., credentials are required to access data).\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric is used at the application layer within a network, and it can be deployed on top of existing authentication technologies such as Active Directory or LDAP.\n   </td>\n   <td>Zero Trust applies to the entire organization’s infrastructure and can be implemented without modifying existing applications or systems.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric is based on user behavior analytics that uses machine learning techniques to identify anomalies in user behavior which can then be used for authorization decisions.\n   </td>\n   <td>Zero Trust uses <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">adaptive access control</a> policies that are designed by human analysts who evaluate risk factors such as location, device type and other attributes associated with each user session before granting access rights.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric provides automatic user provisioning, so you don't have to manually create and maintain new users on your network.\n   </td>\n   <td>Zero Trust requires manual management of user accounts, which increases the workload of your IT team and may cause security vulnerabilities if not done correctly.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric offers end-to-end encryption at rest and in transit for all data stored within its platform—including sensitive information like SSNs—ensuring that no one can access it without proper authorization (i.e., through an encrypted key).\n   </td>\n   <td>Zero Trust does not offer this type of encryption for all data stored within its platform—only critical data, such as credit card numbers, are encrypted at rest.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric doesn't take that into account when determining how to enforce policies.\n   </td>\n   <td>Zero Trust is designed with the idea that users will be able to access multiple systems on a single device.\n   </td>\n  </tr>\n  <tr>\n   <td>Identity Fabric is less secure because the federated model can be compromised by hackers.\n   </td>\n   <td>Zero Trust is more secure than Identity Fabric because every interaction is governed by a policy that establishes what actions are allowed for specific users based on their role within the organization and their location at any given time (on or off premises).\n   </td>\n  </tr>\n</table>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><img src=\"/ff13eece00b0b7c800af8a39cd3462a5/WP-Zero-Trust-Security-1.webp\" alt=\"WP-Zero-Trust-Security-1\"></a></p>\n<h2 id=\"identity-fabric-vs-zero-trust-which-is-better\" style=\"position:relative;\"><a href=\"#identity-fabric-vs-zero-trust-which-is-better\" aria-label=\"identity fabric vs zero trust which is better permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Fabric vs Zero Trust: Which is Better?</h2>\n<p>The short answer to choosing identity fabrics vs zero trust totally depends on businesses.</p>\n<p>Identity Fabric is a platform that manages user identities across multiple cloud services so users can access them with a single username and password. An Identity Fabric architecture helps manage identity-related tasks like authentication, access control, and integration. </p>\n<p>Zero Trust is an access control model where users are only granted access when they prove they should have it—and not before. Who you are, where you are coming from, and your permission to access a resource are the basis of a Zero Trust strategy.</p>\n<p>Therefore, both identity fabric and zero trust are two different ways of managing business resources, one focusing on identity and the other on data. The debate over which is better has been going on for years, but the reality is that both have strengths and weaknesses, so no single solution is suitable for every organization.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=difference-between-identity-fabrics-zero-trust\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 27, 2022","updated_date":null,"description":"Identity fabric and zero trust are two different ways of managing business resources, one focusing on identity and the other on data. This blog will help you understand the difference between the two approaches and their benefits for your organization's security strategy.","title":"Identity Fabric vs. Zero Trust: Is One a Better Alternative Than The Other?","tags":["identity fabric","zero trust","identity management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.639344262295082,"src":"/static/eaf21c5773171f1eb86b208dcf773958/7f8e9/id-fabrics.webp","srcSet":"/static/eaf21c5773171f1eb86b208dcf773958/61e93/id-fabrics.webp 200w,\n/static/eaf21c5773171f1eb86b208dcf773958/1f5c5/id-fabrics.webp 400w,\n/static/eaf21c5773171f1eb86b208dcf773958/7f8e9/id-fabrics.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Introduction We’re all surrounded by an invisible aura of numerous interconnected devices consistently improving our lifestyles.   However…","fields":{"slug":"/identity/role-of-ciam-in-iot-security/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>We’re all surrounded by an invisible aura of numerous interconnected devices consistently improving our lifestyles.  </p>\n<p>However, when we see things through the lens of information security experts, the IoT landscape is one of the most vulnerable networks on cybercriminals' radar. </p>\n<p>In a network, more often than not, IoT devices exchange data for a specific purpose. It could be in emails or transferred files, or even instructions and commands exchanged between connected devices. </p>\n<p>And to facilitate this communication between devices and carry out their required instructions, the network's different components need to recognize each other and <a href=\"https://www.loginradius.com/provisioning/\">authorize access</a>. Also, they need to detect any attempt at unauthorized access or malicious intrusion by hackers trying to steal personal information such as credit card details, user identities, or traffic data.</p>\n<p>Hence, <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity &#x26; access management</a> (CIAM) has become a necessary component of infrastructure protection and services because of the increasing malware attacks on connected IoT devices. </p>\n<p>You might have read about high-profile security breaches involving millions of internet-connected devices. And with this increase in IoT security concerns,  a CIAM has become a necessary component of infrastructure protection and services because of the growing malware attacks. </p>\n<p>Let’s understand how a CIAM helps IoT networks and devices offer a seamless and secure experience. </p>\n<h2 id=\"understanding-the-risks-of-internet-of-things\" style=\"position:relative;\"><a href=\"#understanding-the-risks-of-internet-of-things\" aria-label=\"understanding the risks of internet of things permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding The Risks of Internet-Of-Things</h2>\n<p>The IoT landscape is quite vulnerable to various security threats. Many times cybercriminals gain access to user accounts by bypassing poor authentication mechanisms. </p>\n<p>The physical devices are connected to the internet and can be controlled remotely from a web browser or another application. Here, we only include devices that users directly use, not those used for communications between machines. </p>\n<p>There are huge security risks well documented in the cyber world that affect various interconnected systems and networked things—the corresponding set of IoT devices forms networks or groups to complete tasks. The internet of things landscape is vulnerable to several security threats due to poor authentication implementation, insufficient isolation, lack of data encryption, insecure remote access protocols, weak configuration management, etc.</p>\n<p>And what’s worrisome is the fact that the <a href=\"https://www.loginradius.com/blog/identity/rise-of-machine-identity-m2m-authorization-role/\">machine-to-machine communication</a> and authentication in the IoT landscape isn’t secure and can be easily compromised by cybercriminals. Hence, a more robust authentication is required, and brands can’t rely on conventional methods.</p>\n<p><a href=\"https://www.loginradius.com/resource/ciam-in-iot-security-whitepaper\"><img src=\"/80a64cb714ace554fe2b7b91f6e6a472/ciam-paradox-wp.webp\" alt=\"ciam-paradox-wp\"></a></p>\n<p>Here’s where the critical role of a reliable CIAM comes into play. Let’s understand how CIAM paves the way for a secure IoT environment. </p>\n<h2 id=\"how-ciam-is-securing-the-internet-of-things\" style=\"position:relative;\"><a href=\"#how-ciam-is-securing-the-internet-of-things\" aria-label=\"how ciam is securing the internet of things permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How CIAM is Securing the Internet of Things?</h2>\n<h3 id=\"1-secure-machine-to-machine-communication\" style=\"position:relative;\"><a href=\"#1-secure-machine-to-machine-communication\" aria-label=\"1 secure machine to machine communication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Secure machine-to-machine communication</h3>\n<p>One of the most significant advantages of leveraging a CIAM solution for IoT networks is that it ensures seamless, secure, and quick authentication between multiple apps, devices, and humans. </p>\n<p>Once a CIAM is incorporated into an IoT system, it reinforces authentication through multi-factor authentication and risk-based authentication, even between apps and machines. </p>\n<p>Hence, businesses developing IoT devices and applications or serving as IoT vendors can ensure their overall security posture once they incorporate CIAM. </p>\n<h3 id=\"2-compliance-with-data-privacy-and-security-regulations\" style=\"position:relative;\"><a href=\"#2-compliance-with-data-privacy-and-security-regulations\" aria-label=\"2 compliance with data privacy and security regulations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Compliance with data privacy and security regulations</h3>\n<p>Another benefit of incorporating a CIAM for your IoT applications/devices is compliance with data and privacy regulations, including the GDPR and CCPA. </p>\n<p>Most businesses dealing in the IoT landscape aren’t aware of the basic regulations and privacy laws they must comply with. And this could be pretty fatal, mainly when they collect a vast amount of customer details. </p>\n<p>With a reliable CIAM, businesses need not worry about compliance since cloud-based CIAMs like <a href=\"https://www.loginradius.com/compliances/\">LoginRadius offer compliance</a> with CCPA, GDPR, and other regulations. </p>\n<p>Organizations need to incorporate the CIAM and forget the rest, as it helps secure billions of identities, including that of humans and machines. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>While businesses offer users a great experience and convenience, ignoring the security aspects could be the worst. </p>\n<p>Businesses need to understand that IoT environments are always on the radar of cybercriminals, and a little loophole could cause financial and reputational losses.  And getting a CIAM is the best way to ensure secure and seamless authentication and authorization that mitigates security risks up to a great extent. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=role-of-ciam-in-iot-security\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 27, 2022","updated_date":null,"description":"Just like agility is the way to move quickly and easily; digital agility is now the means to adopt digital transformation quickly through the right tools and processes. This blog explains the aspects of digital agility and how businesses can ensure they’re on the right path to achieving it through the right customer authentication tools and technologies.","title":"The Role of Customer Identity Management in IoT Security: How It's a Must!","tags":["ciam","iot security","compliance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.0408163265306123,"src":"/static/1982003743377645f3151b6fd66c8de6/7f8e9/iot-ciam.webp","srcSet":"/static/1982003743377645f3151b6fd66c8de6/61e93/iot-ciam.webp 200w,\n/static/1982003743377645f3151b6fd66c8de6/1f5c5/iot-ciam.webp 400w,\n/static/1982003743377645f3151b6fd66c8de6/7f8e9/iot-ciam.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Introduction Centralized access management is swiftly becoming the need of the hour as we adopt a fully digital lifestyle that demands…","fields":{"slug":"/identity/secure-centralized-access-management-without-compromising-cx/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Centralized access management is swiftly becoming the need of the hour as we adopt a fully digital lifestyle that demands robust security at every touchpoint. </p>\n<p>We are surrounded by several applications and devices that simplify our daily lives and eventually become integral to our modern lifestyles. </p>\n<p>And we’re always on a hunt for better experiences that impact our lives through several connected devices and apps working flawlessly to help streamline various aspects of our daily routine. </p>\n<p>However, when we see things through the lens of an information security professional, security could be the least prioritized thing while embarking on a <a href=\"https://www.loginradius.com/blog/identity/customer-experience-driving-digital-transformations/\">digital transformation journey</a>. </p>\n<p>While most platforms offer stringent security measures across their devices or applications, many businesses cannot provide a seamless user experience and security when a user switches from one app to another or device to another. </p>\n<p>A little glitch in the overall experience or security threat while accessing services from one device to another or a bad cross-platform experience could lead to a situation where businesses lose consumer trust. </p>\n<p>So, what could be the ideal way to enhance centralized access security without compromising user experience? Let’s figure it out. </p>\n<h3 id=\"1-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#1-single-sign-on-sso\" aria-label=\"1 single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Single Sign-On (SSO)</h3>\n<p>Single Sign-On (SSO)  is a method of authentication that allows websites to use other trustworthy sites to verify users. Single sign-on enables users to log in to any independent application with a single ID and password.</p>\n<p>SSO is an essential feature of an Identity and Access Management (IAM) platform for controlling access. Verifying user identity is essential when it comes to knowing which permissions a user will have. The <a href=\"https://www.loginradius.com/\">LoginRadius Identity platform</a> is one example of managing access that combines user identity management solutions with SSO solutions.</p>\n<p>Enhanced user experience is one of the most valuable benefits of SSO. As repeated logins are no longer required, customers can enjoy a modern digital experience. The benefits for enterprises include increased customer loyalty and higher conversion rates.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><img src=\"/970abf5b3c4e78379ad5bf97a519b62c/SSO-DS.webp\" alt=\"SSO-DS\"></a></p>\n<p>Hence, SSO is undeniably the perfect solution to improve centralized access between devices or applications without compromising security and user experience since users can jump from one app to another without friction. </p>\n<p>Apart from this, cross-platform integration and authentication are other reasons businesses must put their best foot forward in adopting a single sign-on solution for their platforms. </p>\n<h3 id=\"2-go-passwordless\" style=\"position:relative;\"><a href=\"#2-go-passwordless\" aria-label=\"2 go passwordless permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Go Passwordless</h3>\n<p>When it comes to secure and streamlined authentication, nothing beats a passwordless authentication mechanism. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-passwordless-login/\">Passwordless login</a> verifies consumer identities without using passwords or any other memorized credentials.</p>\n<p>The consumer is confirmed with the help of a possession factor, which can be an object that uniquely identifies the user with an email (link) or SMS (OTP) sent to the registered email address or phone number, respectively.</p>\n<p>Once the link or OTP is verified, the consumer will be logged into the account.</p>\n<p>More and more businesses are now leveraging the true potential of going passwordless since it minimizes authentication friction, and users can quickly authenticate in a number of devices or applications hence improving centralized access. </p>\n<h3 id=\"3-federated-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#3-federated-single-sign-on-sso\" aria-label=\"3 federated single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Federated Single Sign-On (SSO)</h3>\n<p><a href=\"https://www.loginradius.com/federated-sso/\">Federated single sign-on</a> (SSO) establishes inter-organizational trust that helps seamless authorization and authentication of each others’ users.</p>\n<p>Fed SSO generates an authentication URL, and when the user clicks on the URL, the cloud identity service makes a digitally signed token to verify the partner platform. And this token is further submitted by the web browser to the partner’s SSO during a new session.</p>\n<p>The federated SSO works by offering a partnership role involving two parties, including the service provider (SP) and identity provider (IdP). The identity provider provides a digital token, and the service provider validates the digital token and creates a new session offering access to the program/application.</p>\n<p>With federated SSO, businesses can overcome the hassle of resetting passwords and ensure their customers can flawlessly switch between applications/platforms of different service providers without worrying about their security.</p>\n<p>Businesses requiring higher peak load management and an identity management system to provide real-time load management should choose a reliable CIAM solution offering federated SSO capabilities.</p>\n<p>In a nutshell, fed SSO bridges the centralized access and authentication gap between multiple platforms and enables users with cloud identity services to access services offered by one or more partner businesses/media without needing a separate login at the partner platform.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Robust authentication security coupled with a great user experience is what it takes to build long-lasting customer relationships. And businesses that aren’t offering seamless centralized access would surely lag behind their competitors. </p>\n<p>With secure centralized access through single sign-on and passwordless login, businesses can quickly win customer trust and stand ahead of their competitors. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=secure-centralized-access-management-without-compromising-cx\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"LoginRadius Book a Demo\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 17, 2022","updated_date":null,"description":"While most platforms offer stringent security measures across their devices or applications, many businesses cannot provide a seamless user experience and security when a user switches from one app to another or device to another. Let’s understand how to enhance customer experience without compromising security.","title":"Securing Centralized Access Without Compromising User Experience","tags":["centralized access management","sso","passwordless"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.3529411764705883,"src":"/static/15cce30a83ce4e50dd7dddaf0b99f5f8/7f8e9/centralized-access.webp","srcSet":"/static/15cce30a83ce4e50dd7dddaf0b99f5f8/61e93/centralized-access.webp 200w,\n/static/15cce30a83ce4e50dd7dddaf0b99f5f8/1f5c5/centralized-access.webp 400w,\n/static/15cce30a83ce4e50dd7dddaf0b99f5f8/7f8e9/centralized-access.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Introduction As more elements of our day to day lives continue to be translated into online activity within the metaverse, and as the flow…","fields":{"slug":"/identity/changing-user-authentication-in-metaverse/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>As more elements of our day to day lives continue to be translated into online activity within the metaverse, and as the flow between digital platforms becomes increasingly organic and seamless, the need for swift and frictionless authentication is more important than ever.</p>\n<p>So, what exactly is user authentication? Why is it important - and, as Web 3.0 continues to develop, what does the future hold for the security of our activities and transactions?</p>\n<h2 id=\"what-is-user-authentication\" style=\"position:relative;\"><a href=\"#what-is-user-authentication\" aria-label=\"what is user authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is User Authentication?</h2>\n<p>Any activity that may reveal our identifiable personal or financial data to other users - and therefore to potential fraudsters - must be carefully protected. </p>\n<p>To that end, “<a href=\"https://www.loginradius.com/authentication/\">user authentication</a>” is implemented by most sites, apps and platforms that handle data of this kind.</p>\n<p>The term refers to methods whereby a visitor to a site or platform, or the user of an app, must prove their identity and their right to carry out certain activity or transactions within that resource before they may proceed. It is a means to prevent fraud.</p>\n<p>So, what are the most common methods of user authentication, and how are they changing as the metaverse develops?</p>\n<h2 id=\"how-is-user-authentication-changing-with-the-evolving-meraverse\" style=\"position:relative;\"><a href=\"#how-is-user-authentication-changing-with-the-evolving-meraverse\" aria-label=\"how is user authentication changing with the evolving meraverse permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is User Authentication Changing With the Evolving Meraverse?</h2>\n<h3 id=\"1-passwords\" style=\"position:relative;\"><a href=\"#1-passwords\" aria-label=\"1 passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Passwords</h3>\n<p>Passwords are perhaps the most basic of <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">authentication methods</a>. They are also among the most risky, as they require users to decide on a series of letters, numbers and symbols that will not be guessed by any other entity.</p>\n<p>They may be written down and lost or accidentally revealed - and, with so many different passwords required for multiple sites and platforms, many users resort to using the same phrase for each one, which means that a single data breach could be disastrous for them.</p>\n<p>While many businesses that require the use of passwords by their employees now implement regular password expiry to protect against these risks, this comes with issues of its own.</p>\n<p>In general, passwords are becoming less and less popular as a method of authenticating identity.</p>\n<h3 id=\"2-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#2-multi-factor-authentication\" aria-label=\"2 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Multi-factor authentication</h3>\n<p>This form of authentication requires an individual signing in to undertake a further “step” in order to prove their identity. </p>\n<p>For example, they may enter a username and password to pass the first stage, but the site, app or platform may then generate a code which is sent to a designated email address or mobile device associated with their account. The user then has to enter that code into a particular field in order to gain access.</p>\n<p>While this approach is generally more secure than a basic password, many fraudsters will already have access to their victim’s email account - rendering certain types of multi-factor authentication useless. </p>\n<p>What is more, this method includes an additional friction point, which makes it less user-friendly and potentially frustrating.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-GD-to-MFA.webp\" alt=\"EB-GD-to-MFA\"></a></p>\n<h3 id=\"3-biometric-authentication\" style=\"position:relative;\"><a href=\"#3-biometric-authentication\" aria-label=\"3 biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Biometric authentication</h3>\n<p>This type of authentication includes the likes of fingerprint and facial recognition, which means that a user need only touch a sensor or raise the screen of their device to their face to gain access.</p>\n<p>This has become a very popular method in recent times, particularly with phone manufacturers. It is also considered by many to be the safest and most secure method of authentication due to its accuracy.</p>\n<p>However, breaches of biometric data are still possible - which means that this technique is not foolproof.</p>\n<h3 id=\"4-token-based-authentication\" style=\"position:relative;\"><a href=\"#4-token-based-authentication\" aria-label=\"4 token based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Token-based authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/pros-cons-token-authentication/\">Token-based authentication</a> is a method that allows a slightly more seamless experience. </p>\n<p>The user is required to enter some information - i.e. a password, username etc, to generate a digitally encrypted “token”, which then allows them to utilise a certain app, platform or site until a certain time period has passed, or until they log out or exit the system.</p>\n<p>The token may be: </p>\n<ul>\n<li>a device such as a USB or a smart card that is connected to the machine being used</li>\n<li>a wearable or carriable item that uses contactless technology and need only be placed near to the machine</li>\n<li>a software token</li>\n<li>a JSON (JavaScript Object Notation) web token</li>\n</ul>\n<p>In most cases, the user must enter a single password and username when initially logging into the system with an encrypted token - but, once they have done this, they are able to browse and utilise different sites, platforms and apps without having to enter log in details.</p>\n<p>Once their session is finished, the machine-generated token is destroyed - meaning it cannot be stolen or replicated. A new token is generated when the user next logs in. </p>\n<h3 id=\"5-cryptographic-authentication\" style=\"position:relative;\"><a href=\"#5-cryptographic-authentication\" aria-label=\"5 cryptographic authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Cryptographic authentication</h3>\n<p>This form of authentication involves the creation of temporary cryptographic “keys” in order to allow authorised parties access to a particular resource.</p>\n<p>The process works in this way:</p>\n<ul>\n<li>Cryptographic “keys” are generated by way of asymmetric encryption and assigned to each authorised user</li>\n<li>These keys are then “stored” in every secure system to which the user may require access in the future</li>\n<li>When the user requests access to any of these systems, the server they are using will request that the user apply their private key as a method of authentication - for example, by providing an encrypted code. The private key may then be used to unencrypt the code and enable the user to access the system</li>\n</ul>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>“With no need to remember and enter complicated and insecure passwords, “frictionless”, password-free login methods appear to be the way of the future,” comments Ruban Selvanayagam of <a rel=\"nofollow\" href=\"https://www.propertysolvers.co.uk/we-buy-any-house/\"> UK buying firm Property Solvers </a> who have been investigating how to deploy cryptography and blockchain technology into the real estate industry.</p>\n<p>From user “behaviour” analysis to asymmetric encryption, we can expect the authentication experience to flow more and more easily as the metaverse develops. All changes to the “login” process are likely to follow this pattern throughout the foreseeable future.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=changing-user-authentication-in-metaverse\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 12, 2022","updated_date":null,"description":"The importance of user authentication is paramount to maintaining the security of the metaverse. This blog looks into a number of widely-used authentication models and, in doing so, explores the future of user authentication in the metaverse.","title":"User Authentication in the Metaverse: What’s Changing?","tags":["user authentication","mfa","passwordless login","biometric authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9801980198019802,"src":"/static/7258ef3f1f73f838e0e68f94a0ce24cc/7f8e9/metaverse.webp","srcSet":"/static/7258ef3f1f73f838e0e68f94a0ce24cc/61e93/metaverse.webp 200w,\n/static/7258ef3f1f73f838e0e68f94a0ce24cc/1f5c5/metaverse.webp 400w,\n/static/7258ef3f1f73f838e0e68f94a0ce24cc/7f8e9/metaverse.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"James Durr","github":null,"avatar":null}}}},{"node":{"excerpt":"Let’s join hands to make the internet a safer place for everyone! This October, at LoginRadius, we pledge to spread awareness about National…","fields":{"slug":"/identity/loginradius-to-spread-cybersecurity-awareness/"},"html":"<p><strong>Let’s join hands to make the internet a safer place for everyone!</strong></p>\n<p>This October, at LoginRadius, we pledge to spread awareness about <a href=\"https://www.cisa.gov/cybersecurity-awareness-month\">National Cybersecurity Awareness Month (NCSAM)</a> through awareness campaigns to help individuals stay safe online. </p>\n<p>Initially started by the department of the U.S. Department of Homeland Security and the National Cyber Security Alliance, NCSAM has grown into a global initiative supported by many countries. </p>\n<p>Various organizations and governments across the globe join hands in educating people regarding good cybersecurity hygiene and ensuring everybody is safe while using the internet.</p>\n<p>Since the global cybersecurity threat vector has increased exponentially, governments are encouraging people to take accountability and focus more on improving their data security and privacy online. </p>\n<p>This year’s theme is “See Yourself in Cyber,” which means every individual or business, no matter in whatever role, must take basic steps to protect their privacy and other data online. </p>\n<p>Moreover, vendors and suppliers must also take ownership of their roles and protect their reputations by incorporating stringent security mechanisms. </p>\n<h2 id=\"list-of-loginradius-cybersecurity-activities-to-support-this-years-campaign\" style=\"position:relative;\"><a href=\"#list-of-loginradius-cybersecurity-activities-to-support-this-years-campaign\" aria-label=\"list of loginradius cybersecurity activities to support this years campaign permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>List of LoginRadius’ Cybersecurity Activities to Support this Year’s Campaign</h2>\n<p><strong>Social Media Awareness:</strong> We’ll ensure to keep our clients and followers updated regarding the latest threat vectors and how to stay safe online through a series of insightful and engaging posts. </p>\n<h3 id=\"free-downloadable-resources\" style=\"position:relative;\"><a href=\"#free-downloadable-resources\" aria-label=\"free downloadable resources permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Free Downloadable Resources:</h3>\n<ul>\n<li><a href=\"https://www.loginradius.com/resource/securing-user-authentication-understanding-the-basics-best-practices/\">Securing User Authentication: Understanding the Basics &#x26; Best Practices</a></li>\n<li><a href=\"https://www.loginradius.com/resource/zero-trust-security/\">Zero Trust Security for Modern Businesses</a></li>\n<li><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\">Future-proof Your Security Systems by Moving to Cloud Through SASE Approach</a></li>\n<li><a href=\"https://www.loginradius.com/resource/how-loginradius-prevents-bot-attacks/\">How LoginRadius Prevents Bot Attacks for Your Business</a></li>\n<li><a href=\"https://www.loginradius.com/resource/implementing-a-holistic-resiliency-approach-to-cyber-risk-measurement/\">Implementing a Holistic Resiliency Approach to Cyber Risk Measurement</a></li>\n<li><a href=\"https://www.loginradius.com/resource/shifting-safely-to-remote-learning-with-the-best-cyber-security-hygiene/\">Shifting Safely to Remote Learning with the Best Cyber Security Hygiene</a></li>\n<li><a href=\"https://www.loginradius.com/resource/why-is-end-user-cyber-security-training-mandatory/\">Why is End User Cyber Security Training Mandatory</a></li>\n<li><a href=\"https://www.loginradius.com/resource/making-a-secure-transition-to-multi-tenant-cloud/\">Making a Secure Transition to Multi-Tenant Cloud</a></li>\n<li><a href=\"https://www.loginradius.com/resource/consumer-identity-theft-utilizing-the-loginradius-ciam/\">Consumer Identity Theft: Utilizing the LoginRadius CIAM for Improved Consumer Trust</a></li>\n<li><a href=\"https://www.loginradius.com/resource/how-to-use-smart-login/\">How to Use Smart Login to Improve Security</a></li>\n<li><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\">Understanding Credential Stuffing Attacks</a></li>\n</ul>\n<h3 id=\"categorized-blogs\" style=\"position:relative;\"><a href=\"#categorized-blogs\" aria-label=\"categorized blogs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Categorized Blogs:</h3>\n<h4 id=\"account-security\" style=\"position:relative;\"><a href=\"#account-security\" aria-label=\"account security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Account Security</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/identity/account-security-consumers/\">How to Enable Account Security for Your Customers?</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/login-security/\">Login Security: 7 Best Practices to Keep Your Online Accounts Secure</a></li>\n</ul>\n<h4 id=\"cloud-security\" style=\"position:relative;\"><a href=\"#cloud-security\" aria-label=\"cloud security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cloud Security</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2022/\">6 Strategies to Secure Your Cloud Operations Against Today's Cyber Threats</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/what-is-cloud-security/\">What is Cloud Security and How Does it Work?</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/cloud-security-management/\"> Protecting a Unified Cloud Platform through Cloud Security Management</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/cloud-computing-security-challenges/\">Cloud Security Challenges Today: Expert Advice on Keeping your Business Safe</a></li>\n</ul>\n<h4 id=\"data-security\" style=\"position:relative;\"><a href=\"#data-security\" aria-label=\"data security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data Security</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/identity/data-security-best-practices/\">9 Data Security Best Practices For Your Business</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/\">Maintaining Quality Data Security Practices</a></li>\n</ul>\n<h4 id=\"consumer-data-privacy\" style=\"position:relative;\"><a href=\"#consumer-data-privacy\" aria-label=\"consumer data privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consumer Data Privacy</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">How LoginRadius Future-Proofs Consumer Data Privacy and Security?</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/how-to-handle-data-breaches/\">Consumer Data Protection: How to Handle Data Breaches in Your Business?</a></li>\n</ul>\n<h4 id=\"multi-factor-authentication\" style=\"position:relative;\"><a href=\"#multi-factor-authentication\" aria-label=\"multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">What is Multi-Factor Authentication?</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/benefits-of-mfa/\">7 Benefits of Multi-Factor Authentication</a></li>\n</ul>\n<h4 id=\"passwordless-authentication\" style=\"position:relative;\"><a href=\"#passwordless-authentication\" aria-label=\"passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Authentication</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">What isPasswordless Authentication?</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/passwordless-going-navigate-business-success/\">Why Does Your Business Need A Passwordless Experience (Minus the User Friction)?</a></li>\n</ul>\n<h4 id=\"expert-tips\" style=\"position:relative;\"><a href=\"#expert-tips\" aria-label=\"expert tips permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Expert Tips</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2022/\">Top 7 Security Tips from LoginRadius’ Cybersecurity Expert to Follow in 2022</a></li>\n<li><a href=\"https://www.loginradius.com/blog/growth/password-manager-tips/\">5 Tips for Choosing the Right Password Manager for Your Team</a></li>\n</ul>\n<h4 id=\"zero-trust\" style=\"position:relative;\"><a href=\"#zero-trust\" aria-label=\"zero trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Zero Trust</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/growth/business-is-vulnerable-online-how-to-secure/\">Your Business Is Vulnerable Online: Here’s How You Can Secure It</a></li>\n<li><a href=\"https://www.loginradius.com/blog/identity/sase-zero-trust/\">10 Reasons For Businesses to Implement SASE With a Zero Trust Strategy</a></li>\n</ul>\n<h4 id=\"nist\" style=\"position:relative;\"><a href=\"#nist\" aria-label=\"nist permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>NIST</h4>\n<ul>\n<li><a href=\"https://www.loginradius.com/blog/identity/nist-password-guidelines-2021/\">How is NIST Changing Password Creation?</a></li>\n</ul>\n<h2 id=\"about-loginradius\" style=\"position:relative;\"><a href=\"#about-loginradius\" aria-label=\"about loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>About LoginRadius</h2>\n<p>LoginRadius is a leading cloud-based consumer identity and access management (CIAM) solution that empowers businesses to deliver a delightful consumer experience.</p>\n<p>Our developer-friendly Identity Platform provides a comprehensive set of APIs to enable authentication, identity verification, single sign-on, user management, and account protection capabilities such as multi-factor authentication on any web or mobile application. </p>\n<p>We also offer open source SDKs, integrations with over 150 third-party applications, pre-designed and customizable login interfaces, and best-in-class data security products. LoginRadius is already loved by over 500 brands with a reach of 1.17 billion consumers worldwide.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=loginradius-to-spread-cybersecurity-awareness\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 06, 2022","updated_date":null,"description":"The global cybersecurity threat vector has increased exponentially, and governments across the globe are encouraging people to take accountability to improve their digital privacy. LoginRadius pledges to spread awareness about National Cybersecurity Awareness Month (NCSAM) 2022 through awareness campaigns and help individuals stay safe online.","title":"LoginRadius Celebrates National Cybersecurity Month 2022 - Here’s Everything You Should Know","tags":["cybersecurity awareness","cybersecurity campaign","customer identity"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9801980198019802,"src":"/static/5427dfaf55f90d2f2fc3ffff19645c80/7f8e9/cybersec-id.webp","srcSet":"/static/5427dfaf55f90d2f2fc3ffff19645c80/61e93/cybersec-id.webp 200w,\n/static/5427dfaf55f90d2f2fc3ffff19645c80/1f5c5/cybersec-id.webp 400w,\n/static/5427dfaf55f90d2f2fc3ffff19645c80/7f8e9/cybersec-id.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction The dawn of cloud computing created endless business opportunities for organizations seeking substantial growth by delivering a…","fields":{"slug":"/identity/public-cloud-risks-organization-ready/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The dawn of cloud computing created endless business opportunities for organizations seeking substantial growth by delivering a flawless user experience backed with robust security. </p>\n<p>Regardless of the niche, enterprises are now leveraging the public cloud to its full potential and ability to stay ahead of the competition. </p>\n<p>Moreover, public clouds have significantly increased the deployment of virtual machines since it offers flexibility and is quite affordable, even for startups and small enterprises. </p>\n<p>However, the rapid adoption of the public and hybrid cloud doesn’t necessarily mean that sensitive information stored on remote servers or shared clouds is secure. </p>\n<p>A recent survey revealed that phishing is one of the most common cloud attacks, with <a href=\"https://www.statista.com/statistics/1320178/common-cloud-security-attacks-worldwide/\">73% of respondents</a> agreeing that their organization faced a phishing attack. </p>\n<p>And phishing is just one risk; plenty of other underlying risks can affect your cloud security. </p>\n<p>Hence, businesses must understand the risks associated with <a href=\"https://www.loginradius.com/blog/identity/what-is-cloud-security/\">public cloud security</a> and take timely action to avoid financial and reputational losses. </p>\n<p>Let’s understand the risks associated with the public cloud and how businesses can take timely action to avoid the risks. </p>\n<h2 id=\"risks-associated-with-public-cloud-infrastructures\" style=\"position:relative;\"><a href=\"#risks-associated-with-public-cloud-infrastructures\" aria-label=\"risks associated with public cloud infrastructures permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risks Associated with Public Cloud Infrastructures</h2>\n<p>Since several risks can impact a business, here’s the list of some of the most common risks that every business should be aware of: </p>\n<h3 id=\"1-lack-of-data-control\" style=\"position:relative;\"><a href=\"#1-lack-of-data-control\" aria-label=\"1 lack of data control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Lack of data control.</h3>\n<p>One of the biggest challenges with the public cloud infrastructure is that the data is stored outside the enterprise’s IT environment. And this can be pretty risky from an information security perspective. </p>\n<p>Hence, most public cloud providers suggest enterprises create backups of their sensitive information to deal with any risky situation. </p>\n<p>Besides, privacy risks, especially in shared cloud infrastructure, can't be overlooked. And the sensitive data is beyond the control of the organization. </p>\n<p>So, businesses need to invest in cloud security best practices, including <a href=\"https://www.loginradius.com/multi-factor-authentication/\">multi-factor authentication</a> (MFA) and risk-based authentication (RBA). </p>\n<h3 id=\"2-shared-access-data-privacy-risks\" style=\"position:relative;\"><a href=\"#2-shared-access-data-privacy-risks\" aria-label=\"2 shared access data privacy risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Shared access data privacy risks.</h3>\n<p>Since most enterprises aren’t relying on renowned cloud providers, including Microsoft, Google, and Amazon, the risk of data privacy and identity theft lingers. </p>\n<p>Moreover, cybercriminals are always searching for ways to breach security by bypassing the poor line of defense. In a nutshell, they exploit destructive authentication mechanisms. </p>\n<p>So, how should an organization protect the privacy and security of its consumer information? Users may be misusing their account verification. It's in these cases that the Zero Trust Model works.</p>\n<p>The zero trust model believes no user can be trusted, and verification is no longer an option. It supports the theory that all users must be authenticated, authorized, and regularly verified to ensure they can be trusted with the data in any business hierarchy.</p>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><img src=\"/ff13eece00b0b7c800af8a39cd3462a5/WP-sero-trust-1.webp\" alt=\"WP-sero-trust-1\"></a></p>\n<h3 id=\"3-availability-risks\" style=\"position:relative;\"><a href=\"#3-availability-risks\" aria-label=\"3 availability risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Availability risks.</h3>\n<p>Another major issue that can affect the overall security of your cloud is connection failures and cloud server downtime. </p>\n<p>Many businesses have faced DDoS (distributed denial of service) attacks in the last couple of years, leading to identity theft and financial and reputational damages. And the number of such attacks is surging exponentially. </p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/how-to-mitigate-ddos-attack/\">DDoS attacks</a> are pretty common in private cloud infrastructure, and one robust way to avoid such attacks is to choose servers offering 100% uptime. </p>\n<p>A cloud-based CIAM (customer identity and access management) solution like <a href=\"https://www.loginradius.com/\">LoginRadius</a>,  has set up automated failover systems in all layers of our architecture, which is why it ensures 99.99% uptime every month.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>The increasing number of enterprises leveraging the cloud has increased the risk of data breaches and identity thefts. </p>\n<p>Businesses considering leveraging the private cloud shouldn’t overlook the security aspects and must consider relying on n robust security infrastructure. </p>\n<p>Enterprises thinking about accelerating business growth through cloud adoption shouldn't miss the aspects above. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=public-cloud-risks-organization-ready\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 22, 2022","updated_date":null,"description":"The rapid adoption of the public and hybrid cloud doesn’t necessarily mean that sensitive information stored on remote servers or shared clouds is secure. This blog highlights the risks associated with the public cloud and how businesses can take timely action to avoid the risks.","title":"Public Cloud Risks - Is Your Organization Prepared for Cloud Threats?","tags":["cloud security","data privacy","mfa","zero trust"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5748031496062993,"src":"/static/01f3ef686dbeb05144e43d178f1961fd/7f8e9/public-cloud-risks.webp","srcSet":"/static/01f3ef686dbeb05144e43d178f1961fd/61e93/public-cloud-risks.webp 200w,\n/static/01f3ef686dbeb05144e43d178f1961fd/1f5c5/public-cloud-risks.webp 400w,\n/static/01f3ef686dbeb05144e43d178f1961fd/7f8e9/public-cloud-risks.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":138,"currentPage":24,"type":"//identity//","numPages":72,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}