{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/36","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"LoginRadius has been at the forefront of businesses' digital transformation with its advanced CIAM (Customer Identity and Access Management…","fields":{"slug":"/identity/loginradius-roi-enterprises-infographic/"},"html":"<p>LoginRadius has been at the forefront of businesses' digital transformation with its advanced CIAM (Customer Identity and Access Management) platform, redefining how companies securely manage their users. The cloud solution also offers a host of initiatives that enhance ROI like <a href=\"https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/\">high scalability</a>, customization, and customer-obsessed solutions. A few are explained below: </p>\n<h3 id=\"1-auto-scalable-infrastructure\" style=\"position:relative;\"><a href=\"#1-auto-scalable-infrastructure\" aria-label=\"1 auto scalable infrastructure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Auto-scalable infrastructure</h3>\n<p>Organizations these days need to enable networks, processes, and software to grow and manage increasing demands effectively. <a href=\"https://www.loginradius.com/scalability/\">Scalable infrastructure</a> provides companies with the ability to add servers and computers to a network to handle increased workloads efficiently.</p>\n<p>It, therefore, does not come as a surprise that scalable storage has gone from a novelty to a necessity with its ability to increase data capacity utilizing a single repository instead of multiple sentinel servers. </p>\n<p>To address the potential of applications growing over time, our platform is designed with scalability in mind and can resourcefully and seamlessly accommodate growth. At a peak load of 180K logins per second, you can rest assured our infrastructure can handle increased users and demand.</p>\n<h3 id=\"2-unparalleled-security\" style=\"position:relative;\"><a href=\"#2-unparalleled-security\" aria-label=\"2 unparalleled security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Unparalleled security</h3>\n<p>LoginRadius offers matchless security with password protection, account verification, auto re-authentication, <a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">risk-based authentication</a>, multi-factor authentication, and in-built fraud email blocks. All these elements come together to form the most formidable and intelligent security system with protocols that enable access to users after thorough verification and authentication, restrict access to unauthorized elements, protect users from external threats and keep sensitive data secure.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-case-for-buying-over-building/\"><img src=\"/f1bef07434b10829d0210abc5d59dd61/EB-buy-build.webp\" alt=\"EB-buy-build\"></a></p>\n<h3 id=\"3-seamless-integration\" style=\"position:relative;\"><a href=\"#3-seamless-integration\" aria-label=\"3 seamless integration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Seamless integration</h3>\n<p>Our automated data integration options improve organizational efficiency to automate tasks to run entirely without minimal human intervention. Automation of repetitive and tedious tasks associated with data integration such as ingestion, extraction, transformation, and migration across the enterprise drives up efficiency and saves your business time and money.</p>\n<p>LoginRadius provides customized data mapping to facilitate data integration, <a href=\"https://www.loginradius.com/blog/identity/loginradius-identity-import-manager-data-migration/\">data migration</a>, warehouse automation, automated data extraction, data synchronization, and meet other data management requirements. </p>\n<p>Data mapping is a crucial aspect, and quality data mapping will ensure top-quality data for analysis. Our customized data mapping ability will allow organizations to gather user data for valuable insights.</p>\n<p>Unified and centralized data further allows organizations to work from the exact blueprint to avoid discrepancies from different tools and disparate data. Furthermore, the availability of data at a single, central location improves accessibility. It enhances the decision-making process by providing a holistic and complete view of the organization's data. </p>\n<p>LoginRadius also provides two-way sync, allowing users to synchronize data irrespective of whether it has been uploaded from the source or the destination.</p>\n<p>To learn more on how LoginRadius empowers businesses and delivers the utmost ROI, check out the infographic below.\n<img src=\"/2f834ab450fe0c0aa3ad866d931475f8/ROI.webp\" alt=\"ROI\"></p>\n<h2 id=\"implementing-customer-obsessed-capabilities-for-your-business\" style=\"position:relative;\"><a href=\"#implementing-customer-obsessed-capabilities-for-your-business\" aria-label=\"implementing customer obsessed capabilities for your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Customer-Obsessed Capabilities for Your Business</h2>\n<p>For businesses to grow and increase their profitability, there is a need to implement robust infrastructure to aid in productivity and increase efficiency. LoginRadius helps organizations scale up security, operability, data integration, and effective <a href=\"https://www.loginradius.com/data-governance/\">data management</a>, among others. </p>\n<p>LoginRadius has 35 data centers worldwide and helps companies manage the needs of 1.17 billion user identities with its efficient 24/7 support for its valued customers.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=loginradius-roi-enterprises-infographic\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"LoginRadius Book a Demo\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 16, 2021","updated_date":null,"description":"For businesses to grow and increase their profitability, there is a need to implement robust infrastructure to aid in productivity and increase efficiency. LoginRadius helps organizations scale up security, operability, data integration, and effective data management, among others. Check out our infographic for more ROI-centric details.","title":"How LoginRadius Offers Customer-Centric Capabilities that Drive ROI","tags":["data management","digital transformation","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.1739130434782608,"src":"/static/021b01b3c7c3bdb21bed14ea13513b7c/58556/roi-cover.webp","srcSet":"/static/021b01b3c7c3bdb21bed14ea13513b7c/61e93/roi-cover.webp 200w,\n/static/021b01b3c7c3bdb21bed14ea13513b7c/1f5c5/roi-cover.webp 400w,\n/static/021b01b3c7c3bdb21bed14ea13513b7c/58556/roi-cover.webp 800w,\n/static/021b01b3c7c3bdb21bed14ea13513b7c/99238/roi-cover.webp 1200w,\n/static/021b01b3c7c3bdb21bed14ea13513b7c/f5538/roi-cover.webp 1464w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"The existence of the Border Gateway Routing Protocol or BGP attacks is one of the primary reasons why transferring large volumes of…","fields":{"slug":"/identity/how-to-protect-business-bgp-hijacking/"},"html":"<p>The existence of the Border Gateway Routing Protocol or BGP attacks is one of the primary reasons why transferring large volumes of information across a network is possible today. BGP acts as a post office that analyses the logistics involved in transporting data from one part of the network to the other using the most optimal path. </p>\n<h2 id=\"history-of-bgp-hijacking\" style=\"position:relative;\"><a href=\"#history-of-bgp-hijacking\" aria-label=\"history of bgp hijacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>History of BGP Hijacking</h2>\n<p>Since the early 2000s, hackers have targeted and successfully infiltrated secure networks after hijacking the protocol. Upon gaining control of a network’s BGP, the hackers can redirect files or web traffic to their own devices. </p>\n<p>For example, a major BGP hijacking occurred in April of 2020, where over <a href=\"https://www.manrs.org/2020/04/not-just-another-bgp-hijack/\">8800 prefixes</a> were affected. These prefixes belonged to e-commerce giants like Amazon and Alibaba. This hijacking resulted in the disruption of servers across the world. Moreover, the complete estimate of how much data was infiltrated is still unknown.  </p>\n<p>Even tech giant Google is not immune to these attacks as a Chinese telecom company was allegedly behind the hijacking of 180 prefixes in 2018. Although the attack was small compared to other instances, it still resulted in the disruption of several Google services. This disruption was primarily seen in GSuite and Google search. </p>\n<h2 id=\"best-practices-to-prevent-and-mitigate-bgp-hijacking\" style=\"position:relative;\"><a href=\"#best-practices-to-prevent-and-mitigate-bgp-hijacking\" aria-label=\"best practices to prevent and mitigate bgp hijacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices to Prevent and Mitigate BGP Hijacking</h2>\n<p>BGP can be a liability that enterprises cannot ignore when it comes to <a href=\"https://www.loginradius.com/customer-security/\">enterprise security</a>. This is because it had dedicated security mechanisms in place until recently and instead required a company to put their trust in their ISP unless they maintain their autonomous system. </p>\n<p>In either case, the company or individual will have to ensure that there are measures to prevent or mitigate BGP hijacking. Most enterprises have turned to one of two security options. These include: </p>\n<h3 id=\"1-mutually-agreed-norms-for-routing-manrs\" style=\"position:relative;\"><a href=\"#1-mutually-agreed-norms-for-routing-manrs\" aria-label=\"1 mutually agreed norms for routing manrs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Mutually Agreed Norms For Routing (MANRS)</h3>\n<p>This is one of the more universally accepted routing <a href=\"https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/\">security measures</a> that are in use today. It is essentially a global initiative carried out by operators and enterprises to prevent route hijacking and other forms of DoS attacks. </p>\n<p>According to this initiative, most of the BGP hijacking incidents that have taken place to date occurred as a result of the following: </p>\n<p><strong>Prefix hijacking</strong></p>\n<p>This is the most common type of BGP hijacking, where there is an unauthorized takeover of IP addresses after hackers can corrupt internet routing tables or autonomous systems. </p>\n<p><strong>Route leaks</strong></p>\n<p>A route leak is often described as propagating or making a BGP announcement beyond the intended scope. In other words, the unauthorized party will announce prefixes changing the course of the web traffic to a destination that was not intended. </p>\n<p><strong>IP spoofing</strong></p>\n<p>This takes place when the hacker masquerades their device or entity as a legitimate one to gain access to files by redirecting them to a different IP address. </p>\n<p>To counter this, MANRS recommends implementing the following security measures: </p>\n<p><strong>Filtering</strong></p>\n<p>This measure can be introduced to ensure that the announcement of BGP routes is accurate and belongs to legitimate entities. Therefore, enterprises can secure inbound routing advertisements using prefix-level filters to filter out suspicious IP addresses. </p>\n<p><strong>Coordination:</strong></p>\n<p>This involves maintaining Regional Internet Registries (RIRs) that contain accurate and current contact information like NOC contacts. This will also include imposing authentication and authorization requirements on the maintainers to prevent the spread of misinformation. </p>\n<p><strong>Global validation</strong></p>\n<p>Network operators from around the world will have to release their data so that others can validate the routing information on a global scale. Therefore, this is a publicly documented routing policy for ASNs and prefixes. All information is stored on RIRs. </p>\n<p><strong>Anti-spoofing</strong></p>\n<p>This is a technique that is used to identify and drop information that has false IP addresses. The anti-spoofing filters which are used can deny service to spoofed IP addresses which try to gain access to a network. In most cases, if a packet coming from an external network contains an internal IP address, it gets blocked. </p>\n<p><a href=\"https://www.loginradius.com/resource/why-is-end-user-cyber-security-training-mandatory/\"><img src=\"/4223ac1e5bdbe1835a3d5aaf16ba1e76/WP-cybersecurty-training.webp\" alt=\"WP-cybersecurty-training\"></a></p>\n<h3 id=\"2-rpki-adoption\" style=\"position:relative;\"><a href=\"#2-rpki-adoption\" aria-label=\"2 rpki adoption permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. RPKI adoption</h3>\n<p>MANRS also recommends using Routing <a href=\"https://www.loginradius.com/blog/identity/pki-future-secure-communications/\">Public Key Infrastructure</a>, a security framework used to help internet service providers or operators make more informed decisions with regards to secure routing. </p>\n<p>Its main function is to prove the association between special IP address blocks. Doing so can reduce the occurrence of route leaks and mitigate the blast radius of any BGP hijacking incident.</p>\n<p>However, the only downside of RPKI adoption is that it can be significantly expensive for an ISP or an enterprise to introduce into their network. This is the reason why only a minority of the world’s network adopts an RPKI. </p>\n<h2 id=\"the-bottom-line\" style=\"position:relative;\"><a href=\"#the-bottom-line\" aria-label=\"the bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Bottom Line</h2>\n<p>The reliance on BGP can be a double-edged sword as, on the one hand, it can be extremely convenient, while on the other, it can have major security lapses. However, enterprises and ISPs can drastically reduce the risk of BGP hijacking by adopting the aforementioned safe practices. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-to-protect-business-bgp-hijacking\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 12, 2021","updated_date":null,"description":"The reliance on BGP can be a double-edged sword as, on the one hand, it can be extremely convenient, while on the other, it can have major security lapses. However, enterprises can drastically reduce the risk by adopting the practices mentioned in the blog.","title":"How to Mitigate BGP Attacks and Secure Your User's Data","tags":["enterprise security","cybersecurity"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7391304347826086,"src":"/static/8220c688456ad631244703ae9a6ef340/58556/bgp-attacks.webp","srcSet":"/static/8220c688456ad631244703ae9a6ef340/61e93/bgp-attacks.webp 200w,\n/static/8220c688456ad631244703ae9a6ef340/1f5c5/bgp-attacks.webp 400w,\n/static/8220c688456ad631244703ae9a6ef340/58556/bgp-attacks.webp 800w,\n/static/8220c688456ad631244703ae9a6ef340/cc834/bgp-attacks.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"IT security is becoming an integral part of a business’s overall success amid the digitally advanced ecosystems where security breaches are…","fields":{"slug":"/identity/3-stages-gartner-carta-it-security/"},"html":"<p>IT security is becoming an integral part of a business’s overall success amid the digitally advanced ecosystems where security breaches are just a loophole away. </p>\n<p>CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner in 2017 that helps cybersecurity experts ensure a stringent mechanism to handle vulnerabilities. </p>\n<p>Businesses embarking on a <a href=\"https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/\">digital transformation journey</a> shouldn’t overlook security since data breaches cause losses worth millions of dollars every year and eventually tarnishes brand repute. </p>\n<p>This post will cover all aspects of CARTA and how businesses can implement it to ensure robust cybersecurity. </p>\n<h2 id=\"what-is-carta-how-does-it-benefit-businesses\" style=\"position:relative;\"><a href=\"#what-is-carta-how-does-it-benefit-businesses\" aria-label=\"what is carta how does it benefit businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is CARTA? How Does it Benefit Businesses?</h2>\n<p>Gartner, an information technology (IT) research and consultancy company, introduced CARTA back in 2017. CARTA is an approach built on <a href=\"https://www.loginradius.com/blog/engineering/what-is-adaptive-authentication/\">adaptive security architecture</a> that helps businesses manage risks associated with security. </p>\n<p>CARTA ensures businesses employ a consistent, up-to-date approach to cybersecurity in the ever-increasing digital landscape where we’re interconnected with millions of devices.</p>\n<p>Since digitalization offers endless opportunities and business advancements through efficiency and accessibility, the fact that specific vulnerabilities are associated with it can’t be overlooked. </p>\n<p>Here’s where enterprises need to adopt a robust approach to manage the risks successfully. CARTA allows businesses to make more informed decisions through the degree of trust and depth of a risk. </p>\n<h2 id=\"carta-approach\" style=\"position:relative;\"><a href=\"#carta-approach\" aria-label=\"carta approach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CARTA Approach</h2>\n<p>CARTA stipulates various aspects for cybersecurity and risk management, including: </p>\n<ul>\n<li>Continuous monitoring, assessment, and immediate response for remediation of an underlying risk</li>\n<li>100% device visibility</li>\n<li>Automated control</li>\n<li>Micro-segmentation for containing data breaches </li>\n<li>Adequate security management for IoT devices </li>\n<li>Risk and trust shouldn’t be static </li>\n</ul>\n<h2 id=\"stages-of-it-security-for-implementation-of-carta\" style=\"position:relative;\"><a href=\"#stages-of-it-security-for-implementation-of-carta\" aria-label=\"stages of it security for implementation of carta permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stages of IT Security for Implementation of CARTA</h2>\n<p>According to Gartner, CARTA can be applied in three 3 diverse IT phases to monitor and assess continuously. These include Run, Plan, and Build. </p>\n<p>Let’s understand these phases where businesses can implement CARTA. </p>\n<ul>\n<li><strong>Run:</strong> Organizations utilize intelligent analytics to detect anomalies and to detect the baseline in the run phase. This helps organizations notice and respond to security incidents rapidly without hampering the overall security mechanisms. Automated solutions for the run phase can help enhance evaluations through valuable insights driving more success. </li>\n<li><strong>Build:</strong> Since organizations utilize public libraries for creating personalized, efficient, and updated cybersecurity solutions, CARTA dictates they analyze these libraries for security risks before implementing them carefully. </li>\n<li><strong>Planning:</strong> Before implementing IT security solutions, businesses must carefully focus on their priorities and assets. They must plan their budget and roadmap early to ensure better decisions in the long run. </li>\n</ul>\n<p><strong>Also Download</strong>: <a href=\"https://www.loginradius.com/resource/adaptive-authentication-in-the-age-of-digital-apocalypse/\">Adaptive Authentication in the Age of Digital Apocalypse</a></p>\n<p>In a nutshell, CARTA ensures organizations manage the risks associated with the digital world by emphasizing and developing security mechanisms that are continuously monitoring and assessing every aspect.  </p>\n<p>Through a simplistic view of the digital world, organizations can protect their assets by analyzing what is good and bad well in advance and taking the necessary steps to prevent any harm. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Every business in the digital landscape is prone to several security threats if stringent security measures aren’t in place. </p>\n<p>CARTA’s risk reduction model is <a href=\"https://www.loginradius.com/on-premises-deployment/\">built on the premise</a> that everything should be assessed and monitored and eventually proposes a revolutionary security and risk management mindset for the upcoming decade. </p>\n<p>Hence, businesses striving to implement the best security practices must consider relying on CARTA for enhanced risk management for their organization.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=3-stages-gartner-carta-it-security\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 10, 2021","updated_date":null,"description":"CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner to help cybersecurity experts ensure a stringent mechanism to handle vulnerabilities.","title":"3 Best Stages of IT Security for Implementing Gartner's CARTA","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.639344262295082,"src":"/static/d61f7309ee63ba983095bdd0735a4454/58556/carta.webp","srcSet":"/static/d61f7309ee63ba983095bdd0735a4454/61e93/carta.webp 200w,\n/static/d61f7309ee63ba983095bdd0735a4454/1f5c5/carta.webp 400w,\n/static/d61f7309ee63ba983095bdd0735a4454/58556/carta.webp 800w,\n/static/d61f7309ee63ba983095bdd0735a4454/cc834/carta.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Authentication is a vital process of proving your identity to get access to a network or a resource. And we all go through different…","fields":{"slug":"/identity/authentication-option-for-your-product/"},"html":"<p>Authentication is a vital process of proving your identity to get access to a network or a resource. And we all go through different authentication options each day on various apps and websites. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/identity-proofing/\">Proving your identity</a> is a crucial part of a secure infrastructure where businesses offer a variety of ways to authenticate their consumers.  </p>\n<p>However, when choosing the right authentication option for your product, there’s a lot of confusion and misconceptions that may eventually make it difficult to finalize one or even more. </p>\n<p>Whether it’s social login or email authentication, types of authentication always vary depending on the sensitivity of the data that a user is trying to access. </p>\n<p>But what’s even challenging is to choose the one that not only meets the security requirement and also creates a frictionless user experience at every touchpoint. </p>\n<p>Let’s look at some critical aspects of authentication options and how businesses can make the right choice. </p>\n<h2 id=\"what-is-authentication-why-is-it-important\" style=\"position:relative;\"><a href=\"#what-is-authentication-why-is-it-important\" aria-label=\"what is authentication why is it important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authentication? Why is it Important?</h2>\n<p>Authentication is the process of identifying users and validating who they claim to be. One of the most common and apparent factors to authenticate identity is a password. </p>\n<p>If the user name matches the password credential, the identity is valid, and the system grants access to the user.</p>\n<p>Interestingly, with enterprises going passwordless, many use modern authentication techniques like one-time passcodes (OTP) via SMS, or email, single <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">sign-on (SSO),</a> multi-factor authentication (MFA) and biometrics, etc. authenticate users and deploy security beyond what passwords usually provide.</p>\n<p>Authentication is a must in a risky digital environment where every minute an identity is compromised and exploited. </p>\n<p>Moreover, a little sneak into the business’s network by an unauthorized person impersonating someone else could eventually lead to losses worth millions. Hence, a robust authentication mechanism is the need of the hour. </p>\n<p>Some authentication options are more robust as compared to others. Businesses, depending on their demands, utilize different authentication options to enhance security. </p>\n<h2 id=\"types-of-authentication-options\" style=\"position:relative;\"><a href=\"#types-of-authentication-options\" aria-label=\"types of authentication options permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Authentication Options</h2>\n<p>There are several authentication options available to authenticate users and provide access to resources. </p>\n<p>Since now we understand what authentication is and why it is essential, let’s quickly understand the different types of authentication options available. </p>\n<p><strong>#1. Token Authentication</strong></p>\n<p>A token can be defined as a digitally encoded signature used to authenticate and authorize a user to access specific resources on a network.</p>\n<p>A token is always generated in the form of an OTP (One-Time Password), which depicts that it could only be used once and is generated randomly for every transaction.</p>\n<p>The <a href=\"https://www.loginradius.com/blog/identity/pros-cons-token-authentication/\">token-based authentication</a> allows users to verify their unique identity, and in return, they receive a unique token that provides access to certain resources for a particular time frame.</p>\n<p>A token plays a crucial role in enhancing the overall security mechanism of an organization that helps to deliver flawless and secure authentication and authorization on their website or application.</p>\n<p><strong>#2. Standard Authentication</strong></p>\n<p>Standard authentication is one of the most common and basic authentication options that help users authenticate by entering their credentials using a user id and a password. </p>\n<p>A user needs to set up an individual account on a website or an application using a strong password. </p>\n<p>When combined with the associated user id, this password allows users to access their account/network and access specific resources. </p>\n<p><a href=\"https://www.loginradius.com/authentication/\">Standard authentication</a> is considered to be an outdated form of authentication. It is mainly reinforced by adding another stringent layer of security through multi-factor authentication (MFA), through which a user needs to go through multiple authentication steps to verify their identity. </p>\n<p><strong>#3. Multi-Factor Authentication (MFA)</strong></p>\n<p>Multi-factor authentication (or MFA)  is a multi-layered security system that verifies the identity of users for login or other transactions.</p>\n<p>The user account will remain secure by leveraging multiple authentication layers even if one element is damaged or disabled. And that's the catch!</p>\n<p>Codes generated by smartphone apps, answers to personal security questions, codes sent to an email address, fingerprints, etc., are a few examples of multi-factor authentication implemented in day-to-day scenarios.</p>\n<p><strong>#4. Passwordless Authentication</strong></p>\n<p>A passwordless authentication system swaps the use of a traditional password with more certain factors. These extra-security methods may include a magic link, fingerprint, PIN, or a secret token delivered via email or text message.</p>\n<p>Passwordless login eliminates the need to generate passwords altogether. There’s a lot of good in this new-age process for both users and organizations alike.</p>\n<p>Since one needs not type passwords anymore, it leads to a better screen time experience. While for organizations, it will lead to fewer breaches and support costs.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><img src=\"/f6537cc376e121b52f72b3bae5ae70e5/DS-magic-link-pass.webp\" alt=\"DS-magic-link-pass\"></a></p>\n<p><strong>#5. Social Authentication</strong></p>\n<p>Social login enables users to use existing login credentials from a social networking platform including Facebook, Google, Twitter, and more, enabling simplified logins and registrations.</p>\n<p>Social login eliminates the need to remember passwords for different accounts as they can leverage their social platforms to prove their identity. </p>\n<p>While social login bypasses the conventional registration forms that eventually eat up a lot of time, it also builds credibility on an online service provider that is not asking for your details in a single go.</p>\n<h2 id=\"how-to-decide-the-best-authentication-option-for-your-product\" style=\"position:relative;\"><a href=\"#how-to-decide-the-best-authentication-option-for-your-product\" aria-label=\"how to decide the best authentication option for your product permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Decide the Best Authentication Option for Your Product?</h2>\n<p>Since we know there are several ways to authenticate users and to ensure that the right people have access to the information, security and usability are the crucial aspects that determine the effectiveness of an authentication method. </p>\n<p>However, security without user experience is of no use as users demand a seamless user experience every time they wish to sign-up or log in to their accounts. </p>\n<p>Hence, the traditional password-based authentication methods seem outdated and of no practical use. </p>\n<p>Businesses seeking substantial business growth must rely on friction-less authentication methods like Passwordless Authentication and <a href=\"https://www.loginradius.com/social-login/\">Social Authentication</a> so that their users can seamlessly authenticate. </p>\n<h2 id=\"why-choose-loginradius-as-your-authentication-partner\" style=\"position:relative;\"><a href=\"#why-choose-loginradius-as-your-authentication-partner\" aria-label=\"why choose loginradius as your authentication partner permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Choose LoginRadius as Your Authentication Partner?</h2>\n<p>LoginRadius offers cutting-edge ways to provide seamless registration and authentication for your customers.</p>\n<p>The future-ready CIAM (consumer identity and access management) solution gives them a hassle-free way to access their accounts—with no passwords needed! </p>\n<p>The LoginRadius Identity Platform is an out-of-the-box way for you to do this easily. Our CIAM is fully customizable, too, so you can simplify your customer experience to suit your company’s needs. Here are some great <a href=\"https://www.loginradius.com/blog/identity/best-idaas-provider-loginradius/\">reasons to choose LoginRadius</a>:</p>\n<ul>\n<li>No Code Authentication</li>\n<li>100% Uptime</li>\n<li>35 Data Centers</li>\n<li>Highest Peak Load Capacity (180K Logins/Sec)</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In a competitive digital business landscape where user experience and security go hand-in-hand, reliable authentication methods become crucial. </p>\n<p>Businesses need to understand that besides the best security practices, they also need to ensure a seamless user experience while interacting with their platform. </p>\n<p>LoginRadius understands the importance of frictionless authentication and helps businesses ensure adequate security without hampering user experience. </p>\n<p>With LoginRadius’ Passwordless Authentication and Social Authentication, businesses can ensure the highest level of security coupled with a flawless user experience while they prove their identity.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=authentication-option-for-your-product\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"Book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 08, 2021","updated_date":null,"description":"When choosing the right authentication option for your product, there’s a lot of confusion and misconceptions that may eventually make it difficult to finalize one or even more.","title":"How to Choose the Right User Authentication Option for your Product","tags":["data security","passwordless login","authentication","mfa"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7391304347826086,"src":"/static/772e4733966a05f69479c1b9bce7fd77/58556/user-authentication.webp","srcSet":"/static/772e4733966a05f69479c1b9bce7fd77/61e93/user-authentication.webp 200w,\n/static/772e4733966a05f69479c1b9bce7fd77/1f5c5/user-authentication.webp 400w,\n/static/772e4733966a05f69479c1b9bce7fd77/58556/user-authentication.webp 800w,\n/static/772e4733966a05f69479c1b9bce7fd77/cc834/user-authentication.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Open banking has revolutionized the way we use conventional banking as it offers endless possibilities for consumers requiring transactions…","fields":{"slug":"/identity/financial-grade-api-open-banking/"},"html":"<p>Open banking has revolutionized the way we use conventional banking as it offers endless possibilities for consumers requiring transactions and other financial data from third-party service providers. </p>\n<p>With open banking, consumers can leverage bank accounts information and data networking across diverse institutions through APIs (application programming interfaces), which has reshaped the entire banking industry. </p>\n<p>When it comes to <a href=\"https://www.loginradius.com/blog/identity/account-security-consumers/\">securing consumer data</a> and critical information regarding banks and other financial institutions, FAPI (financial grade API) becomes the need of the hour. </p>\n<p>In a nutshell, open banking is reinforced and strengthened through FAPI, a security framework offered through OpenID Foundation providing technical guidance and essential requirements for secure use of APIs in financial services. </p>\n<p>Let’s understand the role of FAPI and how it supports open banking for a flawless banking experience on third-party platforms. </p>\n<h2 id=\"what-is-open-banking\" style=\"position:relative;\"><a href=\"#what-is-open-banking\" aria-label=\"what is open banking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Open Banking?</h2>\n<p>Suppose you’re not familiar with the term “open banking”. In that case,- it’s an umbrella term used to describe access and control of consumers’ personal and financial data for third-party service providers to carry out transactions and other related activities based on consumers’ financial information. </p>\n<p>Consumers are required to grant consent to let their bank allow such access by carefully going through the policies describing the use of their banking data in a way that doesn’t exploit their identity, finances, and financial information. </p>\n<p>Third-party vendors can leverage consumer financial information through their banks once the <a href=\"https://www.loginradius.com/consent-management/\">consumer gives them consent</a>. The vendor accesses the information through integrated APIs. </p>\n<h2 id=\"what-is-fapi\" style=\"position:relative;\"><a href=\"#what-is-fapi\" aria-label=\"what is fapi permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is FAPI?</h2>\n<p>Financial grade API can be defined as a security framework powered by OpenID Foundation that ensures safe use of APIs in the financial industry by offering technical guidance and other essential protocols. </p>\n<p>Security becomes a primary concern when it comes to processing consumer banking information for third-party vendors. FAPI offers pioneered industry standards since its the part of OpenID Foundation, which eventually helps organizations securely leverage APIs in the banking sector. </p>\n<h2 id=\"what-is-openid-connect-oidc\" style=\"position:relative;\"><a href=\"#what-is-openid-connect-oidc\" aria-label=\"what is openid connect oidc permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is OpenID Connect (OIDC)?</h2>\n<p>It is an OpenID Foundation (OIDF) standard that leverage OAuth 2.0 process flow to add an identity layer to obtain basic profile information about the End-User in an interoperable and REST-like manner or verify the identity of the End-User based on the authentication done by an Authorization Server or Identity Provider (IDP).</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-openid-connect/\">OpenID Connect</a> supports clients of all types, including web-based, mobile, and JavaScript clients, to request and receive information about authenticated sessions and end-users. </p>\n<p>By implementing OpenID Connect, leveraging OAuth 2.0 fabricates a unified framework that promises mobile native applications, secure APIs, and browser applications in a single, cohesive architecture.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-to-secure-api-using-oauth2\"><img src=\"/e57d40c6a8ae3c85e61f25b0a7c025a9/WP-digitization.webp\" alt=\"WP-digitization\"></a></p>\n<h2 id=\"risks-associated-with-open-banking\" style=\"position:relative;\"><a href=\"#risks-associated-with-open-banking\" aria-label=\"risks associated with open banking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risks Associated with Open Banking</h2>\n<p>Though open banking offers endless opportunities to different organizations, including financial institutions and non-financial organizations, the risks associated with open banking can’t be overlooked. </p>\n<p>Open banking poses a threat to financial privacy and increases risks associated with consumers’ finances since its APIs aren’t secured without stringent policies and access control. </p>\n<p>Organizations handling heaps of consumers’ banking data are always on the verge of a data breach due to poor security or inside threats that may lead to the exploitation of consumers’ sensitive information. </p>\n<h2 id=\"why-fapi-matters-for-open-banking\" style=\"position:relative;\"><a href=\"#why-fapi-matters-for-open-banking\" aria-label=\"why fapi matters for open banking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why FAPI Matters for Open Banking?</h2>\n<p>FAPI paves the path for secure handling of consumer banking information required by third-party service providers to deliver consumer-rich experiences while transacting and in other similar activities regarding API security best practices. </p>\n<p>Since FAPI isn't a common security and API-related term, most people confuse it with protocols required to carry out transactions related to consumers’ banking information. However, FAPI eventually closes all the OIDC and OAuth 2.0 loopholes by bridging the gap between the end-user, client, and API endpoint. </p>\n<p>The need for FAPI has recently increased since carrying out banking-related transactions requires stringent security mechanisms to secure consumer information and ensure banks’ sensitive data isn’t compromised. </p>\n<h2 id=\"how-fapi-improves-openid-and-oauth-20\" style=\"position:relative;\"><a href=\"#how-fapi-improves-openid-and-oauth-20\" aria-label=\"how fapi improves openid and oauth 20 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How FAPI Improves OpenID and OAuth 2.0?</h2>\n<p>Since FAPI offers technical specifications to scale diverse APIs through improved OpenID Connect and OAuth 2.0 processes, both of them provide enhanced security features uniquely when combined with robust FAPI guidelines. </p>\n<p>Now, as we know, <a href=\"/blog/identity/oauth2-0-guide/\">OAuth 2.0</a> is an authorization protocol, which offers third-party applications delegated access to an HTTP resource securely; OpenIDto Connect seamlessly builds another stringent security layer. Both of them work harmoniously to authenticate through the OAuth authorization server. </p>\n<p>As we know, online banking services require stringent security; FAPI helps secure financial APIs by flawlessly binding the end-user, client, and endpoint. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Open banking is paving the way for the next generation of digital experiences, especially when managing transactions and expenses. </p>\n<p>However, the risks associated with open banking require organizations to put their best foot forward in adopting FAPI through a reliable service provider that helps enhance API integration security.  </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=financial-grade-api-open-banking\"><img src=\"/1bebf239d110701b9b534d7eb481a5ac/BD-Plexicon1-1024x310.webp\" alt=\"book a demo loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 27, 2021","updated_date":null,"description":"With open banking, consumers can leverage bank accounts and data networking across diverse institutions through APIs (application programming interfaces), which has reshaped the entire banking industry. However, when it comes to the overall security mechanism of open banking, FAPI becomes the need of the hour.","title":"An Introduction to Financial-Grade API (FAPI) for Open Banking","tags":["data security","oauth","mfa"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8181818181818181,"src":"/static/8a50dfb3979467c87e899540bf102593/58556/fapi-cover.webp","srcSet":"/static/8a50dfb3979467c87e899540bf102593/61e93/fapi-cover.webp 200w,\n/static/8a50dfb3979467c87e899540bf102593/1f5c5/fapi-cover.webp 400w,\n/static/8a50dfb3979467c87e899540bf102593/58556/fapi-cover.webp 800w,\n/static/8a50dfb3979467c87e899540bf102593/cc834/fapi-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"With the rising number of cyber threats, effective data encryption becomes crucial for any business regardless of the size and industry type…","fields":{"slug":"/identity/pki-future-secure-communications/"},"html":"<p>With the rising number of cyber threats, effective data encryption becomes crucial for any business regardless of the size and industry type. </p>\n<p>One of the essential methods to secure communication and mitigate data breaches is utilizing public key infrastructure (PKI). </p>\n<p>PKI is a common term used to describe everything used to manage and establish public-key encryption, which is fast becoming the <a href=\"https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/\">best way to secure internet encryption</a>. </p>\n<p>With PKI, one can ensure that data is adequately encrypted during the transit, ensuring only the authorized user can access the data.</p>\n<p>However, many businesses aren’t yet leveraging this technique and could be on the verge of compromising their crucial business data or sensitive consumer information. </p>\n<p>Since PKI helps authenticate the identity of the users or devices communicating with each other, the chances of a data breach become negligible. </p>\n<p>Let’s understand what PKI is and how it’s paving the path for the secure encryption for businesses embarking on a journey to transform themselves digitally. </p>\n<h2 id=\"what-is-pki\" style=\"position:relative;\"><a href=\"#what-is-pki\" aria-label=\"what is pki permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is PKI</h2>\n<p>Public key infrastructure (PKI) can be defined as a framework that enables proper encryption of all the public keys, including their affiliated crypto-mechanisms. </p>\n<p>The overall mechanism of PKI is set to efficiently and securely manage keys along with certificates associated with it, which eventually creates a highly secure environment for both applications and devices. </p>\n<h2 id=\"where-is-it-used\" style=\"position:relative;\"><a href=\"#where-is-it-used\" aria-label=\"where is it used permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Where is It Used</h2>\n<p>PKI is one of the most reliable ways to <a href=\"https://www.loginradius.com/blog/fuel/good-transaction-security/\">secure online transactions</a> as it establishes the identity of two or more endpoints on a network. </p>\n<p>Businesses leveraging cloud services have a massive risk essential by unauthorized professionals or cybercriminals. Through the PKI technique, the flow of data through the network’s communication channels is encrypted. Only authorized users can access the same, eliminating any chances of sneak. </p>\n<p>Since we’re living in a digitally advanced world where data breaches and data leaks are quickly becoming the new normal, the critical role of PKI cannot be overlooked. PKI utilizes private keys and public keys for encryption and decryption, respectively, by leveraging digital certificates. </p>\n<p>Whether we talk about artificial intelligence or the Internet of Things, millions of devices are communicating with each other and granting and asking for access to specific resources. </p>\n<p>Business owners relying on third-party technology vendors aren’t aware of this communication between devices, which is perhaps why there’s a massive risk for enterprises leveraging cloud services. </p>\n<p>Suppose a cloud vendor isn’t compliant with security and data privacy regulations. In that case, the chances are that their consumers, i.e., enterprises, may face the consequences of data breach and brand tarnishing. </p>\n<p>Hence, businesses must ensure that they’re utilizing modern encryption techniques whenever they’re storing and managing their data, primarily through cloud deployments. </p>\n<h2 id=\"where-can-you-apply-pki\" style=\"position:relative;\"><a href=\"#where-can-you-apply-pki\" aria-label=\"where can you apply pki permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Where Can You Apply PKI</h2>\n<p>Enterprises can leverage the true potential of PKI through several ways in their daily processes when it comes to secure data transfer. Here’s the list: </p>\n<ul>\n<li>Secure web browsing through SSL (Secure Sockets Layer) or TLS (Transport Layer Security)</li>\n<li>Secure authentication </li>\n<li>Secure code-signing </li>\n<li>Email security for encrypting messages</li>\n<li>File security through encrypted file systems </li>\n<li>Secure Browsing (via SSL/TLS)</li>\n</ul>\n<h2 id=\"why-is-pki-the-future-of-secure-communications-in-2021-and-beyond\" style=\"position:relative;\"><a href=\"#why-is-pki-the-future-of-secure-communications-in-2021-and-beyond\" aria-label=\"why is pki the future of secure communications in 2021 and beyond permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is PKI the Future of Secure Communications in 2021 and Beyond</h2>\n<h3 id=\"1-minimized-frauds\" style=\"position:relative;\"><a href=\"#1-minimized-frauds\" aria-label=\"1 minimized frauds permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Minimized frauds</h3>\n<p>Since PKI authenticates the identity of users accessing the information or resources, it significantly reduces the chances of a data breach. </p>\n<p>Through the two-key encryption systems, data is passed back and forth between two parties, and they both have a key to decrypt and encrypt the digital data. The one with the right key could access the data, which eventually mitigates the risk of a data breach during transit. </p>\n<h3 id=\"2-authentication-of-devices-users\" style=\"position:relative;\"><a href=\"#2-authentication-of-devices-users\" aria-label=\"2 authentication of devices users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Authentication of devices/ users</h3>\n<p>One of the most important aspects of PKI with regards to security is the <a href=\"https://www.loginradius.com/authentication/\">secure authentication</a> of users and machines on a network. </p>\n<p>Robust authentication mechanisms like PKI ensure that the devices and users are the ones they claim to be and not any unauthorized professional impersonating any other user. </p>\n<h3 id=\"3-to-enable-single-sign-on\" style=\"position:relative;\"><a href=\"#3-to-enable-single-sign-on\" aria-label=\"3 to enable single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. To enable Single Sign-On</h3>\n<p>Businesses can leverage the true potential of PKI through Single Sign-On. Though PKI isn’t an SSO service through specific alterations, enterprises can also benefit from Single Sign-On through PKI. </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><img src=\"/970abf5b3c4e78379ad5bf97a519b62c/DS-SSO.webp\" alt=\"DS-SSO\"></a></p>\n<h3 id=\"4-highly-scalable\" style=\"position:relative;\"><a href=\"#4-highly-scalable\" aria-label=\"4 highly scalable permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Highly scalable</h3>\n<p>PKI is highly scalable when it comes to handling a massive number of users that are transacting simultaneously. </p>\n<p>With PKI, users maintain their security certificates and certificate authentication involving data exchange between a server and client only. Hence, the need for a third-party authentication server has vanished, which is why there’s no limit to the number of users supported using the PKI. </p>\n<h3 id=\"5-to-meet-compliance\" style=\"position:relative;\"><a href=\"#5-to-meet-compliance\" aria-label=\"5 to meet compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. To meet compliance</h3>\n<p>Different countries have set additional regulations when it comes to data storage, transfer, and collection. PKI helps businesses ensure they remain compliant with various data security and privacy regulations across the world.</p>\n<p>No matter where they’re storing or transferring data, they can always stay compliant with government regulations with PKI.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Since the number of data breaches is surging day by day and consumer data is continuously at risk, businesses need to adopt the next level of secure infrastructure that not only offers regulatory compliance but eventually safeguards sensitive business and consumer data. </p>\n<p>PKI is a game-changer when it comes to managing secure access between devices and users without any hassle. Businesses can add <a href=\"https://www.loginradius.com/blog/identity/multi-factor-authentication-a-beginners-guide/\">another stringent layer of security</a> to their business process by implementing public key infrastructure. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=pki-future-secure-communications\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 26, 2021","updated_date":null,"description":"With PKI, one can ensure that data is adequately encrypted during transit, ensuring only the authorized user can access the data. Let’s understand what PKI is and how it paves the path for secure encryption for businesses.","title":"Why is PKI The Future of Secure Communications","tags":["single sign-on","sso","authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.694915254237288,"src":"/static/0b337c309257fcbb6d7601f5431bd2d9/58556/pki-cover.webp","srcSet":"/static/0b337c309257fcbb6d7601f5431bd2d9/61e93/pki-cover.webp 200w,\n/static/0b337c309257fcbb6d7601f5431bd2d9/1f5c5/pki-cover.webp 400w,\n/static/0b337c309257fcbb6d7601f5431bd2d9/58556/pki-cover.webp 800w,\n/static/0b337c309257fcbb6d7601f5431bd2d9/cc834/pki-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":210,"currentPage":36,"type":"//identity//","numPages":72,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}