{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/64","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"LoginRadius is happy to announce that we have a new logo now.  Yes! We loved the old one, but we decided to upgrade it as part of our ever…","fields":{"slug":"/identity/announcing-new-look-of-loginradius/"},"html":"<p>LoginRadius is happy to announce that we have a new logo now. </p>\n<p>Yes! We loved the old one, but we decided to upgrade it as part of our ever-evolving branding metrics. After all, progress is impossible without change. </p>\n<p>So, here’s our new look.</p>\n<p><img src=\"/4d9e15e17d42c355ead62634f20c5608/loginradius-logo-horizontal-full-colour-on-white-1024x211.webp\" alt=\"LoginRadius Logo\"></p>\n<p>As a leader in cloud-based Customer Identity and Access Management (CIAM) solution that the following two core principles are reflected in the branding:</p>\n<p><strong>Putting users at the center</strong></p>\n<p>Our platform is all about consumer-brand relationships and to strengthen the relationship we believe we need to put the consumer at the center. So, everything we design and develop, we keep the very end-users i.e. your consumers at the centre. </p>\n<p>Our first priority is to benefit them -- giving them peace of mind by protecting their data, account and privacy; and offering them a delightful experience.</p>\n<p><strong>Security is the foundation of our business</strong></p>\n<p>Security is not a feature but the foundation of our business. Protecting consumers’ data, account and privacy is the most important function of our business and platform. We and our customers never compromise on security. Period.</p>\n<h2 id=\"intend-behind-the-change\" style=\"position:relative;\"><a href=\"#intend-behind-the-change\" aria-label=\"intend behind the change permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind The Change</h2>\n<p>Over the years, LoginRadius has exponentially grown from a simple social login provider to an industry-leading customer identity and access management (CIAM) platform. </p>\n<p>Therefore, it is important that we align our designing goals to reflect how we serve our customers, what our milestones are and most importantly, symbolize our future on what more do we intend to achieve.</p>\n<p>Keeping designing and user experience at the core of innovation, our creative thinkers came up with a logo that is crisp, smart, minimalistic and feels connected.</p>\n<p>Needless to say, they got exactly what we intended to project out to the world – user-centric CIAM platform with a strong security foundation.</p>\n<h2 id=\"what-has-changed\" style=\"position:relative;\"><a href=\"#what-has-changed\" aria-label=\"what has changed permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Has Changed?</h2>\n<p>First, we would like to take a moment to highlight the retirement of our current logo. After all, it had been serving the spirit of LoginRadius since our inception. </p>\n<p>Fast-forward to the present day, the new logo marks a crucial milestone towards representing our brand-building process.</p>\n<p><img src=\"/16753b4de5d78741baf37b75afe3b390/logo-1024x991.webp\" alt=\"LoginRadius Brandmark\"></p>\n<ul>\n<li><strong>Brandmark</strong>:  It comprises two concentric circles. Most obvious is the negative space showing a keyhole which is also a literal radius from the centre to the outer edge. The keyhole represents robust security foundation of our platform. It can also be seen as a user icon, protected by white arms implied by the negative space and by the light blue circle. This demonstrates our philosophy of putting the user at the centre of everything. Both of these ideas speak to the concept of protecting identity.</li>\n<li><strong>Typeface:</strong> Our creative team made a unanimous decision to create a modern typeface that embodies our vision and is strong enough to sustain on its own. Therefore, we thickened the font with solid letters to give more presence to the brand. </li>\n<li><strong>Color</strong>: Colors are an important aspect of our brand personality. Our core colour palette consists of two primary colours viz. tarren blue and cosmic blue. They help to reinforce feelings of safety and confidence towards customer identity.</li>\n</ul>\n<p>Letting go of our core designing heritage was never our objective. Our color palette is the testimony of what we have been for our customers and promotes authenticity in every form.</p>\n<h2 id=\"logo-color-combinations\" style=\"position:relative;\"><a href=\"#logo-color-combinations\" aria-label=\"logo color combinations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Logo Color Combinations</h2>\n<p><img src=\"/45425ade83137235c58f51ddcfe288d9/logo-2-1024x589.webp\"></p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>The new logo is an attempt at modernizing our brand and helping it connect more with our customers. </p>\n<p>Amidst the huge chunk of workload that rebranding brings along, we are super thrilled to share this news and would like to take a moment to thank our loyal customer base. Do share your comments about the change.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=announcing-new-look-of-loginradius\"><img src=\"/d98399eb71bd29d9efc50cedf469c114/CTA-Graphics-for-Blogs-V03.01-05-2-1024x310.webp\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 25, 2020","updated_date":null,"description":"LoginRadius is delighted to announce that we now have a new logo.","title":"Announcing New Look of LoginRadius","tags":["LoginRadius","industry-news"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/b196244089e513074aca00b6736f8973/c0524/Announcing-New-Look-of-LoginRadius.webp","srcSet":"/static/b196244089e513074aca00b6736f8973/61e93/Announcing-New-Look-of-LoginRadius.webp 200w,\n/static/b196244089e513074aca00b6736f8973/1f5c5/Announcing-New-Look-of-LoginRadius.webp 400w,\n/static/b196244089e513074aca00b6736f8973/c0524/Announcing-New-Look-of-LoginRadius.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"COVID-19 is a global epidemic that demands decisive and robust action. Following the announcement by the World Health Organization (WHO) to…","fields":{"slug":"/identity/loginradius-business-continuity-covid-19-outbreak/"},"html":"<p><em>COVID-19 is a global epidemic that demands decisive and robust action.</em></p>\n<p>Following the announcement by the World Health Organization (WHO) to address the <a href=\"https://www.who.int/emergencies/diseases/novel-coronavirus-2019/events-as-they-happen\">coronavirus (COVID-19) threat as a pandemic</a>, organizations across the globe are looking to their Business Continuity Management (BCM) plan to make sure they are covered.</p>\n<p>For LoginRadius, as a SaaS-based customer identity platform,  planning ahead to counter any disruption has always been an essential aspect of its resilience program. </p>\n<p>Consequently, we have put our contingency plan to action to fight the current and future risks to our business, and our customers' businesses, due to the COVID-19 outbreak.</p>\n<h2 id=\"mitigating-risk-by-loginradius\" style=\"position:relative;\"><a href=\"#mitigating-risk-by-loginradius\" aria-label=\"mitigating risk by loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mitigating Risk by LoginRadius</h2>\n<p>As the developing situation changes with respect to world health outlook, we have outlined three key areas to ensure our readiness towards workplace mitigation. They include:</p>\n<ul>\n<li>Employee health and safety</li>\n<li>Service operations</li>\n<li>Business operations</li>\n</ul>\n<p>Thereafter, we are prepared to react accordingly to ensure business continuity. Here’s what our plan looks like:</p>\n<p><strong>Employee Health and Safety</strong></p>\n<p>We are mindful of our employees and are up to date on the officially mandated actions related to hygiene and safety at our workstations. Likewise, we have rolled out the following policies:</p>\n<ul>\n<li>Hand-washing policy and education:  We have trained our staff on proper, effective hygiene practices for reducing the risk of contracting or spreading the virus. </li>\n<li>Travel restrictions, guidelines, and recommendations - We have limited all non-essential business travel and travel to designated high-risk regions. </li>\n<li>Remote Workforce - Phase 1: We have allowed optional, voluntary work from home. This measure is already in place. All staff in all locations have the autonomy and flexibility to work remotely to help mitigate the risk of exposure from public transit and closed communal spaces.</li>\n<li>Remote Workforce - Phase 2: We will impose mandatory work from home. If mandated by the government or regulatory bodies, or implemented by LoginRadius management, we are prepared for mandatory full-time remote work. We have already tested this measure and are to enact it as needed.</li>\n<li>We have installed multiple hand sanitizers within the office premises. </li>\n<li>We ensure frequent cleaning and sanitization of our workplaces. </li>\n<li>We have increased space between employees' workstations.</li>\n</ul>\n<p><strong>Service Operations</strong></p>\n<p>As an automated, fully cloud-based software solution redundantly hosted on industry-leading infrastructure providers like Amazon Web Services and Microsoft Azure, the LoginRadius platform is inherently insulated from the business and commercial impacts of the virus. </p>\n<p>This includes impacts from regional staffing and manpower shortages or disruptions in global supply chains.</p>\n<p>We have been working for several weeks with impromptu and scheduled drills to help ensure that operations run without disruption in the eventuality of an outbreak or other critical event which may impact our organization.</p>\n<p><strong>Business Operations</strong></p>\n<p>Similarly, we have rolled out remote working policies for all LoginRadius team members. Employees can work offsite as they would on-premises, guaranteeing no disruption to business operations, including our customer-facing sales, customer success, support, and account management teams.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>We place the highest value on the partnerships that we've established with our customers and stakeholders. Rest assured, we are committed to ensuring uninterrupted success, even in times of hardship and challenges.</p>\n<p>In the end, we wish our customers health, security, and good fortune.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=loginradius-business-continuity-covid-19-outbreak\"><img src=\"/d98399eb71bd29d9efc50cedf469c114/CTA-Graphics-for-Blogs-V03.01-05-3-1024x310.webp\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 17, 2020","updated_date":null,"description":"COVID-19 is a global epidemic which demands action that is decisive and robust.","title":"LoginRadius Announces Its Business Continuity Plan to Fight COVID-19 Outbreak","tags":["LoginRadius","industry-news"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/cbe783d369681847892f38c91f3084cf/c0524/loginradius-business-continuity.webp","srcSet":"/static/cbe783d369681847892f38c91f3084cf/61e93/loginradius-business-continuity.webp 200w,\n/static/cbe783d369681847892f38c91f3084cf/1f5c5/loginradius-business-continuity.webp 400w,\n/static/cbe783d369681847892f38c91f3084cf/c0524/loginradius-business-continuity.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"With population growth and municipal services expanding, cities need to get creative on how to provide services to all citizens without…","fields":{"slug":"/identity/unlock-the-future-of-smart-cities/"},"html":"<p>With population growth and municipal services expanding, cities need to get creative on how to provide services to all citizens without compromising the quality of service. A single platform is needed where all services are centralized and customer experience is taken into account. Below, we’ll look at some examples and best practices for municipalities to follow. </p>\n<p>As digital transformation transforms everyday life and interactions, cities are looking for ways to offer their services through online platforms. Cities are becoming “smarter” not to jump onto the technology bandwagon but in order to increase citizen engagement and serve them better. </p>\n<p>Residents are accustomed to 24/7, anywhere access to consumer products and services, and this expectation has bled over into government and municipal services. That’s why utility companies are also adapting their business models to work with new digital technology.</p>\n<p><a href=\"https://www.loginradius.com/registration-and-authentication/\">The LoginRadius Citizen Identity Platform</a> helps cities overcome these obstacles in three ways: </p>\n<ol>\n<li>\n<p>Centralizing online services: Cities need one unified self-service portal so that their constituents have a seamless, efficient experience as they access the services they need. The LoginRadius Identity Platform enables cities to centralize their customer-facing digital applications into one portal.  </p>\n<p>This single locus of access delivers a connected experience across multiple touchpoints and channels. LoginRadius has supported applications such as Account Summary, Customer Profile, Permit Applications and Bill Payment.   </p>\n</li>\n<li>\n<p>Helping maintain one digital identity across all customer service: What good is a centralized portal if citizens have to create multiple identities for individual web and mobile applications? Operating in this way creates identity silos that prevent a thorough view of the customer’s journey and preferences, which means the customer experience can’t be optimized for each individual.  </p>\n<p>Without a seamless user experience, engagement rates drop. But with <a href=\"https://www.loginradius.com/single-sign-on/\">LoginRadius Single Sign-on (SSO),</a> cities and companies can allow customers to access all applications within their platform with a single set of unified credentials, rather than having to separately register and log in to each service.   </p>\n</li>\n<li>\n<p>Integrating with third-party applications: Many public sector organizations have a hard time using customer data to improve the digital experience. The LoginRadius Identity Platform offers prebuilt integrations with over 150 third-party applications such as CRM, email marketing tools, online communities, payment systems and more.  </p>\n<p>This enables organizations to use that customer data to better understand their customers, offer more useful information and deliver that information more directly.</p>\n</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/surrey-case-study\"><img src=\"/bbdf68efa8208887cb39f258ae65c4e5/CS-My-City-MySurrey-1024x310.webp\"></a></p>\n<p>The City of Surrey offers a great real-world example of what our Identity Platform can do. This bustling city in Metro Vancouver, British Columbia welcomes approximately 1,500 new residents per month – all in need of municipal services. The City was not able to expand its physical offices or add staff, so the solution was to move all services online.</p>\n<p>We’ve created a case study to show you how the LoginRadius Identity Platform helped the City of Surrey transform its online services and unlock its future as a smart city.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=unlock-the-future-of-smart-cities\"><img src=\"/1bebf239d110701b9b534d7eb481a5ac/Book-a-demo-1024x310.webp\" alt=\"Book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 13, 2020","updated_date":null,"description":"With population growth and the expansion of public services, cities need to be innovative about how to provide services to all people without compromising service quality. There is a need for a single platform where all facilities are centralised and customer experience is considered. Below, for municipalities to follow, we'll look at some examples and best practises.","title":"Unlock the Future of Smart Cities","tags":["digital transformation","digital identity","sso"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/e1e2d4dfaf4314477f919d890c2a6cdd/7f8e9/future-of-smart-cities.webp","srcSet":"/static/e1e2d4dfaf4314477f919d890c2a6cdd/61e93/future-of-smart-cities.webp 200w,\n/static/e1e2d4dfaf4314477f919d890c2a6cdd/1f5c5/future-of-smart-cities.webp 400w,\n/static/e1e2d4dfaf4314477f919d890c2a6cdd/7f8e9/future-of-smart-cities.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"As the risk of data abuse is on the rise, more and more companies are seeking to adhere to the existing data privacy and regulatory…","fields":{"slug":"/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/"},"html":"<p>As the risk of data abuse is on the rise, more and more companies are seeking to adhere to the existing data privacy and regulatory compliances. </p>\n<p>From the EU’s General Data Protection Regulation (GDPR) to the recently released California's Consumer Privacy Act (CCPA), each regulation has a unique strategic imperative. </p>\n<ul>\n<li>The European Union’s GDPR came into force on May 25, 2018, to protect the personally identifiable information (PII) of its citizens. </li>\n<li>Likewise, on January 1, 2020, the California Consumer Privacy Act (CCPA) went live, affecting millions of companies with its share of new consumer rights.</li>\n</ul>\n<p>Businesses cannot afford to ignore these new policies. From a financial point of view, the  <a href=\"https://www.itgovernance.co.uk/dpa-and-gdpr-penalties\">European supervisory authorities</a> imposed as many as 133 administrative penalties by the end of 2019, which sums up to a massive fine of approximately €400 million (£337 million).</p>\n<p>Businesses need to understand that customers are the sole drivers of the economy, and a trusted relationship with them will lead to loyalty and boosted revenue generation.</p>\n<p>On a similar note, enterprises are often curious if LoginRadius, as a customer identity and access management (CIAM) platform, meets regulatory requirements of the popular data protection laws.</p>\n<p>Well yes, it does.</p>\n<p>Not just the infamous GDPR, LoginRadius also helps enterprises adhere to the recently active <a href=\"https://www.loginradius.com/blog/2019/05/ccpa-introduction/\">California Consumer Privacy Act (CCPA)</a>.</p>\n<p>But before we go any further, let’s understand a few things about the CIAM platform and the CCPA compliance.</p>\n<h2 id=\"what-does-it-take-to-make-the-perfect-ciam-platform\" style=\"position:relative;\"><a href=\"#what-does-it-take-to-make-the-perfect-ciam-platform\" aria-label=\"what does it take to make the perfect ciam platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What does it take to make the perfect CIAM platform?</h2>\n<p>Well, the driving force of CIAM lies in its ability to use data security as a tool for offering seamless customer experiences. </p>\n<p>Customer Identity and Access Management (CIAM) is a relatively new customer-focused business solution that collects, manages, and provides a secure and seamless access to customer's personal data.</p>\n<p>An ideal <a href=\"https://www.loginradius.com/blog/2019/06/perfect-ciam-platform/\">customer identity management platform</a> should include all the crucial components that drives an enterprise – from customers, suppliers, contractors, partners, employees to systems, applications, and devices.</p>\n<h2 id=\"what-is-the-california-consumer-privacy-act-ccpa\" style=\"position:relative;\"><a href=\"#what-is-the-california-consumer-privacy-act-ccpa\" aria-label=\"what is the california consumer privacy act ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is the California Consumer Privacy Act (CCPA)?</h2>\n<p>The California Consumer Privacy Act is a relatively new consumer privacy right enacted by the State of California. It comprises groundbreaking laws relating to contemporary business practices and the role of citizens in securing their personal data in the Golden State.</p>\n<p><a href=\"https://www.loginradius.com/gdpr-and-privacy/\">Like the GDPR</a>, these new regulations apply not only to California businesses but to all the companies that do business in the state.</p>\n<h3 id=\"what-does-the-ccpa-offer\" style=\"position:relative;\"><a href=\"#what-does-the-ccpa-offer\" aria-label=\"what does the ccpa offer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What does the CCPA offer?</h3>\n<ul>\n<li><strong>Ownership:</strong> Under CCPA, consumers will have the right to know what information businesses collect about them, and if need be, restrict them from sharing or selling their personal data.</li>\n<li><strong>No discrimination:</strong> CCPA does not allow businesses to discriminate against consumers who haven't approved of selling their data. Consequently, enterprises cannot impose additional charges or offer services with low quality to those consumers.</li>\n<li><strong>Security and protection:</strong> Under CCPA, companies are accountable for protecting the personal information of its consumers against potential data breaches.</li>\n</ul>\n<h3 id=\"what-rights-do-consumers-enjoy-under-ccpa\" style=\"position:relative;\"><a href=\"#what-rights-do-consumers-enjoy-under-ccpa\" aria-label=\"what rights do consumers enjoy under ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What rights do consumers enjoy under CCPA?</h3>\n<p><img src=\"/b52156ac4caa52f86783255735cc19e0/image2.webp\" alt=\"5 consumer rights under ccpa\"></p>\n<h3 id=\"what-data-is-considered-personal-under-the-ccpa\" style=\"position:relative;\"><a href=\"#what-data-is-considered-personal-under-the-ccpa\" aria-label=\"what data is considered personal under the ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What data is considered personal under the CCPA?</h3>\n<ul>\n<li><strong>Direct identifiers</strong> like name, address, e-mail id, social security numbers, passport information, driver's license, and signature.</li>\n<li><strong>Unique identifiers</strong> like IP addresses, account id, cookies, pixel tags, beacons, and telephone numbers. </li>\n<li><strong>Internet activity identifiers</strong> like search history, advertisement, browsing history, etc.</li>\n<li><strong>Geolocation identifiers</strong> like location history.</li>\n<li><strong>Sensitive data</strong> like financial and medical history, religious or political views, sexual preferences, education data, etc.</li>\n<li><strong>Biometric identifiers</strong> like voice recordings, fingerprints, facial recognition, etc. </li>\n<li><strong>Commercial data</strong> like property records, products or services purchased, purchasing histories, etc.</li>\n</ul>\n<h3 id=\"is-ccpa-a-big-deal\" style=\"position:relative;\"><a href=\"#is-ccpa-a-big-deal\" aria-label=\"is ccpa a big deal permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Is CCPA a big deal?</h3>\n<p>Yes, CCPA is a big deal for companies that collect data from the residents of California – irrespective of where their business is located. </p>\n<p>Non-compliance may lead to hefty fines and rigid enforcements.</p>\n<h3 id=\"what-are-the-ccpa-penalties\" style=\"position:relative;\"><a href=\"#what-are-the-ccpa-penalties\" aria-label=\"what are the ccpa penalties permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the CCPA penalties?</h3>\n<p>The maximum penalty for unintentional violations is $2,500 USD, while for intentional violations, it may go as high as $7,500 USD. Consumers may also take legal action against companies and can sue them individually for each breach.</p>\n<h2 id=\"does-ccpa-apply-to-your-business\" style=\"position:relative;\"><a href=\"#does-ccpa-apply-to-your-business\" aria-label=\"does ccpa apply to your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Does CCPA apply to your business?</h2>\n<p>If your business or organization answers positively to any one of the following criteria, you are required to comply with the CCPA.</p>\n<ul>\n<li>Does your business earn annual gross revenue of more than $25 million USD?</li>\n<li>Do you buy, sell, or share data of 50,000 or more consumers for commercial intent?</li>\n<li>Does your business earn 50% or more of its revenue by selling consumers' personal information?</li>\n</ul>\n<p>Remember: Non-profit or small companies that do not meet the income threshold do not require to comply.</p>\n<h2 id=\"can-ccpa-optimize-user-experience\" style=\"position:relative;\"><a href=\"#can-ccpa-optimize-user-experience\" aria-label=\"can ccpa optimize user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Can CCPA optimize user experience?</h2>\n<p>Today, consumers have a lot of control over how companies shape their brand image and retain their businesses. </p>\n<p>When it comes to CCPA, the Californian data privacy law provides some excellent opportunities to gain an advantage over customer experience. </p>\n<p>Wondering how? Let’s find out.</p>\n<p><img src=\"/1c7253cfc260cb7d8eb49d512a532d43/image3.webp\" alt=\"CCPA optimize user experience\"></p>\n<p><strong>1. CCPA ensures improved data security.</strong></p>\n<p>The repercussions of not adhering to international compliance protocols aren’t limited to privacy issues. Apart from the apparent loss of customer trust, it results in revenue losses and possible fines. </p>\n<p>A data protection law as stringent as the CCPA gives consumers the confidence and trust to share their sensitive data online. Simply because consumers can easily find out what data is collected, stored, and disclosed to others.</p>\n<p><strong>2. CCPA builds trust with consent management.</strong></p>\n<p>With a plethora of cases on identity theft and data disclosure by big shot conglomerates, consumers find it challenging to trust enterprises with their personal data. </p>\n<p>Enterprises willing to build sustainable relations with their consumers need to understand the importance of privacy. </p>\n<p>Consumers should have the freedom to view or upgrade their consent approval. If the need arises, they should be allowed the right to withdraw their consent too.</p>\n<p>As such, CCPA requires enterprises to display easy-to-understand consent requests, so consumers know what they are getting into.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><img src=\"/c62fbeba5c65dddf6f32bbac3af59099/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance.webp\"></a></p>\n<p><strong>3. CCPA allows frictionless identity management.</strong></p>\n<p>When it comes to enterprise-class identity management, factors like compliance and security play a critical role. </p>\n<p>In the data-driven world, a CCPA-regulated customer identity and data management solution can seek consent and record permissions before processing any data.</p>\n<h2 id=\"how-loginradius-identity-solution-assists-enterprises-with-ccpa-compliance\" style=\"position:relative;\"><a href=\"#how-loginradius-identity-solution-assists-enterprises-with-ccpa-compliance\" aria-label=\"how loginradius identity solution assists enterprises with ccpa compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius’ Identity Solution assists enterprises with CCPA compliance</h2>\n<p>LoginRadius is a <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> solution that provides a 360-degree view of customers for a seamless collection, storage, management, and protection of personal data.</p>\n<p>It helps companies meet CCPA regulatory requirements without compromising the user experience. Its one-of-a-kind data protection features include client registration, sign-in, authentication, single sign-on, data governance, and consent management, among others.</p>\n<p><img src=\"/3ff2cb8e678228fa2104f7e3651e91e0/image4.webp\"></p>\n<p>The following capabilities further help enterprises meet privacy compliance regulations.</p>\n<ul>\n<li>Clear and specific statement of consent.</li>\n<li>Registration and progressive profiling. </li>\n<li>Data record and access permissions. </li>\n<li>Deletion of data. </li>\n<li>User identity and access management. </li>\n<li>Management of centralized access control.</li>\n<li>Age verification mechanism.</li>\n</ul>\n<p>There’s more.</p>\n<p>LoginRadius enforces a set of policies, procedures, programs, and standards for effective security management. It aims to offer a risk-free organizational setup by safeguarding customer's data against potential breaches.</p>\n<p>The identity solution is designed with a cloud-native architecture and complies with the <a href=\"https://www.loginradius.com/compliances-list/\">major security assurance programs</a> including:</p>\n<ol>\n<li>OpenID - End-user identity verification supported by OAuth 2.0 protocol</li>\n<li>PCI DSS PCI SSC administered standard for payment transactions</li>\n<li>ISO 27001:2013 - Information security management system</li>\n<li>ISO 27017:2015 - Information security for cloud services</li>\n<li>AICPA SOC 2 (Type II) - System-level controls for Trust Services Criteria - security, availability, process integrity, confidentiality, and privacy </li>\n<li>ISAE 3000 - International attestation standard for assurance over non-financial information </li>\n<li>NIST Cybersecurity Framework - Standardized security framework to manage and reduce cybersecurity risk.  </li>\n<li>CSA CCM Level 1, Level 2 - STAR Self-Assessment, STAR Certification, STAR Attestation, and C-STAR Assessment.</li>\n<li>CIS Critical Security Controls Global standards for internet security</li>\n<li>US Privacy Shield Complaint resolution for EEA citizens</li>\n<li>ISO/IEC 27018:2019 - PII Protection</li>\n</ol>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Consumers expect the privacy and security of their personal data, and it is the responsibility of enterprises to build and maintain a trusted relationship. Recent data breaches and identity thefts highlight the importance of data protection laws and compliance like <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">CCPA and GDPR</a>. </p>\n<p>With an identity solution like LoginRadius, you can eliminate lengthy processes that ruin the user experience, and still maintain international governance over data privacy. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 06, 2020","updated_date":null,"description":"As the risk of data misuse is rising, more and more enterprises are trying to comply with current data protection and regulatory enforcement.","title":"How LoginRadius Helps Enterprises Stay CCPA Compliant in 2020","tags":["data privacy","compliance","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/3da77fd0181d28bfc0a067549277a041/7f8e9/ccpa-compliant.webp","srcSet":"/static/3da77fd0181d28bfc0a067549277a041/61e93/ccpa-compliant.webp 200w,\n/static/3da77fd0181d28bfc0a067549277a041/1f5c5/ccpa-compliant.webp 400w,\n/static/3da77fd0181d28bfc0a067549277a041/7f8e9/ccpa-compliant.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Introduction Social login, also termed as social sign-in or social sign-on, allows your consumers to login and register with a single click…","fields":{"slug":"/identity/what-is-social-login/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Social login, also termed as social sign-in or social sign-on, allows your consumers to login and register with a single click on a website or mobile application using their existing accounts from various social providers. It simplifies the sign-in and <a href=\"https://www.loginradius.com/authentication/\">registration experiences</a>, providing a convenient alternative method to create an account where it is mandatory.</p>\n<ul>\n<li>For consumers, social login is a single-click login method for accessing the website and mobile application—one that there is no need for excess credentials and allows consumers to skip traditional registration methods.</li>\n<li>Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization.</li>\n</ul>\n<h2 id=\"how-does-social-login-work\" style=\"position:relative;\"><a href=\"#how-does-social-login-work\" aria-label=\"how does social login work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Social Login Work?</h2>\n<p>You may be thinking about how does social login work? Well, social login is a quick and convenient way for users to log into websites using their existing social media accounts. Instead of creating a new account on the website, users can simply click a button to sign in with their Facebook, Google, or other social media account.</p>\n<p>When a user clicks on the social login button, the website will redirect the user to the chosen social media platform's login page. After the user logs in, the social media platform sends back the user's data to the website. This data can include the user's name, email address, profile picture, and any other information the user has authorized the website to access. Let’s understand more about  login with social media and its aspects. </p>\n<h2 id=\"how-do-popular-social-login-platforms-compare\" style=\"position:relative;\"><a href=\"#how-do-popular-social-login-platforms-compare\" aria-label=\"how do popular social login platforms compare permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do Popular Social Login Platforms Compare?</h2>\n<p>Some of the most popular social login platforms include Facebook, Google, Twitter, LinkedIn, and Microsoft. Each platform has its own strengths and weaknesses.</p>\n<p>Facebook is the most popular social login platform, with over 2 billion active users worldwide. It provides a wide range of user data, including the user's name, email address, profile picture, and interests.</p>\n<p>Google is also a popular social login platform, with over 1 billion active users. It provides similar data to Facebook, but also allows users to log in with their Google+ account.</p>\n<p>For detailed information about the login preferences, you can <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">download</a> our <strong>Consumer Digital Identity Trend Report 2022.</strong></p>\n<p>Twitter is popular among younger users, but it provides less user data than Facebook or Google. LinkedIn is popular among professionals, and it provides more detailed professional information about the user.</p>\n<h2 id=\"why-should-businesses-use-social-login\" style=\"position:relative;\"><a href=\"#why-should-businesses-use-social-login\" aria-label=\"why should businesses use social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Use Social Login?</h2>\n<p>Social login and registration provide benefits in various ways:</p>\n<ul>\n<li>Log in via a third-party web page or Facebook or Google accounts can be done with just a few clicks on the button. This is a much faster way to access the sites and mobile applications than filling out the complete registration form as in traditional login.</li>\n<li>Social login reduces the effort to remember passwords, which means people don’t need to create and keep track of more credentials, lessening password fatigue and login failure.</li>\n</ul>\n<p><a href=\"https://www.google.com/url?q=https://www.loginradius.com/resource/loginradius-single-sign-on/\"><img src=\"/f91644b068ec78e0acdb60c2a9d83004/sso.webp\" alt=\"sso\"></a></p>\n<ul>\n<li>Consumers feel more comfortable sharing the data via the social platform on which they already have trust compared to unknown sites. Social login provides a recognizable, uniform method of account logging.</li>\n<li>Data collection can be automated. Each time a visitor logs in on the site, our APIs retrieve the consumer’s updated profile information.</li>\n</ul>\n<h2 id=\"how-is-social-login-useful-for-business\" style=\"position:relative;\"><a href=\"#how-is-social-login-useful-for-business\" aria-label=\"how is social login useful for business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Social Login Useful for Business?</h2>\n<p>By providing the <a href=\"https://www.loginradius.com/social-login/\">social login on your site</a>, consumers and visitors can experience a better UX/UI. Almost everyone is perpetually logged in on their social accounts, especially to their Facebook and Google accounts, sites, and apps (ecommerce or otherwise).</p>\n<p>The following are a few benefits of social login for businesses:</p>\n<ol>\n<li>Visitors can save time by not requiring them to create yet another profile.</li>\n<li>Increase the chances of converting leads to consumers and speed up the business/sale by doing #1.</li>\n<li>Speed up consumer service and support.</li>\n<li>Data collection of visitors and consumers can be automated to build profiles and personas.</li>\n<li>Personalize the site for visitors and run future promotions using info gathered by doing automation.</li>\n<li>Trust can be created by showing visitors and consumers reviews of your product written by their friends/family on the social network they use to log in.</li>\n<li>Increase reach, generate brand awareness, and build communities by harnessing various social platforms.</li>\n<li>Also, businesses can run loyalty and referral programs with social invites.</li>\n</ol>\n<h2 id=\"how-to-implement-social-login\" style=\"position:relative;\"><a href=\"#how-to-implement-social-login\" aria-label=\"how to implement social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Social Login?</h2>\n<p>Social Login can be implemented with the following method:</p>\n<ul>\n<li>To implement the social login with the UI’s help, you need to configure the Social Provider. For more information on this, visit : <a href=\"https://www.loginradius.com/docs/authentication/quick-start/social-login/#partconfiguration1\">Social Login Configuration</a>.</li>\n<li>If you want to implement the Social Login with the JS interface’s help, the following URL will help you: <a href=\"https://www.loginradius.com/docs/authentication/quick-start/social-login/#partdeployment4\">Deployment</a>.</li>\n</ul>\n<h2 id=\"what-are-the-benefits-of-social-login\" style=\"position:relative;\"><a href=\"#what-are-the-benefits-of-social-login\" aria-label=\"what are the benefits of social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Benefits of Social Login?</h2>\n<p>There are several benefits to using social login on your website. First, it provides a convenient and quick way for users to log in without having to create a new account. This can increase conversion rates and reduce the number of abandoned carts or forms.</p>\n<p>Second, social login can help you gather more data about your users. This data can be used to personalize the user experience, send targeted marketing messages, and <a href=\"https://www.loginradius.com/blog/growth/how-customer-retention-can-help-businesses-grow/\">improve customer retention</a>.</p>\n<p>Third, when we talk about social security login, social login can increase the security of your website by reducing the number of passwords users have to remember. Users are more likely to choose weak or easy-to-guess passwords if they have to remember multiple passwords for different websites.</p>\n<h2 id=\"how-to-implement-social-login-and-is-it-worth-implementing\" style=\"position:relative;\"><a href=\"#how-to-implement-social-login-and-is-it-worth-implementing\" aria-label=\"how to implement social login and is it worth implementing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Social Login and Is It Worth Implementing?</h2>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\">Implementing social login</a> on your website is relatively easy, especially if you use a third-party service like LoginRadius. LoginRadius provides a range of social login options, including Facebook, Google, Twitter, LinkedIn, and more.</p>\n<p>To implement social login, you will need to add social login buttons to your website and integrate them with your existing login system. You may also need to make some changes to your website's privacy policy and terms of service.</p>\n<p>Whether or not social login is worth implementing depends on your website and your users. If your website is focused on e-commerce or requires users to log in frequently, social login can be a great way to increase conversion rates and improve user experience. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we talked about applying a Social Login on consumers websites and how it will enhance businesses. This feature allows consumers to login via social providers and removes the hassle to remember new passwords for different websites. However, before implementing any functionality on a website, analyze and consider the pros and cons from every possible angle.</p>\n<p>Cheers!</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p>1.<strong>Which is the most popular social login?</strong></p>\n<p>According to the <a href=\"https://www.loginradius.com/resource/consumer-digital-identity-trend-report-2022\">Consumer Identity Trend Report 2022</a>, 26.84% of users prefer social login. And Facebook login is the most popular social login method. </p>\n<p>2.<strong>What is a social login app?</strong></p>\n<p>Social login enables you to authenticate your users on your website or application using their existing social media profiles on your website or application. The most common login using social media are from platforms, including login include Facebook, Gmail, Instagram, etc. </p>\n<p>3.<strong>What data do you get with social login?</strong></p>\n<p>Social login provides you with a deep insight into your customer behavior and preferences that helps you create personalized customer journeys and aggressive <a href=\"https://www.loginradius.com/blog/growth/advantage-social-login-as-marketer/\">marketing campaigns</a>.</p>\n<p><strong>4. Who uses social login?</strong></p>\n<p>Social login is utilized by websites and applications to allow users to log in using their existing social media accounts.</p>\n<p><strong>5.  How to do social login?</strong></p>\n<p>Users can perform social login by clicking on the respective social media button on the website or application's login page and following the authentication prompts provided by the chosen social media platform.</p>\n<p><strong>6. How to use Facebook for social login?</strong></p>\n<p>Facebook login can be integrated with your website or mobile application for seamless login by using the <a href=\"https://www.loginradius.com/social-login/\">LoginRadius CIAM</a>.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-social-login\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 28, 2020","updated_date":null,"description":"Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization.","title":"What is Social Login?","tags":["social login","identity verification","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/76a63a56c76fb78c41033caa51ea6e75/7f8e9/social-login.webp","srcSet":"/static/76a63a56c76fb78c41033caa51ea6e75/61e93/social-login.webp 200w,\n/static/76a63a56c76fb78c41033caa51ea6e75/1f5c5/social-login.webp 400w,\n/static/76a63a56c76fb78c41033caa51ea6e75/7f8e9/social-login.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vaibhav Jain","github":null,"avatar":null}}}},{"node":{"excerpt":"Identity as a Service (IDaaS) can be a game-changer for your business—but only if you know how to play it right.  Speaking of which, the…","fields":{"slug":"/identity/identity-as-a-service-for-business/"},"html":"<p>Identity as a Service (IDaaS) can be a game-changer for your business—but only if you know how to play it right. </p>\n<p>Speaking of which, the term identity refers to characteristics that make an entity recognizable. Likewise, <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">digital identity refers</a> to attributes that identify people, organizations, or other entities online.</p>\n<p>With more and more businesses migrating to the cloud, the demand for <a href=\"https://www.loginradius.com/authentication/\">seamless authentication of digital identities</a> has reached a critical point.</p>\n<p>Experts predict a massive change in the way enterprises handle <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) within the next decade. </p>\n<p>By 2022, Identity as a Service (IDaaS) solutions is expected to grow the identity and access management space to a <a href=\"https://www.gartner.com/account/signin?method=initialize&#x26;TARGET=http%253A%252F%252Fwww.gartner.com%252Fdocument%252Fcode%252F369430\">$13.42 billion property</a>. Hence, <em>now</em> is the best time to invest in a secure, highly accessible, simplified, low-risk solution like IDaaS.</p>\n<h2 id=\"what-is-identity-as-a-service-idaas\" style=\"position:relative;\"><a href=\"#what-is-identity-as-a-service-idaas\" aria-label=\"what is identity as a service idaas permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity as a Service (IDAAS)? </h2>\n<p>Identity as a service (IDaaS) refers to identity and access management services that are offered through the cloud or via SaaS (software-as-a-service) systems. It offers cloud-based authentication delivered and operated by third-party providers on a subscription basis.</p>\n<p>In short, IDaaS helps manage digital identities so that the right users can access the resources that are meant for them.</p>\n<p>IDaaS is a win-win for both businesses and their customers. With modern IDaaS access features, there’s no need for end-users to remember multiple account credentials. Likewise, system administrators can reduce the number of user accounts they have to manage. </p>\n<h2 id=\"3-benefits-of-identity-as-a-service-idaas-for-developers\" style=\"position:relative;\"><a href=\"#3-benefits-of-identity-as-a-service-idaas-for-developers\" aria-label=\"3 benefits of identity as a service idaas for developers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Benefits of Identity as a Service (IDAAS) for Developers</h2>\n<p>As an application developer, you must see features like registration, authentication, and account recovery as opportunities to <a href=\"https://www.loginradius.com/customer-experience-solutions/\">better customer experiences</a>. But, that’s not it. The following are three important benefits of IDaaS for developers.</p>\n<h3 id=\"decentralization-of-identity\" style=\"position:relative;\"><a href=\"#decentralization-of-identity\" aria-label=\"decentralization of identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Decentralization of identity</h3>\n<p>IDaaS allows application developers to decentralize the user identity from the application. This leads to the following advantages for developers.</p>\n<ul>\n<li>If there is no need for the user identity information any longer, there's no point in storing it in their databases.</li>\n<li>The identity of a user does not resonate with the application, and all developers should care about is a unique identifier.</li>\n<li>The <a href=\"https://www.loginradius.com/blog/2019/06/perfect-ciam-platform/\">CIAM platform</a> will also manage the non-feature work like user CRUD, password CRUD, etc. That's another burden of the load.</li>\n</ul>\n<p>By letting an external service handle identity and authentication, developers can focus on bringing more value to the business. </p>\n<h3 id=\"idaas-is-api-based\" style=\"position:relative;\"><a href=\"#idaas-is-api-based\" aria-label=\"idaas is api based permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IDaaS is API-based </h3>\n<p>One of the core competencies of IDaaS is that they are API-first. Interestingly, most of these third parties provide on-demand expertise that would otherwise become more time-consuming and resource-heavy, if developed in-house.</p>\n<p>By leveraging APIs, developers can add them to their existing technology and save a significant amount of time.</p>\n<h3 id=\"bridge-the-gap-between-developer-and-security-teams\" style=\"position:relative;\"><a href=\"#bridge-the-gap-between-developer-and-security-teams\" aria-label=\"bridge the gap between developer and security teams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bridge the gap between developer and security teams</h3>\n<p>With developers constantly bugged to build revenue-generating apps in shorter deadlines, IDaaS allows them to get the job done quickly, and simultaneously create high quality and secure output. </p>\n<p>Furthermore, IDaaS has the potential to deliver a secure, streamlined on-demand identity expertise. Such strategies can also do a great deal to reduce internal tension and eventually bridge the gap between developers and the security workforce.</p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><img src=\"/cb344658920387aac010223f2c1d79a1/EB-Guide-to-Modern-Customer-Identity-1024x310.webp\" alt=\"Guide-to-Modern-Customer-Identity-ebook\"></a></p>\n<h2 id=\"3-benefits-of-identity-as-a-service-idaas-for-businesses\" style=\"position:relative;\"><a href=\"#3-benefits-of-identity-as-a-service-idaas-for-businesses\" aria-label=\"3 benefits of identity as a service idaas for businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Benefits of Identity as a Service (IDaaS) for Businesses</h2>\n<p>A comprehensive IDaaS solution brings a plethora of benefits to the entire business environment. There's agility, security, and efficiency, to name a few. Some other advantages include:</p>\n<h3 id=\"freedom-to-choose\" style=\"position:relative;\"><a href=\"#freedom-to-choose\" aria-label=\"freedom to choose permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Freedom to choose</h3>\n<p>IDaaS allows businesses the freedom to choose the right IT resources that fit them and their customers. When they have the best tool to get their job done, that leads to better agility and increased speed. The outcome? A competitive position in the market.</p>\n<h3 id=\"increase-in-productivity\" style=\"position:relative;\"><a href=\"#increase-in-productivity\" aria-label=\"increase in productivity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Increase in productivity</h3>\n<p>IDaaS offers the liberty to businesses to manage their IT environment from a single platform. There's less scope for human error too. With a comprehensive identity solution, they can let their customers access multiple web properties with a <a href=\"https://www.loginradius.com/blog/2019/11/benefits-single-sign-on-sso/\">single set of credentials</a>. This leads to increased productivity and better security. </p>\n<h3 id=\"stronger-security\" style=\"position:relative;\"><a href=\"#stronger-security\" aria-label=\"stronger security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stronger security</h3>\n<p>A modern IDaaS solution secures identities and protects your IT environment. With features like MFA, SSO, and password complexity, businesses can control access and increase security. Needless-to-say, with identities being the epicenter of every cyberattack, identity security features such as these are instrumental in <a href=\"https://www.loginradius.com/blog/2019/12/digital-privacy-best-practices/\">safeguarding your digital properties</a>. </p>\n<h2 id=\"7-core-components-of-idaas-in-an-enterprise-environment\" style=\"position:relative;\"><a href=\"#7-core-components-of-idaas-in-an-enterprise-environment\" aria-label=\"7 core components of idaas in an enterprise environment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Core Components of IDaaS in an Enterprise Environment </h2>\n<p><img src=\"/ecda0feac4efd7080ac3429239ba4155/imgae2-1024x621.webp\"></p>\n<p>The features and functionalities of an Identity as a Service solution vary across all market segments but generally include digital identity access and management. Here are some of the most common components.</p>\n<h3 id=\"1-cloud-based-and-multi-tenant-architecture\" style=\"position:relative;\"><a href=\"#1-cloud-based-and-multi-tenant-architecture\" aria-label=\"1 cloud based and multi tenant architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Cloud-based and multi-tenant architecture</h3>\n<p>A typical IDaaS vendor will operate a <a href=\"https://www.loginradius.com/multi-tenant-cloud/\">multi-tenant service</a> delivery model. The vendor will issue updates and performance enhancement requests whenever these become available. </p>\n<h3 id=\"2-password-management-and-authentication\" style=\"position:relative;\"><a href=\"#2-password-management-and-authentication\" aria-label=\"2 password management and authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Password management and authentication</h3>\n<p>IDaaS service taps all the points of an ideal identity and access management platform. It includes maintaining features like multi-factor authentication and biometric access across all access points. </p>\n<h3 id=\"3-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#3-single-sign-on-sso\" aria-label=\"3 single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Single Sign-On (SSO)</h3>\n<p>When it comes to customer identity and access management, <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on</a> is a vital feature. </p>\n<p>SSO is designed to maximize the end-user experience while simultaneously maintaining the security of a network. With SSO, users are encouraged to use strong password combinations to access their everyday IT services. </p>\n<p>In an Identity as a service environment, SSO allows <a href=\"https://www.loginradius.com/single-sign-on/\">enterprises to secure authentication</a> for third-party services without requiring an internal IT department’s involvement.</p>\n<h3 id=\"4-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#4-multi-factor-authentication\" aria-label=\"4 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication (MFA)</a> is associated with Identity as a Service and is occasionally referred to as two-factor authentication. Using multiple factors for authentication helps prevent data breaches, making it one of the best ways to protect digital identities.</p>\n<p>Other examples of how MFA works include Google 2-Step Verification and Microsoft Authenticator. Both work on the TOTP (time-based one-time password) mechanism. </p>\n<p>Biometrics uses the \"inheritance\" as a means of verification—meaning something the user is. </p>\n<p>SMS and voice verifications are also popular multi-factor authentication methods. Iris or retina recognition, fingerprint, hand, thumbprints, full facial recognition, and DNA usage are catching up too. </p>\n<h3 id=\"5-automated-approval-workflows\" style=\"position:relative;\"><a href=\"#5-automated-approval-workflows\" aria-label=\"5 automated approval workflows permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Automated approval workflows</h3>\n<p>Identity as a Service also utilizes automated approval workflows. These workflows help IT admins to:</p>\n<ul>\n<li>Offer access privileges to multiple apps.</li>\n<li>Enforce GUI-based configuration capabilities. </li>\n<li>Manage user-account provisioning.</li>\n<li>Follow <a href=\"https://www.loginradius.com/data-governance/\">governance frameworks</a> for risk assessment.</li>\n</ul>\n<h3 id=\"6-analytics-and-intelligence\" style=\"position:relative;\"><a href=\"#6-analytics-and-intelligence\" aria-label=\"6 analytics and intelligence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Analytics and Intelligence</h3>\n<p>Using analytics and intelligence capabilities in IDaaS lets enterprises report misuse related to access privileges. This makes it easier to detect anomalies in user functions and data usage. </p>\n<h3 id=\"7-governance-and-compliance\" style=\"position:relative;\"><a href=\"#7-governance-and-compliance\" aria-label=\"7 governance and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Governance and Compliance</h3>\n<p>Enterprises can leverage the intelligence capabilities of an Identity as a Service platform to manage <a href=\"https://www.loginradius.com/blog/2020/07/data-governance-best-practices/\">governance and compliance</a>-related workflows. Real-world authentication processes can be aligned with governance policies to mitigate security risk.</p>\n<p><img src=\"/3985d0fc0e97f7f6526b5800bdf29e65/image-3-1-1024x621.webp\"></p>\n<h2 id=\"some-new-regulations-that-are-protecting-identities-include\" style=\"position:relative;\"><a href=\"#some-new-regulations-that-are-protecting-identities-include\" aria-label=\"some new regulations that are protecting identities include permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Some new regulations that are protecting identities include:</h2>\n<p><strong>1. General Data Protection Regulation (GDPR)</strong></p>\n<p>GDPR is the core of Europe's digital privacy legislation. It requires businesses to safeguard the personally identifiable information (PII) of the European Union citizens for transactions that occur within the member states. Failure to comply may cost dearly. Individual rights include: </p>\n<ul>\n<li>Right to be informed.</li>\n<li>Right of access.</li>\n<li>Right to rectification.</li>\n<li>Right to erasure.</li>\n<li>Right to restrict processing.</li>\n<li>Right to data portability.</li>\n<li>Right to object.</li>\n</ul>\n<p><strong>2. California Consumer Privacy Act (CCPA)</strong></p>\n<p>The CCPA is a state-level law that <a href=\"https://www.loginradius.com/blog/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">mandates that businesses</a> inform customers of their plan to monetize their data, and provide them with a clear means of opting out, whenever required. Any violation can lead to hefty fines. A few other requirements include:</p>\n<ul>\n<li>Businesses must disclose what information they collect.</li>\n<li>Businesses must delete customer data upon request. </li>\n<li>Customers can opt-out of their data being sold.</li>\n</ul>\n<h2 id=\"5-reasons-why-loginradius-idaas-is-the-right-fit-for-your-enterprise\" style=\"position:relative;\"><a href=\"#5-reasons-why-loginradius-idaas-is-the-right-fit-for-your-enterprise\" aria-label=\"5 reasons why loginradius idaas is the right fit for your enterprise permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Reasons Why LoginRadius IDaaS Is the Right Fit for Your Enterprise</h2>\n<p>In a world that’s swiftly migrating to the cloud, the LoginRadius IDaaS provider is positioned to <a href=\"https://www.loginradius.com/security/\">combine both security</a> and ease-of-use in solving emerging business needs for enterprise-level organizations. </p>\n<p>Here’s what LoginRadius IDaaS can do for your digital enterprise. </p>\n<h3 id=\"1-faster-implementation\" style=\"position:relative;\"><a href=\"#1-faster-implementation\" aria-label=\"1 faster implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Faster implementation</h3>\n<p>LoginRadius IDaaS implementation in the cloud is fast and straightforward. Since servers are already <a href=\"https://www.loginradius.com/identity-api/\">installed in the cloud</a>, you only need to configure your chosen platform according to your IT protocols to get it up and running.</p>\n<h3 id=\"2-easy-third-party-integrations\" style=\"position:relative;\"><a href=\"#2-easy-third-party-integrations\" aria-label=\"2 easy third party integrations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Easy third-party integrations</h3>\n<p>A cloud-based Identity as a Service platform like LoginRadius easily integrates with <a href=\"https://www.loginradius.com/cloud-integrations/\">3rd-party apps</a>. You can also add or remove any feature from your existing CIAM environment at any time, such as MFA, SSO, or <a href=\"https://www.loginradius.com/blog/2019/02/presenting-progressive-profiling-loginradius/\">Progressive Profiling</a>.</p>\n<h3 id=\"3-seamless-data-migration\" style=\"position:relative;\"><a href=\"#3-seamless-data-migration\" aria-label=\"3 seamless data migration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Seamless data migration </h3>\n<p>Transferring identity data to a new environment in the cloud may seem daunting to the uninitiated. LoginRadius provides customers with <a href=\"https://www.loginradius.com/blog/2020/07/loginradius-identity-import-manager-data-migration/\">data migration software</a>, and sets up and executes the migration for a seamless, hassle-free transfer.</p>\n<h3 id=\"4-passwordless-authentication\" style=\"position:relative;\"><a href=\"#4-passwordless-authentication\" aria-label=\"4 passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Passwordless Authentication </h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">Passwordless Authentication</a> deters cybercriminals by reducing the risk of password sprawl. With the LoginRadius IDaaS platform, you can set up secure, passwordless authentication and secure password resets.</p>\n<h3 id=\"5-no-need-for-ciam-experts\" style=\"position:relative;\"><a href=\"#5-no-need-for-ciam-experts\" aria-label=\"5 no need for ciam experts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. No need for CIAM experts</h3>\n<p>CIAM experts are an asset to any company when it comes to implementing IDaaS and securing customer identities. Luckily, onboarding a CIAM expert isn’t necessary when using Identity as a Service. With LoginRadius CIAM, we are with you every step of the way in your digital transformation.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>There is a lot of anticipation about Identity as a Service in solving real-world business problems. It is important, and no, you cannot mess it up. Because then, you will be out of business. No wonder, IDaaS has already entered the mainstream and will continue growing from here.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=identity-as-a-service-for-business\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 25, 2019","updated_date":null,"description":"Identity as a service (IDaaS) refers to services provided via the cloud or through SaaS (software-as-a-service) systems for identity and access management. It provides cloud-based authentication provided and managed on a subscription basis by third-party providers.","title":"Identity as a Service (IDAAS): Managing Digital Identities (Updated)","tags":["idaas","digital identity management","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/4545cde6890d02351eb7cdba48dbe112/7f8e9/idaas-business.webp","srcSet":"/static/4545cde6890d02351eb7cdba48dbe112/61e93/idaas-business.webp 200w,\n/static/4545cde6890d02351eb7cdba48dbe112/1f5c5/idaas-business.webp 400w,\n/static/4545cde6890d02351eb7cdba48dbe112/7f8e9/idaas-business.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":378,"currentPage":64,"type":"//identity//","numPages":72,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}