{"componentChunkName":"component---src-pages-markdown-remark-fields-slug-js","path":"/identity/loginradius-pin-based-authentication/","result":{"data":{"markdownRemark":{"id":"960c4fa6-0314-5b39-90c2-3a6973a9b6b8","excerpt":"LoginRadius is a rapidly-expanding platform. And this time, the cloud-based customer identity and access management solution has launched a PIN Login…","html":"<p>LoginRadius is a rapidly-expanding platform. And this time, the cloud-based customer identity and access management solution has launched a PIN Login authentication environment for its existing and new customers.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind The Launch</h2>\n<p>The <a href=\"https://www.loginradius.com/multi-factor-authentication/\">method of authentication</a> is an important aspect of security, and likewise, a PIN strikes just the right balance between security and usability.</p>\n<p>To be clear, by authentication we mean how we identify and verify users on our platform to make sure <strong><em>'they are who they say they are.'</em></strong></p>\n<p>LoginRadius customers can now avoid time-consuming delays caused by entering long, complex credentials repeatedly within a trusted device. PIN login will also pose an additional challenge for hackers during or after login.</p>\n<h2 id=\"the-benefits-of-pin-authentication\" style=\"position:relative;\"><a href=\"#the-benefits-of-pin-authentication\" aria-label=\"the benefits of pin authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Benefits of PIN Authentication</h2>\n<p>In a new generation of end-users, a strong PIN based authentication uptake is a better way to validate their authenticity. Whether it’s PIN based authentication through platform or PIN authenticator, it’s always a reliable way of authentication when it comes to security and convenience. Here are a few more advantages of using PIN login as a method of authentication. </p>\n<ul>\n<li>It simplifies the login process. </li>\n<li>The validation happens in a matter of a few seconds. </li>\n<li>PIN authentication is hassle-free, convenient, and less time-consuming.</li>\n<li>The need for re-authentication during critical events strengthens security.</li>\n</ul>\n<h2 id=\"what-does-the-threat-mitigating-model-look-like\" style=\"position:relative;\"><a href=\"#what-does-the-threat-mitigating-model-look-like\" aria-label=\"what does the threat mitigating model look like permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Does the Threat Mitigating Model Look Like</h2>\n<p>We have followed strict authentication protocols to make this launch a success. Likewise, here is an outline of how our threat mitigation model looks like and what it offers:</p>\n<p><strong>Enhanced usability for end-user</strong>: For customers looking for a secure, seamless sign-in to justify the authenticity of end-users, PIN Login will offer a shorter, less time consuming, and more usable experience that <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">simplifies the sign-in process</a>.</p>\n<p><strong>No third-party integration</strong>: We conduct authentication and authorization of end-users inside our identity environment. No other third-party service provider is involved resulting in better response speed and boosted security.</p>\n<p><strong>Re-authentication upon prolonged inactivity</strong>: Long-lived sessions are harmful, especially if the user was inactive for a longer period of time. The new PIN login will require users to re-authenticate after a pre-set time duration.</p>\n<p><strong>Critical Information Accessibility</strong>: End-users will be validated every time when conducting a critical event. This event-based re-authentication flow will work for scenarios like while processing a transaction or deleting an account.</p>\n<p><strong>Complete configurable solution</strong>: Customers can configure the PIN length based on industry standards and set the flow as a mandate or optional for the end-users.</p>\n<p><strong>Forced account lockouts</strong>: The account will be locked automatically upon hitting the configured number of failed PIN attempts. The PIN will act as the protection layer against vulnerabilities like brute force attacks.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-and-pin-auth\"><img src=\"/f32017029e33d83f62d049bb6c5ec189/DS-PIN-Login-1024x310.webp\" alt=\"Pin login data sheet\"></a></p>\n<p><strong>Pin Login Data Sheet</strong></p>\n<h2 id=\"making-authentication-convenient-and-simple-for-end-users\" style=\"position:relative;\"><a href=\"#making-authentication-convenient-and-simple-for-end-users\" aria-label=\"making authentication convenient and simple for end users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Making Authentication Convenient and Simple for End-Users</h2>\n<p>It is quite impressive to deliver seamless experiences from the first interaction itself. With the latest PIN authentication, we aim to streamline end-users' journey by providing a <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">passwordless experience</a>.</p>\n<p>Our PIN login is another giant step towards achieving better security, usability, and identity management.</p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>PIN login is a successful attempt at not just embracing an alternative  two factor authentication PIN method or the multi factor authentication PIN method for the LoginRadius identity platform, but using a variety of other factors and combining them contextually for secured access management. </p>\n<p>All-in-all, we aim to ensure that logins are secure, simple, seamless, and frictionless. And if it can turn customers into loyal advocates, that will serve our purpose even better.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=loginradius-pin-based-authentication\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","headings":[{"value":"Intend Behind The Launch","depth":2},{"value":"The Benefits of PIN Authentication","depth":2},{"value":"What Does the Threat Mitigating Model Look Like","depth":2},{"value":"Making Authentication Convenient and Simple for End-Users","depth":2},{"value":"A Final Word","depth":2}],"fields":{"slug":"/identity/loginradius-pin-based-authentication/"},"frontmatter":{"metatitle":"PIN Authentication With Enhanced Features | LoginRadius","metadescription":"LoginRadius announces the launch of PIN-based login as an additional factor of authentication & usability enhancement to reduce the pain of password.","description":"LoginRadius is a rapidly-expanding identity management platform. And this time, for its current and new clients, the cloud-based client identity and access management solution has introduced a PIN Login authentication environment.","title":"Announcement - LoginRadius Now Supports PIN Login with Enhanced Features","canonical":"https://www.loginradius.com/blog/identity/what-is-pin-authentication/","date":"April 28, 2020","updated_date":null,"tags":["pin authentication","ciam solution","identity management"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/55974b938473b376b80bd3688ec14362/d8359/LoginRadius-Pin-Authentication.webp","srcSet":"/static/55974b938473b376b80bd3688ec14362/1c9b5/LoginRadius-Pin-Authentication.webp 200w,\n/static/55974b938473b376b80bd3688ec14362/f1752/LoginRadius-Pin-Authentication.webp 400w,\n/static/55974b938473b376b80bd3688ec14362/d8359/LoginRadius-Pin-Authentication.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Kundan Singh","github":null,"bio":"Director of Product Development @ LoginRadius.","avatar":null}}}},"pageContext":{"id":"960c4fa6-0314-5b39-90c2-3a6973a9b6b8","fields__slug":"/identity/loginradius-pin-based-authentication/","__params":{"fields__slug":"identity"}}},"staticQueryHashes":["1171199041","1384082988","1711371485","1753898100","2100481360","229320306","23180105","528864852"]}