{"componentChunkName":"component---src-templates-tag-js","path":"/tags/identity-provider/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":2,"edges":[{"node":{"fields":{"slug":"/identity/lr-launches-autolookup-idp/"},"html":"<p>In the dynamic world of customer identity and access management (CIAM), LoginRadius continues to lead the way with innovative solutions. The latest addition to their arsenal is the Auto Lookup IDP feature, designed to elevate user authentication by simplifying the redirection process to Identity Providers (IDP). </p>\n<p>This blog explores the benefits and features of this cutting-edge enhancement, shedding light on how it revolutionizes the login experience.</p>\n<h2 id=\"what-is-lookup-idp-how-does-it-benefit-modern-businesses\" style=\"position:relative;\"><a href=\"#what-is-lookup-idp-how-does-it-benefit-modern-businesses\" aria-label=\"what is lookup idp how does it benefit modern businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Lookup IDP? How Does it Benefit Modern Businesses?</h2>\n<p>Auto Lookup IDP is a game-changer in the realm of CIAM, offering users a hassle-free way to authenticate without the complexities of manual configuration. </p>\n<p>This feature allows customers to enable redirection to their configured Identity Provider based on the email domain, eliminating the need for users to input the configuration name. Let's delve into the key aspects that make Auto Lookup IDP a standout feature.</p>\n<p>Let’s understand the business advantages of Lookup IDP. </p>\n<h3 id=\"enhanced-user-experience\" style=\"position:relative;\"><a href=\"#enhanced-user-experience\" aria-label=\"enhanced user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced User Experience</h3>\n<p>The primary goal of Auto Lookup IDP is to provide users with a <a href=\"https://www.loginradius.com/customer-experience-solutions/\">significantly improved authentication experience.</a> </p>\n<p>Users can now enjoy a smoother and more seamless login journey by simplifying the redirection process to the Identity Provider. This enhancement fosters user satisfaction and positions LoginRadius as a platform that prioritizes user-centric design.</p>\n<p><a href=\"https://www.loginradius.com/resource/omnichannel-retailer-customer-experience\"><img src=\"/97493d8448255a746b2255c3db92669b/WP-omnichannel-retail.webp\" alt=\"WP-omnichannel-retail\"></a></p>\n<h3 id=\"time-saving-for-customers\" style=\"position:relative;\"><a href=\"#time-saving-for-customers\" aria-label=\"time saving for customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Time-Saving for Customers</h3>\n<p>Time is a precious resource, and LoginRadius understands the importance of efficiency. With Auto Lookup IDP, customers can save valuable time and effort that would otherwise be spent manually configuring the IDP redirection based on the email domain.</p>\n<p>The elimination of the need to input configuration names translates to a more streamlined and time-efficient process.</p>\n<h2 id=\"feature-highlights\" style=\"position:relative;\"><a href=\"#feature-highlights\" aria-label=\"feature highlights permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Feature Highlights</h2>\n<h3 id=\"simplified-redirection-to-identity-provider\" style=\"position:relative;\"><a href=\"#simplified-redirection-to-identity-provider\" aria-label=\"simplified redirection to identity provider permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Simplified Redirection to Identity Provider</h3>\n<p>Auto Lookup IDP simplifies the authentication process by allowing customers to enable redirection to their configured Identity Provider based on the email domain. This eliminates the cumbersome task of entering configuration names, making it more user-friendly and efficient.</p>\n<h3 id=\"domain-based-idp-mapping\" style=\"position:relative;\"><a href=\"#domain-based-idp-mapping\" aria-label=\"domain based idp mapping permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Domain-Based IDP Mapping</h3>\n<p>The feature introduces domain-based IDP mapping, ensuring that IDP configurations are seamlessly connected with specific domains. This innovation enhances security and streamlines the access process for users, as configurations are pre-mapped for a secure and efficient user experience.</p>\n<h2 id=\"use-cases\" style=\"position:relative;\"><a href=\"#use-cases\" aria-label=\"use cases permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Use Cases</h2>\n<h3 id=\"administrative-efficiency\" style=\"position:relative;\"><a href=\"#administrative-efficiency\" aria-label=\"administrative efficiency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Administrative Efficiency</h3>\n<p>System administrators can leverage the enhanced redirection feature to map IDP configurations with corresponding domains effortlessly. This not only reduces manual input but also facilitates the management of multiple configurations, streamlining administrative tasks and enhancing overall system efficiency.</p>\n<h3 id=\"user-satisfaction\" style=\"position:relative;\"><a href=\"#user-satisfaction\" aria-label=\"user satisfaction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Satisfaction</h3>\n<p>Customers no longer need to remember or input configuration names during the login process. This significant improvement simplifies the authentication process, reducing friction and contributing to increased user satisfaction.</p>\n<h3 id=\"cost-saving\" style=\"position:relative;\"><a href=\"#cost-saving\" aria-label=\"cost saving permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cost Saving</h3>\n<p>Auto Lookup IDP isn't just about enhancing user experience; it's also a strategic move that saves costs. By improving efficiency and reducing the complexities associated with manual configuration, organizations can realize tangible cost savings in their CIAM implementation.</p>\n<h2 id=\"to-conclude\" style=\"position:relative;\"><a href=\"#to-conclude\" aria-label=\"to conclude permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>To Conclude</h2>\n<p>LoginRadius' Auto Lookup IDP emerges as a beacon of innovation in the CIAM landscape, offering a solution that not only simplifies but transforms the user authentication process. </p>\n<p>With a focus on improved user experience, streamlined login processes, and cost-saving measures, Auto Lookup IDP solidifies LoginRadius' commitment to providing cutting-edge solutions for <a href=\"https://www.loginradius.com/blog/identity/seamless-customer-journey-identity-management/\">seamless customer identity and access management</a>. </p>\n<p>As the digital landscape continues to evolve, LoginRadius stands at the forefront, empowering organizations to deliver secure, efficient, and user-friendly authentication experiences. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=lr-launches-autolookup-idp\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 21, 2023","updated_date":null,"title":"Streamlining Authentication: Elevate User Experience with LoginRadius AutoLookup","tags":["identity provider","user authentication","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2,"src":"/static/9563ca1ba4dac690650434805fbe8a17/c0524/autolookup-idp.webp","srcSet":"/static/9563ca1ba4dac690650434805fbe8a17/61e93/autolookup-idp.webp 200w,\n/static/9563ca1ba4dac690650434805fbe8a17/1f5c5/autolookup-idp.webp 400w,\n/static/9563ca1ba4dac690650434805fbe8a17/c0524/autolookup-idp.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/what-is-federated-identity-management/"},"html":"<h2 id=\"what-is-federated-identity-management\" style=\"position:relative;\"><a href=\"#what-is-federated-identity-management\" aria-label=\"what is federated identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Federated Identity Management</h2>\n<p><em>Federated identity management or federation identity management was designed as a set of protocols and standards to help businesses share consumer identities.</em></p>\n<p>Let's face it upfront. Password management is a painful exercise, which no one wants to deal with. Though guessable passwords make them easy to remember, it exposes consumers to hackers. Fortunately, federated ID management ensures both seamless and secure access that goes a long way in enhancing the overall user-experience</p>\n<p>Though guessable passwords make password management hassle-free, it exposes users to hackers. No wonder a large chunk of consumers often falls prey to sensational data theft. </p>\n<p>Fortunately, <em>Federated Identity Management</em> (FIM) has got the right answer to it, which both organizations and end users would prefer to have at the disposal - sooner than later. </p>\n<h2 id=\"understanding--federated-identity-management\" style=\"position:relative;\"><a href=\"#understanding--federated-identity-management\" aria-label=\"understanding  federated identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding  Federated Identity Management</h2>\n<p>Federated identity management is an arrangement that can be brought into effect between two or more trusted domains to enable users to access applications and services using the same <a href=\"https://www.loginradius.com/blog/identity/2019/10/digital-identity-management/\">digital identity</a>. FIM ensures both seamless and secure access that goes a long way in enhancing the overall user-experience. </p>\n<p>To have a fair perspective, we will have to take an in-depth look at the whole scenario and learn what is a federated identity.</p>\n<p>Every time an enterprise introduces a new application, consumers are forced to create a password for sign-in. Already burdened by a ton of passwords, most consumers either opt for a simple code or use the same cliched ones they have been using for a while. This results in a massive pile-up of passwords that they have to remember. </p>\n<p>An <a href=\"https://www.newswire.com/news/new-research-most-people-have-70-80-passwords-21103705\">average person has 70-80 passwords</a>, and that's a lot to remember. The entire cycle of creating passwords, forgetting, and resetting is vexing - to say the least!</p>\n<p>While it is easier to blame end-users for being unable to manage passwords, enterprises are also indirectly responsible for the whole mess-up.</p>\n<p>What's the point of spending millions on driving traffic if the end-users' access to your offered product is fraught with risk? </p>\n<p>Well, this is where federated id management comes into the reckoning.</p>\n<h2 id=\"what-is-an-identity-provider\" style=\"position:relative;\"><a href=\"#what-is-an-identity-provider\" aria-label=\"what is an identity provider permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is an Identity Provider</h2>\n<p>Another pivotal aspect of FIM is an <a href=\"https://www.loginradius.com/identity-providers/\">Identity Provider</a> that manages everything from behind the scene. In a nutshell, an identity provider (also known as IdP) has the responsibility of creating and managing consumers.</p>\n<p>Whenever a consumer tries to sign in to the application, an IdP authenticates the login credentials. After the authentication is complete, the application lets the consumer in. </p>\n<h2 id=\"how-does-fim-work\" style=\"position:relative;\"><a href=\"#how-does-fim-work\" aria-label=\"how does fim work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does FIM Work</h2>\n<p>Let's understand how federated id management work with an example. Let's assume your business needs to collaborate with a third-party. In the absence of a federated identity, you will need to set up an account on their website with a username and password to access their domain. </p>\n<p>So, when the consumer leaves, you will have to ask them to cancel the account and remove access. </p>\n<p>With a federated identity management system, the consumer will need to login only once using the assigned username and password. Once they are allowed in, they only need to click on the partner company page. They will be redirected to a request page where they can authenticate their access. </p>\n<p>The portal will directly verify the consumer’s data through <a href=\"https://www.loginradius.com/single-sign-on/\">Security Assertion Markup Language</a> (SAML) or OpenID standards.</p>\n<p>As soon as they are granted access, they would be redirected to the partner company's page.</p>\n<p>So, the next time they log in to your company page, the consumer will also get access to the partner page over a quick authentication request.</p>\n<p><img src=\"/d0ef214caec023c77d823bd84b0aa9da/federated-identity2.webp\" alt=\"federated-identity2\"></p>\n<h2 id=\"advantages-of-using-federated-identity-management\" style=\"position:relative;\"><a href=\"#advantages-of-using-federated-identity-management\" aria-label=\"advantages of using federated identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Using Federated Identity Management</h2>\n<p>Though FIM has several advantages, we are going to highlight the most pivotal ones: </p>\n<ul>\n<li><strong>Reduces administrative overhead:</strong> Another significant advantage of FIM is the ability to reduce administrative overhead. Thus, the administrator remains away from the complexity of creating multiple accounts and spending hours managing different ‘username’ and ‘password’ combinations.</li>\n<li><strong>Single sign-on:</strong> With Federated Identity, businesses can implement <a href=\"https://www.loginradius.com/blog/identity/2019/05/what-is-single-sign-on/\">single sign-on</a> using existing Active Directory credentials. This means consumers need not create new accounts for each service provider or remember multiple usernames and passwords. </li>\n<li><strong>Minimizes security risks</strong>: You can keep the authentication process within your on-premises Active Directory using Federated Identity. You do not even need to synchronize password hashes on the cloud, as they are stored on-premises, behind your firewall. </li>\n<li><strong>Increases organizational productivity</strong>: Due to the lack of multiple logins, there will be lesser helpdesk calls for password resets. This saves a lot of time and efficiency, which leads to a potential increase in administrative overhead. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/federated-identity-management-datasheet\"><img src=\"/e173164298ff897f561e7f161b58ff91/federated-identity-management.webp\" alt=\"federated-identity-management\"></a></p>\n<h2 id=\"risk-management-in-federated-identity-management\" style=\"position:relative;\"><a href=\"#risk-management-in-federated-identity-management\" aria-label=\"risk management in federated identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risk Management in Federated Identity Management</h2>\n<p>Risk management is a critical aspect of Federated Identity Management (FIM), ensuring that the benefits of streamlined access and improved user experience do not come at the cost of security vulnerabilities.</p>\n<p><strong>1. Minimizing Password-Related Risks:</strong> FIM reduces the need for multiple passwords, which are often weak and reused across platforms. By centralizing authentication through an Identity Provider (IdP), FIM minimizes the risk of password-related breaches.</p>\n<p><strong>2. Enhancing Authentication Security:</strong> FIM systems often employ robust authentication protocols such as Security Assertion Markup Language (SAML), OpenID Connect, and OAuth 2.0. These protocols enhance the security of authentication processes, ensuring that only authorized users gain access.</p>\n<p><strong>3. Controlling Access Privileges:</strong> With FIM, administrators can manage access privileges more efficiently. This centralized control allows for timely updates to user permissions, reducing the risk of unauthorized access due to outdated or incorrect user roles.</p>\n<p><strong>4. Protecting Sensitive Data:</strong> By keeping authentication processes within a secure, on-premises environment or a trusted cloud service, FIM ensures that sensitive data, such as password hashes, remain protected from potential breaches.</p>\n<p><strong>5. Monitoring and Auditing:</strong> FIM systems typically include comprehensive logging and monitoring capabilities. These tools allow organizations to track access attempts, detect anomalies, and quickly respond to potential security threats.</p>\n<h2 id=\"why-businesses-should-consider-implementing-federated-identity\" style=\"position:relative;\"><a href=\"#why-businesses-should-consider-implementing-federated-identity\" aria-label=\"why businesses should consider implementing federated identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Businesses Should Consider Implementing Federated Identity</h2>\n<p>Businesses should implement FIM due to its versatility. It lets users access data with utmost ease while still offering a top-notch <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">safeguard against data breaches</a>.</p>\n<p>Apart from boosting the user experience, it also takes control of administrative overhead. Add to that the lucrative cost-effective measure. </p>\n<h2 id=\"common-challenges-in-federated-identity-management\" style=\"position:relative;\"><a href=\"#common-challenges-in-federated-identity-management\" aria-label=\"common challenges in federated identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common Challenges in Federated Identity Management</h2>\n<p>While Federated Identity Management offers numerous advantages, implementing it comes with its own set of challenges that organizations need to address.</p>\n<h3 id=\"1-integration-complexity\" style=\"position:relative;\"><a href=\"#1-integration-complexity\" aria-label=\"1 integration complexity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Integration Complexity</h3>\n<p>Integrating FIM with existing systems and applications can be complex. Organizations often face difficulties in ensuring seamless interoperability between various platforms and the FIM system.</p>\n<h3 id=\"2-trust-establishment\" style=\"position:relative;\"><a href=\"#2-trust-establishment\" aria-label=\"2 trust establishment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Trust Establishment</h3>\n<p>Establishing and maintaining trust between different domains is crucial for FIM. Ensuring that all parties adhere to the same security standards and protocols is essential, but can be challenging.</p>\n<h3 id=\"3-identity-provider-dependence\" style=\"position:relative;\"><a href=\"#3-identity-provider-dependence\" aria-label=\"3 identity provider dependence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Identity Provider Dependence</h3>\n<p>Relying on a single IdP can create a single point of failure. If the IdP experiences downtime or a security breach, it can disrupt access to multiple services and applications.</p>\n<h3 id=\"4-user-privacy-concerns\" style=\"position:relative;\"><a href=\"#4-user-privacy-concerns\" aria-label=\"4 user privacy concerns permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. User Privacy Concerns</h3>\n<p>Handling user identities across multiple domains raises privacy concerns. Organizations must ensure that user data is managed in compliance with relevant data protection regulations and that users' privacy is respected.</p>\n<h3 id=\"5-administrative-overhead\" style=\"position:relative;\"><a href=\"#5-administrative-overhead\" aria-label=\"5 administrative overhead permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Administrative Overhead</h3>\n<p>While FIM reduces some administrative tasks, it can introduce others. Administrators need to manage the FIM infrastructure, handle federated trust relationships, and ensure ongoing compliance with security policies.</p>\n<h3 id=\"6-security-risks\" style=\"position:relative;\"><a href=\"#6-security-risks\" aria-label=\"6 security risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Security Risks</h3>\n<p>Despite its security benefits, FIM can introduce new risks. Misconfigurations, inadequate monitoring, and failures in protocol implementations can expose the system to security threats.</p>\n<p>Addressing these challenges requires careful planning, robust infrastructure, and continuous monitoring to ensure that the FIM system delivers its promised benefits without compromising security or usability.</p>\n<h2 id=\"introduction-to-loginradius-federated-identity-management\" style=\"position:relative;\"><a href=\"#introduction-to-loginradius-federated-identity-management\" aria-label=\"introduction to loginradius federated identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction to LoginRadius' Federated Identity Management</h2>\n<p><img src=\"/ce0ea1b88b32dc0e0ef9a48fd39c1e32/federated-identity3.webp\" alt=\"federated-identity3\"></p>\n<p>Equipped with custom technologies, LoginRadius' FIM takes federated identity management experience to an altogether new level. </p>\n<p>It simplifies the implementation of Single Sign-On (SSO) and user experience across applications. Consumers can access multiple applications without requiring a new access credential.</p>\n<p>The key capabilities of federated identity management by LoginRadius include:</p>\n<ul>\n<li>LoginRadius supports industry-standard SSO protocols like SAML, JWT, OAuth 2.0, OpenID Connect, and Web Services Federation.</li>\n<li>The <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">CIAM</a> platform offers a simple dashboard to manage all configurations required for these protocols. </li>\n<li>LoginRadius covers end-to-end API support for the SSO protocols. This makes integration and implementation relatively easy to execute. </li>\n<li>LoginRadius acts as an IdP that stores and authenticates the identities consumers use to log in to systems. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Federated identity management is increasingly becoming a must-have for more than one reason. Enterprises have realized that the huge spending on an advertisement, boosting traffic, and the endless campaign counts for nothing if the core customers aren't pleased. </p>\n<p>FIM enhances the overall user experience of a customer by bringing into effect the much-required ease of use and intuitive experience, which makes it a real business enabler. Putting <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">security threats</a> like hacking and sensational data theft at a fair distance goes a long way in assisting an organization win the coveted trust.</p>\n<p>FIM is all set to go mainstream for being a relatively young technology, which speaks volumes of the rapid pace with which organizations are implementing it. </p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is federated identity management?</strong></p>\n<p>Federated Identity Management (FIM) is a system that allows users to access multiple applications across trusted domains using the same digital identity.</p>\n<p><strong>2. What is an example of a federated identity?</strong></p>\n<p>An example of a federated identity is using a Google account to sign in to third-party applications like YouTube, Spotify, or various online services.</p>\n<p><strong>3. What are the 3 most important components of federated identity?</strong></p>\n<p>The three most important components are the Identity Provider (IdP), the Service Provider (SP), and the authentication protocols like SAML, OAuth, or OpenID Connect.</p>\n<p><strong>4. What is the function of a federated identity?</strong></p>\n<p>A federated identity enables seamless and secure access to multiple applications and services without the need for separate login credentials.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-federated-identity-management\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 04, 2021","updated_date":null,"title":"What is Federated Identity Management","tags":["federated identity management","identity provider","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/10b334add07a2af49998e59d9a897d5c/7f8e9/what-is-fim.webp","srcSet":"/static/10b334add07a2af49998e59d9a897d5c/61e93/what-is-fim.webp 200w,\n/static/10b334add07a2af49998e59d9a897d5c/1f5c5/what-is-fim.webp 400w,\n/static/10b334add07a2af49998e59d9a897d5c/7f8e9/what-is-fim.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]}},"pageContext":{"tag":"identity provider"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}