Skip to content

Commit

Permalink
Merge pull request #1994 from LoginRadius/develop
Browse files Browse the repository at this point in the history
added custom canonical option
  • Loading branch information
kailashloginradius authored Sep 13, 2024
2 parents df60027 + 1ea34ea commit d7a2f3f
Show file tree
Hide file tree
Showing 24 changed files with 38 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ coverImage: "triplets.jpg"
author: "Archna Yadav"
tags: ["iam","ciam","idaas","identity"]
description: "Over time, organizations are using many terminologies for IAM, CIAM, and IDaaS platforms. This article clarifies the use of these terms, key features, and common use cases of IAM, CIAM, and IDaaS platforms."
canonical: https://www.loginradius.com/blog/identity/iam-vs-ciam/
---

Digital Identity and IAM Domain have been the talk of the technology town for decades. There has been plenty of research, innovation, and information around these two, which led to many terminologies for the platforms providing the relevant features. Some of these terminologies are specific to the characteristics of the platform, while others are used interchangeably.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,8 @@ date: "2021-05-12"
coverImage: "cover.jpg"
author: "Akash Patil"
tags: ["Authentication", "React", "CLI", "LoginRadius CLI"]
description: "In this tutorial, we will learn about implementing authentication for React applications using LoginRadius in under 5 mins. We will be using the LoginRadius CLI, through which we can perform basic actions of the LoginRadius Dashboard on the command line in a fast and proficient manner."
description: "In this tutorial, we will learn about implementing authentication for React applications using LoginRadius in under 5 mins. We will be using the LoginRadius CLI, through which we can perform basic actions of the LoginRadius Dashboard on the command line in a fast and proficient manner."
canonical: https://www.loginradius.com/blog/engineering/guest-post/role-based-user-authentication-with-loginradius-and-reactjs/
---

Hey Everyone !!! This blog will walk you through the steps necessary to quickly implement authentication mechanisms for your React application by leveraging [LoginRadius](https://accounts.loginradius.com/auth.aspx?return_url=https://dashboard.loginradius.com/login) and the [LoginRadius CLI](https://github.com/LoginRadius/lr-cli) with the help of examples.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ date: "2020-06-04"
coverImage: automation_ief.png
author: Sudhey Sharma
tags: ["OpenSource","Automation"]
canonical: https://www.loginradius.com/blog/identity/loginradius-identity-experience-framework/
---

We're delightfully announcing the open source automation suite to test all the standard authentication cases of LoginRadius Identity Experience Framework.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ coverImage: "authentication-main.png"
author: "Versha Gupta"
tags: ["Authentication", "LoginRadius", "React"]
description: "This article focuses on helping developers learn how to integrate user authentication in React applications and determine the basic principles of authentication with React."

canonical: https://www.loginradius.com/blog/engineering/guest-post/role-based-user-authentication-with-loginradius-and-reactjs/
---

This guide uses LoginRadius API for authenticating React apps. It provides React developers with a more straightforward way to add user authentication to react apps. To handle a lot of authentication implementation information, LoginRadius offers a high-level API. Using security best practices, now you can protect your response apps while writing less code.
Expand Down
1 change: 1 addition & 0 deletions content/growth/10-things-know-about-social-login/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Ivana Radevska"
description: "Businesses are still relying on old-school login and authentication mechanisms, including organization-level IAM, which is why their business lags behind their competitors. Let’s discuss why businesses need to replace their traditional IAM with new-age CIAM."
metatitle: "Decoding Social Media Login: 10 Essential Insights on Social Sign In and Sign On"
metadescription: "Elevate user experience with social login. Explore key insights on social sign-in and enhance your understanding. Implement now for seamless interactions!"
canonical: https://www.loginradius.com/social-login/
---
## Introduction

Expand Down
1 change: 1 addition & 0 deletions content/identity/adaptive-authentication/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Vishal Sharma"
description: "Adaptive authentication is a game-changer for enterprises that require strong fencing to protect consumer and enterprise data. Here’s a quick read depicting the role and need for adaptive authentication instead of just multi-factor authentication."
metadescription: "Adaptive authentication offers robust and secure authentication. Learn how adaptive authentication can work for securing your business and consumer data."
metatitle: "Adaptive Authentication for Frictionless Customer Experience"
canonical: https://www.loginradius.com/blog/engineering/what-is-adaptive-authentication/
---
## Introduction

Expand Down
1 change: 1 addition & 0 deletions content/identity/benefits-of-mfa/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rakesh Soni"
description: "When it comes to information security, the MFA plays a crucial role. It protects information from possible hacks, keeps an eye on employee accounts, and scares hackers away. Besides this even though their login credentials are leaked by accident, it protects users."
metatitle: "7 Benefits of Using Multi-Factor Authentication ( MFA)"
metadescription: "Multi-Factor Authentication (MFA) is used to verify customer identity. Learn benefits of using multi-factor authentication and how it enhances business security using additional layers of authentication."
canonical: https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/
---
One of the primary mfa benefits is that it provides additional security layers and decreases the chance of consumer identities becoming compromised.

Expand Down
1 change: 1 addition & 0 deletions content/identity/benefits-single-sign-on/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rakesh Soni"
description: "Now that more enterprises are moving to the cloud, customers expect seamless access from anywhere, anywhere, and on any computer, to multiple applications. Likewise, as most large corporations have hundreds of touchpoints under different labels, trying to handle them all will strain their IT departments."
metatitle: "Unlocking the Top 7 Advantages of Single Sign-On (SSO)"
metadescription: "Discover the benefits of SSO and how it enhances productivity, security, and user experience. Implement SSO for streamlined authentication."
canonical: https://www.loginradius.com/blog/identity/what-is-single-sign-on/
---
## Introduction

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rakesh Soni"
description: "The most important assets of any company are customer identification and personal data. In most situations, businesses come across two simple options when designing a platform that collects, handles, and uses consumer data: to create or to purchase."
metatitle: "Build vs Buy: Securing Customer Identity"
metadescription: "A comprehensive guide on building vs buying IAM solutions. Read this blog to find out which is the most cost-effective option for your business."
canonical: https://www.loginradius.com/resource/ciam-build-vs-buy/
---

Consumer identities and personal data are the most crucial assets of any enterprise. And, _managing these digital identities ain't easy._
Expand Down
1 change: 1 addition & 0 deletions content/identity/ciam-improve-customer-support/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rajeev Sharma"
description: "Whether it’s intuitive and personalized user onboarding or a unified view of every consumer, CIAM is becoming the need of the hour for diverse industries. Let’s learn about the endless possibilities of a CIAM that delivers the highest level of customer support services."
metatitle: "How can CIAM Improve Customer Support?"
metadescription: "Customer support is the backbone of any business’s success. Learn how a CIAM solution helps enterprises in enhancing their customer support services."
canonical: https://www.loginradius.com/blog/identity/customer-identity-and-access-management/
---

Customer support is considered the most critical aspect of business success in a modern, digitally advanced, and competitive world.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Srishti Singh"
description: "Password-based login is the most commonly used form of authentication, but it's not always the most secure. This blog covers some of the common security issues found in password-based login systems and how to avoid them."
metatitle: "Common Vulnerabilities in Password-Based Login"
metadescription: "Password-based login is a common way to authenticate to a system, but it doesn't always offer strong security. Learn some tips to avoid the vulnerabilities."
canonical: https://www.loginradius.com/blog/identity/best-practices-username-password-authentication/
---
## Introduction

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Deepak Gupta"
description: "Meeting the expectation of consumers these days isn’t a piece of cake for retailers as the modern consumer demands digital experiences at every touchpoint before making a purchase. This insightful read covers all the major challenges that retailers and e-commerce vendors face and how they can overcome them."
metatitle: "Key Customer Identification Challenges in Retail Industry"
metadescription: "Retailers and e-commerce businesses are facing diverse customer identification related challenges. Here’s everything on how they can overcome them."
canonical: https://www.loginradius.com/blog/identity/loginradius-ciam-retail-ecommerce-business/
---

Customer identification is becoming a steep climb for retail businesses since customers are no longer forced to consider from among a few options. Today, they have hundreds of options available, both online and offline.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rakesh Soni"
description: "The customer login experience is taken over by customer identity and access management (CIAM). There's more than just registration and authentication at stake. You're losing out on a host of advantages if all you get from your clients when they log in is an email address to send newsletters and passwords. We illustrate in this article how CIAM will help the organisation face the future head-on."
metatitle: "What is CIAM? - Discover The Benefits"
metadescription: "Customer identity and access management (CIAM) are taking over the customer experience. There's more at stake than just registration & authentication."
canonical: https://www.loginradius.com/blog/identity/perfect-ciam-platform/
---

## Introduction
Expand Down
1 change: 1 addition & 0 deletions content/identity/difference-sso-social-login/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Deepak Gupta"
description: "The era of unified login has offered numerous ways through which users can authenticate themselves securely and seamlessly. Let’s understand the fundamental differences between SSO and Social Login that helps you choose the right authentication solution for your business requirements."
metatitle: "SSO vs. Login: Learn the Difference"
metadescription: "Social login and SSO are helping brands bridge the gap between user experience and security. This post uncovers the differences between social login and SSO."
canonical: https://www.loginradius.com/blog/identity/what-is-single-sign-on/
---

## Introduction
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rakesh Soni"
description: "With the market for CIAM solutions rapidly evolving, choosing the right one for your organization's unique needs can take time. Hence, you must analyze the entire CIAM landscape, and your business needs to decide wisely."
metatitle: "Navigate CIAM Excellence: A Comprehensive Guide"
metadescription: "Dive into the potential of your business with the right Customer Identity and Access Management (CIAM) solution. Explore key factors, features, and best practices in our guide."
canonical: https://www.loginradius.com/blog/identity/customer-identity-and-access-management/
---

## Introduction
Expand Down
1 change: 1 addition & 0 deletions content/identity/iam-vs-ciam/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Deepak Gupta"
description: "In order to serve customers, conventional identity management is no longer enough. This truly ought to go without saying. After all, internal management systems were initially designed to handle employee identities, and consumer preferences are not generally matched with their preferences of a successful user experience."
metatitle: "IAM vs. CIAM: Which Solution is Right For You? [Infographic]"
metadescription: "In order to serve customers, conventional identity management is no longer enough. In this infographic, iam vs ciam, check out which solution is better for you"
canonical: https://www.loginradius.com/blog/identity/customer-identity-and-access-management/
---

The conventional employee identity and access management (IAM) systems were initially designed to manage employee identities. And they aren’t potent enough to cater to customers' diverse needs pertaining to user experience and security.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Kundan Singh"
description: "LoginRadius is a rapidly-expanding identity management platform. And this time, for its current and new clients, the cloud-based client identity and access management solution has introduced a PIN Login authentication environment."
metatitle: "PIN Authentication With Enhanced Features | LoginRadius"
metadescription: "LoginRadius announces the launch of PIN-based login as an additional factor of authentication & usability enhancement to reduce the pain of password."
canonical: https://www.loginradius.com/blog/identity/what-is-pin-authentication/
---
LoginRadius is a rapidly-expanding platform. And this time, the cloud-based customer identity and access management solution has launched a PIN Login authentication environment for its existing and new customers.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rakesh Soni"
description: "The war cry among experts lately when it comes to online safety is: The future is passwordless! So, why does passwordless authentication matter so much?"
metatitle: "Unlock Security: Exploring Passwordless Authentication"
metadescription: "Dive into the future of identity protection with passwordless authentication. Discover methods, benefits, and how LoginRadius ensures robust security."
canonical: https://www.loginradius.com/blog/identity/what-is-passwordless-login/
---

When it comes to online security, the battle cry among experts lately is: “The future is passwordless!” So, why is passwordless authentication so important?
Expand Down
1 change: 1 addition & 0 deletions content/identity/perfect-ciam-platform/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Deepak Gupta"
description: "More than just individuals, a perfect CIAM platform needs to be able to incorporate. There are plenty of business processes and activities loaded with identity, and the number of these is only set to increase in the future. Both native and third-party applications that manage customer data are linked by a well-designed customer identity solution."
metatitle: "8 Key Components of a Perfect CIAM Platform"
metadescription: "More than just individuals, a perfect CIAM platform needs to be able to incorporate. There are plenty of corporate processes and procedures packed with identity."
canonical: https://www.loginradius.com/blog/identity/guide-choosing-right-ciam-solution/
---

If you aren’t already taking advantage of CIAM (customer identity and access management), you should be. But what components do you need to include if you want to implement the perfect CIAM platform? One that meets all of your organization’s needs, both now and in the future?
Expand Down
1 change: 1 addition & 0 deletions content/identity/risk-based-authentication/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rajeev Sharma"
description: "RBA is a method of applying various levels of stringency to authentication processes based on the likelihood that the access to a given system could result in it being compromised. As the level of risk increases, authentication becomes more restrictive."
metatitle: "What is Risk-Based Authentication"
metadescription: "What is risk-based authentication and how it works. Learn why businesses should use RBA and learn how to implement it using the LoginRadius RBA feature."
canonical: https://www.loginradius.com/blog/engineering/risk-based-authentication/
---

# What is Risk-Based Authentication
Expand Down
1 change: 1 addition & 0 deletions content/identity/what-is-single-sign-on/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Rakesh Soni"
description: "SSO is an essential feature of an Identity and Access Management (IAM) access control platform. User identity authentication is important when it comes to understanding which permissions a user will have. One example of controlling access that integrates user identity management solutions with SSO solutions is the LoginRadius Identity platform."
metatitle: "What Is Single Sign-On (SSO), SSO Authentication and How Does it Work?"
metadescription: "Single Sign-On (SSO) enables a user to sign in once to access all of their applications and services. Learn how SSO Authentication works, the benefits of implementing SSO. Read More."
canonical: https://www.loginradius.com/blog/identity/benefits-single-sign-on/
---
## Introduction

Expand Down
1 change: 1 addition & 0 deletions content/identity/what-is-social-login/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ author: "Vaibhav Jain"
description: "Social login is an attractive feature for developers and businesses that can help streamline consumer verification while also providing more reliable data access for personalization."
metatitle: "Elevate Engagement: Social Login Benefits for Your Business"
metadescription: "Discover the power of social login: enhance user experience, boost conversions. Learn how social login works and why it's essential for your business."
canonical: https://www.loginradius.com/blog/growth/why-should-implement-social-login-authentication/
---
## Introduction

Expand Down
15 changes: 12 additions & 3 deletions src/components/seo.js
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ import { StaticQuery, withPrefix } from "gatsby"
const SEO = ({
title,
description,
canonial,
image = null,
pathname = null,
article = false,
Expand Down Expand Up @@ -37,10 +38,11 @@ const SEO = ({
const seo = {
title: title || defaultTitle,
description: description || defaultDescription,
canonial: canonial,
image: img.includes("https") ? img : `${siteUrl}${img}`,
url: `${siteUrl}${withPrefix(pathname || "/")}`,
}
seo.url = seo.url.replace("/blog/blog","/blog");
seo.url = seo.url.replace("/blog/blog", "/blog")
return (
<>
<Helmet
Expand All @@ -64,7 +66,10 @@ const SEO = ({
>
<title lang="en">{seo.title}</title>
<link rel="icon" href={withPrefix("/favicon.png")} />
<link rel="canonical" href={seo.url} />
<link
rel="canonical"
href={seo.canonial !== "null" ? seo.canonial : seo.url}
/>
<meta http-equiv="content-language" content="en"></meta>
<meta name="description" content={seo.description} />
<meta name="image" content={seo.image} />
Expand All @@ -74,7 +79,10 @@ const SEO = ({
<meta name="twitter:site" content="@LoginRadius" />
<meta name="twitter:creator" content="@LoginRadius" />
<meta name="twitter:title" content={seo.title} />
<meta name="twitter:url" content={seo.url} />
<meta
name="twitter:url"
content={seo.canonial ? seo.canonial : seo.url}
/>
<meta name="twitter:description" content={seo.description} />
<meta name="twitter:card" content="summary_large_image" />
<meta name="twitter:image" content={seo.image} />
Expand All @@ -92,6 +100,7 @@ SEO.propTypes = {
description: PropTypes.string,
image: PropTypes.string,
pathname: PropTypes.string,
canonial: PropTypes.string,
article: PropTypes.bool,
}

Expand Down
3 changes: 3 additions & 0 deletions src/pages/{MarkdownRemark.fields__slug}.js
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ const BlogPostTemplate = ({ data }) => {
metatitle,
metadescription,
description,
canonical,
coverImage,
} = post.frontmatter
let type = ""
Expand All @@ -32,6 +33,7 @@ const BlogPostTemplate = ({ data }) => {
description={metadescription || description || post.excerpt}
image={coverImage && coverImage.childImageSharp.fluid.src}
pathname={pathname}
canonial={`${canonical}`}
article
/>
<Post post={post} type={type} />
Expand All @@ -58,6 +60,7 @@ export const pageQuery = graphql`
metadescription
description
title
canonical
date(formatString: "MMMM DD, YYYY")
tags
coverImage {
Expand Down

0 comments on commit d7a2f3f

Please sign in to comment.