Overview#Social login, also known as social sign-in, is a form of single sign-on using existing login information from a Social Network services such as Facebook, Twitter or Google to sign into a third party website in lieu of creating a new login account specifically for that website. It is designed to simplify logins for end users as well as provide more and more reliable demographic information to web developers.
Although the definition from Wikipedia implies "in lieu of creating a new login account specifically for that website", the reality is there would typically be a Digital Identity created for "that website" but no credentials would be stored within this Digital Identity as "that website" would rely on the Social Login to provide Authentication.password authentication on the web suffers from a number of issues that reduce its efficacy, increase costs, and significantly increase risk for an organization. Fortunately, by leveraging Social Login, in which existing identities from social networks, like Facebook, Google, and Twitter, are used to register and sign in to sites, companies can mitigate these risks, reduce costs, and improve new customer conversion rates.
Benefits of Social Login#Social Login increases user logins by as much as 50%. As users are typically averse to creating yet another credential which they would need to keep track of, Social Login lowers the barriers to creating the login. Benefits of Social Login:
- Security is improved by shifting the burden of data protection to large-scale operators Social Networks.
- The cost of customer support required Password Management in is similarly transferred.
- Better User Experience as it less likely that your users will forget the more-commonly-used Password Authentication registered at their favorite Social Network.
- No UserId/passwords are transmitted during the third-party authentication process, only authorization tokens.
- Website owners can leverage security technologies implemented by the top IDPs that they might never be able to replicate themselves.
- Increases revenues by decreasing the friction of the customer registration process
Social Login Security#The top Social Login Identity Provider (IDP) use sophisticated technology that analyzes every sign-in attempt in real time, taking into account
- the user’s previous behavior
- the reputation of the IP address
- the geographical location of the sign-in attempt
Google (and maybe the others) alerts users when unusual Authentication is detected on their account. For instance, if a user has a pattern of signing in from a particular city or state, and then Authentication in from a distant country on the other side of the world, Google will notify the user by email. If this security tactic sounds familiar, it should—Payment Card companies employ the same mechanisms to prevent and detect unauthorized activity.
Most of the The top Social Login also provide Multi-Factor Authentication abilities.organizational Entitys requiring advanced security measures, such as those outlined in the Federal Identity, Credential, and Access Management (FICAM) framework, compliance can be achieved, cost-effectively, through the use of IDPs that support the Provider Authentication Policy Extension (PAPE), such as Google, PayPal, and Symantec (formerly Verisign).
When FICAM support is requested by a website at user sign-in, all API calls to the IDP include the request that FICAM policies be applied to the authentication and user data shared with the site by the consumer.Legitimacy of Social Login is increasing.
More Information#There might be more information for this subject on one of the following:
- Federated Identity
- Identity Sovereignty
- Legitimacy of Social Login
- OAuth 2.0 Client Registration
- OAuth Scope Example
- Privileged Scope
- Single Sign-On Scenarios
- Social Identity Provider
- Social Networks
- Web Blog_blogentry_030117_1
- Web Blog_blogentry_190515_1
Facebook joined the OpenID Foundation’s board as a sustaining corporate member. - based on information obtained 2016-03-18