loginradiusloginradius Blog

How Chrome’s Third-Party Cookie Restrictions Affect User Authentication?

Google Chrome has planned to phase out third-party cookies, which will affect different website functionalities depending on third-party cookies. This blog focuses on how this phase-out affects identity and user authentication and discusses alternatives for overcoming challenges.

Raghunath Reddy
By Raghunath Reddy
July 08, 2024
6 min read

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.

Book A Demo Today

How to Authenticate Svelte Apps

Are you building Svelte apps? In this tutorial, you'll learn to add secure user authentication in your Svelte apps using LoginRadius APIs.

Siddhant Varma
By Siddhant Varma
March 10, 2022
21 min read

How to Build Your Github Profile

Your GitHub profile is vital in showcasing your programming skills. Learn how you can leverage GitHub profile to showcase your skills and expertise.

Abhimanyu Singh Rathore
By Abhimanyu Singh Rathore
February 28, 2022
2 min read

Why Implement Search Functionality for Your Websites

Adding a search functionality is important for any website to improve user experience. Read more to understand the benefits of enabling search on your website.

Neha Vyas
By Neha Vyas
February 24, 2022
3 min read

Flutter Authentication: Implementing User Signup and Login

Developing Flutter apps? Learn how to implement user authentication and registration in your Flutter applications quickly with LoginRadius APIs.

Yusuf Ahmed
By Yusuf Ahmed
February 17, 2022
30 min read

How to Secure Your LoopBack REST API with JWT Authentication

Are you building dynamic REST APIs with LoopBack? In this tutorial, you'll learn how to implement user authentication and authorization in a Loopback REST API.

Ekekenta Odionyenfe Clinton
By Ekekenta Odionyenfe Clinton
February 04, 2022
18 min read

When Can Developers Get Rid of Password-based Authentication?

Authentication remains at the core of any application with user data and accounts. It ensures that only the authorized person is accessing the data and account. So far, Password-based authentication has been prevalent that developers mostly use.

Govind Malviya
By Govind Malviya
January 31, 2022
5 min read