Revision as of 09:53, 11 February 2013 editTiibiidii (talk | contribs)34 edits Undid GauravShael vandalism← Previous edit | Revision as of 11:29, 24 February 2013 edit undo94.12.101.43 (talk) ←Replaced content with 'check out overgrown pinapples web'Tag: blankingNext edit → | ||
Line 1: | Line 1: | ||
check out overgrown pinapples web | |||
'''Social login''', also known as '''social sign-in''', is a form of ] using existing ] information from a ] such as ] or ] to sign into a third party ] in lieu of creating a new login account specifically for that website. It is designed to simplify logins for end users as well as provide more and more reliable demographic information to web developers.<ref> (accessed 21 December 2011)</ref> | |||
Social login is often considered a gateway to many of the recent trends in ] and ] because it can be used as a mechanism for both ] and ]. | |||
==How social login works== | |||
Social login links logins to one or more social networking services to a website, typically using either a ] or a ]. By selecting the desired social networking service, the user simply uses his or her login for that services to sign on to the web site. This in turn negates the need for the end user to remember login information for multiple ] and other websites while providing site owners with uniform demographic information as provided by the social networking service. Many sites which offer social login also offer more traditional online registration for those who desire it. | |||
== Application == | |||
Social login can be implemented strictly as an authentication system using standards such as ] or ]. For consumer websites that offer social functionality to users, social login often implemented using the ] standard. OAuth is a secure authorization protocol which is commonly used in conjunction with authentication to grant 3rd party applications a "]" allowing them to make API calls to providers on the user’s behalf. Sites using social login in this manner typically offer social features such as commenting, sharing, reactions and ]. | |||
While social login can be extended to corporate websites,<ref> - Altimeter Group, September 27, 2010</ref> the majority of social networks and consumer-based identity providers allow . For this reason, social login is generally not used for strict, highly secure applications such those in banking or health. | |||
==Advantages of social login== | |||
Studies have shown that web site registration forms are inefficient as many people provide false data, forget their login information for the site or simply decline to register in the first place. A study conducted during in 2011 by Janrain and Blue Research found that 77 percent of consumers favored social login as a means of authentication over more traditional online registration methods.<ref> MarketingSherpa, January 12, 2012</ref> Additional benefits: | |||
* ''Targeted Content'' - Websites can obtain a profile and social graph data in order to target personalized content to the user. This includes information such as name, email, hometown, interests, activities and friends. | |||
* ''Multiple Identities'' - Users can log in to websites with multiple social identities allowing them to better control their online identity.<ref> - AllThingsD, January 1, 2011</ref> | |||
* ''Registration Data'' - Many websites use the profile data returned from social login instead of having users manually enter their ] (Personally Identifiable Information) into web forms. This can potentially speed up the registration or sign-up process. | |||
* ''Pre-Validated Email'' - Identity providers who support email such as ] and ] can return the user’s email address to the 3rd party website preventing the user from supplying a fabricated email address during the registration process. | |||
* ''Account linking'' - Because social login can be used for authentication, many websites allow legacy users to link pre-existing site account with their social login account without forcing re-registration. | |||
==Aggregating social login== | |||
Social login applications compatible with many social networking services are available to web developers using ]ging platforms such as ]. Companies such as ], ], Oneall.com, Lanoba.com and ] also provide single solution social login services for web developers. These companies can provide social login access to 20 or more social network sites.<ref>, Janrain</ref> | |||
==Security== | |||
In March, 2012, a research paper<ref>{{cite web| | |||
url=http://research.microsoft.com/apps/pubs/default.aspx?id=160659 | |||
|title=Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services | |||
|author=Rui Wang, Shuo Chen, and XiaoFeng Wang}}</ref> reported an extensive study on the security of social login mechanisms. The authors found 8 serious logic flaws in high-profile ID providers and relying party websites, such as ] (including Google ID and PayPal Access), ], ], ], ], ], etc. Because the researchers informed ID providers and relying party websites prior to public announcement of the discovery of the flaws, the vulnerabilities were corrected, and there have been no security breaches reported.<ref> - OpenID Foundation, March 14, 2012</ref> | |||
== List of common social networking services using social login == | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
* ] | |||
==See also== | |||
* ] | |||
==References== | |||
{{Reflist}} | |||
==External links== | |||
* | |||
* | |||
* | |||
* | |||
==Further reading== | |||
* - Social Technology Review; January 10, 2011 | |||
* - Windows IT Pro, 2/28/2011. | |||
* ] - Misplaced Pages | |||
* - Slideshare, 2010 | |||
* - Venturebeat; October 18, 2011 | |||
{{DEFAULTSORT:Social login}} | |||
] | |||
] | |||
] | |||
] |
Revision as of 11:29, 24 February 2013
check out overgrown pinapples web