{"id":8729,"date":"2023-05-11T10:54:00","date_gmt":"2023-05-11T14:54:00","guid":{"rendered":"https:\/\/nventive.com\/articles\/guide-how-to-securely-manage-user-identification\/"},"modified":"2025-05-27T22:34:10","modified_gmt":"2025-05-28T02:34:10","slug":"guide-how-to-securely-manage-user-identification","status":"publish","type":"post","link":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/","title":{"rendered":"Guide: How to Securely Manage User Identification"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8729\" class=\"elementor elementor-8729 elementor-8675\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8e5b5b e-flex e-con-boxed e-con e-parent\" data-id=\"3e8e5b5b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7235c8d5 elementor-widget elementor-widget-text-editor\" data-id=\"7235c8d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An essential in each of our custom projects, user and identity management is implemented by our experts to guarantee maximum security.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7936af6e e-flex e-con-boxed e-con e-parent\" data-id=\"7936af6e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46753c40 elementor-widget elementor-widget-text-editor\" data-id=\"46753c40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Obviously, in the era of cloud computing, a multitude of solutions are offered by major cloud providers and even by companies that specialize in this field. We are therefore talking about identity provider services in the form of \u201cSoftware as a Service\u201d (or SaaS).<\/p>\n<p>The principle is that in a few clicks or lines of script, we can have at our disposal a complete system that allows for the management and identification of users for a web or mobile application. These services also offer a large number of advanced features and the possibility to interconnect with existing user systems\u2014all at no cost for tens of thousands of users.<\/p>\n<p><strong>Guillaume Dussault<\/strong>, Solutions Architect, provides an overview of the different features offered with these solutions, as well as a few comparisons and the main challenges encountered when integrating these services into our applications.<\/p>\n<p><strong>Summary:<\/strong><\/p>\n<ol>\n<li>Understanding the advantages of cloud services<\/li>\n<li>The offerings of paid cloud services<\/li>\n<li>Which identity provider to choose?<\/li>\n<li>The integration challenges to be overcome<\/li>\n<\/ol>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-190d186e e-flex e-con-boxed e-con e-parent\" data-id=\"190d186e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-177f9260 elementor-widget elementor-widget-heading\" data-id=\"177f9260\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding the advantages of cloud services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28e0cf43 elementor-widget elementor-widget-text-editor\" data-id=\"28e0cf43\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Historically, applications were developed by directly incorporating user and identity management features. This had several disadvantages:<\/p>\n<ul>\n<li>Impossible to reuse user management data and features for other systems;<\/li>\n<li>Too much responsibility for the system;<\/li>\n<li>Risks of impact on the identification system with each modification of the system\u2019s core features, and vice versa.<\/li>\n<\/ul>\n<p>But the biggest risk concerns security: As a developer or architect, I never want to touch sensitive information such as user names and passwords. The principle is simple: We can\u2019t expose data that we don\u2019t handle. It is therefore the best way to mitigate risk. Below, I illustrate a summary diagram of identification in this context.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-766e7fee e-flex e-con-boxed e-con e-parent\" data-id=\"766e7fee\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b3d537c elementor-widget elementor-widget-image\" data-id=\"2b3d537c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1482\" height=\"834\" src=\"https:\/\/nventive.com\/app\/uploads\/summary-diagram-of-cloud-authentification.webp\" class=\"attachment-full size-full wp-image-8674\" alt=\"Summary diagram of cloud authentication\" srcset=\"https:\/\/nventive.com\/app\/uploads\/summary-diagram-of-cloud-authentification.webp 1482w, https:\/\/nventive.com\/app\/uploads\/summary-diagram-of-cloud-authentification-300x169.webp 300w, https:\/\/nventive.com\/app\/uploads\/summary-diagram-of-cloud-authentification-1024x576.webp 1024w, https:\/\/nventive.com\/app\/uploads\/summary-diagram-of-cloud-authentification-768x432.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b9fe68a e-flex e-con-boxed e-con e-parent\" data-id=\"b9fe68a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-392af930 elementor-widget elementor-widget-text-editor\" data-id=\"392af930\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The strategy commonly employed by cloud services is to <strong>delegate the responsibility for these features to a third-party system with the aim of not handling, transmitting, or storing this sensitive data<\/strong>. Tokens provided by the identity provider are therefore used in the user identification stage. In addition, the managed services of identity providers offer the baseline level of compliance required for SOC, PCI, HIPAA, and others. These days, AWS Cognito and Azure AD B2C are the two most popular major cloud providers.<\/p>\n<p>They also offer a large number of features, such as:<\/p>\n<ul>\n<li>Use of the popular OAuth2 protocol;<\/li>\n<li>Password resetting;<\/li>\n<li>Multi-factor authentication (MFA or authentication via email, text, etc.);<br \/>\nSupport for authentication via a third party, such as Google, Facebook, Twitter, and Microsoft;<\/li>\n<li>Use of a customizable web user interface.<\/li>\n<\/ul>\n<p>The best part of all this is that the cost of the service at AWS and Azure is free for use by fewer than 50,000 active users per month!<\/p>\n<p>The following diagram shows the authentication flow without the application knowing the user\u2019s sensitive information by communicating the user\u2019s token instead.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e01ab8a e-flex e-con-boxed e-con e-parent\" data-id=\"7e01ab8a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cf5f79f elementor-widget elementor-widget-image\" data-id=\"1cf5f79f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1482\" height=\"834\" src=\"https:\/\/nventive.com\/app\/uploads\/diagram-for-authentication-flow-with-user-token-only.webp\" class=\"attachment-full size-full wp-image-8672\" alt=\"Diagram for authentification flow with user token only\" srcset=\"https:\/\/nventive.com\/app\/uploads\/diagram-for-authentication-flow-with-user-token-only.webp 1482w, https:\/\/nventive.com\/app\/uploads\/diagram-for-authentication-flow-with-user-token-only-300x169.webp 300w, https:\/\/nventive.com\/app\/uploads\/diagram-for-authentication-flow-with-user-token-only-1024x576.webp 1024w, https:\/\/nventive.com\/app\/uploads\/diagram-for-authentication-flow-with-user-token-only-768x432.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bccde1 e-flex e-con-boxed e-con e-parent\" data-id=\"6bccde1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee5586d elementor-widget elementor-widget-heading\" data-id=\"7ee5586d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The offerings of paid cloud services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-720dd1c9 elementor-widget elementor-widget-text-editor\" data-id=\"720dd1c9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Several companies also offer identity provider services, such as Okta and Auth0 (which also belongs to Okta). However, these services are considerably more expensive. Taking the least expensive of the two, Auth0, it will be necessary to pay approximately $0.03 per user. This would represent a monthly amount of $300 for 10,000 users.<\/p>\n<p>The main differences relate to the user interface of the configuration console, which is more polished and user-friendly, as well as the API, which is a little richer and presents some other more marginal features.<\/p>\n<p>Within our projects, we have observed that the features offered by the free services are more than sufficient to meet the needs of our clients.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46dab6a2 e-flex e-con-boxed e-con e-parent\" data-id=\"46dab6a2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-504539d5 elementor-widget elementor-widget-heading\" data-id=\"504539d5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Which identity provider to choose?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baaba1e elementor-widget elementor-widget-text-editor\" data-id=\"baaba1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At a high level, we can see that the offerings for these services is relatively similar. On the other hand, <strong>there are certainly use cases where integrating the service of a particular provider will make more sense in the solution<\/strong> &#8211; especially when it comes to interacting with other cloud services.<\/p>\n<p>In the case of Azure, if you already use Azure Monitor for the observability and alerts of your applications, it would be totally logical to opt for Azure AD B2C to aggregate the events and possibly create alerts in case of threats or suspicious interactions. For systems operationalization, it\u2019s good to have a limited source of data for your systems, so aggregating them in Azure Monitor would be a good option.<\/p>\n<p>Along the same lines, if your infrastructure is on AWS, AWS Cognito easily integrates with the other AWS services. For example, you can control access to API Gateway routes for AWS Cognito users.<\/p>\n<p>In any event, each of these services uses the standard OAuth2 protocol, which makes it possible to integrate one cloud provider with the other. For example, it is therefore possible to use Auth0 for its advanced features, but also to unite a user pool on AWS Cognito and thereby get the best of both worlds (plus the Auth0 fees, of course).<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c1e080c e-flex e-con-boxed e-con e-parent\" data-id=\"2c1e080c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-673f6ade elementor-widget elementor-widget-heading\" data-id=\"673f6ade\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The integration challenges to be overcome<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b8bbb40 elementor-widget elementor-widget-text-editor\" data-id=\"2b8bbb40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The most common challenge that arises in the integration of an identity provider isn\u2019t a technical challenge, but rather a debate between the security aspect and the user experience. For example, asking the user to identify themselves to the application too often will create an irritant for the user.<\/p>\n<p>The other challenge is to successfully present the login or authentication interface to the user. The difference between the following two scenarios is particularly obvious in the creation of a mobile application.<\/p>\n<p>The first scenario is to offer user authentication that is fully integrated into the mobile application without leaving it. This means that the application must briefly handle the user name and password in order to send it to the identity provider. This could involve a security flaw. However, you get a perfectly integrated experience, the possibility to use the device\u2019s biometrics features, and the assurance that password management applications will be supported.<\/p>\n<p>The second possible scenario is to display a web page within the mobile application to allow the user to log in. This page is directly hosted by the identity provider, so the user\u2019s login information isn\u2019t handled. However, the flow of the experience is less smooth and might seem less integrated to the user. It\u2019s possible to mask everything in order to appear more integrated in the application. You also lose the possibility to use the device\u2019s biometrics. Finally, the development cost for this option is lower.<\/p>\n<p><strong>There is therefore no clear answer. As with many dilemmas in custom solution development, it will depend on the context of the project, the objectives, and the resulting restrictions.<\/strong><\/p>\n<p>Regardless of the solution that you choose for user and identity management, the important thing is to keep the resulting features out of the other business systems and applications in order to separate the responsibility of the systems. It will therefore be possible for you to reuse the solution to integrate it into your future applications.<\/p>\n<p>It is also a safe bet that the information contained in the identity provider service is the most sensitive information that your systems will deal with, so try to minimize the handling of this information within your applications and opt for the use of identity tokens as much as possible. <strong>Implementing a dedicated identity provider service will therefore be beneficial from a solution architecture and security perspective.<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aca89a5 e-con-full e-flex e-con e-parent\" data-id=\"aca89a5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b027a elementor-widget elementor-widget-template\" data-id=\"11b027a\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"12208\" class=\"elementor elementor-12208 elementor-12184\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40d5957e e-flex e-con-boxed e-con e-parent\" data-id=\"40d5957e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b78efbf e-con-full e-flex e-con e-child\" data-id=\"1b78efbf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e14a4ef elementor-widget elementor-widget-heading\" data-id=\"7e14a4ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Featured articles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2902db16 elementor-widget elementor-widget-nv-button\" data-id=\"2902db16\" data-element_type=\"widget\" data-widget_type=\"nv-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                <a\n            class=\"nv-button  nv-button--style--desktop--outline-icon nv-button--style--laptop--outline-icon nv-button--style--tablet--outline-icon nv-button--style--mobile--outline-icon nv-button--theme--desktop--dark nv-button--theme--laptop--dark nv-button--theme--tablet--dark nv-button--theme--mobile--dark\" href=\"https:\/\/nventive.com\/fr\/blogue\/\" aria-label=\"See more articles\"        >\n            <span class=\"nv-button__text\">See more articles<\/span>\n            <span class=\"nv-button__icon\">\n                <i aria-hidden=\"true\" class=\"myemoji-icon my-emoji-iconarrow_right_alt\"><\/i>            <\/span>\n        <\/a>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3d033e elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"2e3d033e\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:5334,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>An essential in each of our custom projects, user and identity management is implemented by our experts to guarantee maximum security.<\/p>\n","protected":false},"author":22,"featured_media":8670,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[37],"tags":[65],"class_list":["post-8729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-solutions-en","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Guide: How to Securely Manage User Identification? | nventive<\/title>\n<meta name=\"description\" content=\"Learn how user identification enhances the security of your applications while meeting the expectations of modern users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide: How to Securely Manage User Identification? | nventive\" \/>\n<meta property=\"og:description\" content=\"Learn how user identification enhances the security of your applications while meeting the expectations of modern users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/\" \/>\n<meta property=\"og:site_name\" content=\"nventive\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-11T14:54:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T02:34:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"561\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Guillaume Dussault\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guillaume Dussault\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/\"},\"author\":{\"name\":\"Guillaume Dussault\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/f35141b0241d5646d92b9c9081ac763e\"},\"headline\":\"Guide: How to Securely Manage User Identification\",\"datePublished\":\"2023-05-11T14:54:00+00:00\",\"dateModified\":\"2025-05-28T02:34:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/\"},\"wordCount\":1235,\"publisher\":{\"@id\":\"https:\/\/nventive.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Solutions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/\",\"url\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/\",\"name\":\"Guide: How to Securely Manage User Identification? | nventive\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp\",\"datePublished\":\"2023-05-11T14:54:00+00:00\",\"dateModified\":\"2025-05-28T02:34:10+00:00\",\"description\":\"Learn how user identification enhances the security of your applications while meeting the expectations of modern users.\",\"breadcrumb\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#primaryimage\",\"url\":\"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp\",\"contentUrl\":\"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp\",\"width\":842,\"height\":561,\"caption\":\"How to Securely Manage User Identification\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/nventive.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide: How to Securely Manage User Identification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nventive.com\/en\/#website\",\"url\":\"https:\/\/nventive.com\/en\/\",\"name\":\"nventive\",\"description\":\"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al\",\"publisher\":{\"@id\":\"https:\/\/nventive.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nventive.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nventive.com\/en\/#organization\",\"name\":\"nventive\",\"url\":\"https:\/\/nventive.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"nventive\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/nventive\/\",\"https:\/\/www.instagram.com\/hellonventive\/\",\"https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/f35141b0241d5646d92b9c9081ac763e\",\"name\":\"Guillaume Dussault\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/975673e3d1d51a950ac6c3f95bb13728f412959464b1189b8d7b7d0470f2fc0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/975673e3d1d51a950ac6c3f95bb13728f412959464b1189b8d7b7d0470f2fc0e?s=96&d=mm&r=g\",\"caption\":\"Guillaume Dussault\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guide: How to Securely Manage User Identification? | nventive","description":"Learn how user identification enhances the security of your applications while meeting the expectations of modern users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/","og_locale":"en_US","og_type":"article","og_title":"Guide: How to Securely Manage User Identification? | nventive","og_description":"Learn how user identification enhances the security of your applications while meeting the expectations of modern users.","og_url":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/","og_site_name":"nventive","article_published_time":"2023-05-11T14:54:00+00:00","article_modified_time":"2025-05-28T02:34:10+00:00","og_image":[{"width":842,"height":561,"url":"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp","type":"image\/webp"}],"author":"Guillaume Dussault","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Guillaume Dussault"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#article","isPartOf":{"@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/"},"author":{"name":"Guillaume Dussault","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/f35141b0241d5646d92b9c9081ac763e"},"headline":"Guide: How to Securely Manage User Identification","datePublished":"2023-05-11T14:54:00+00:00","dateModified":"2025-05-28T02:34:10+00:00","mainEntityOfPage":{"@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/"},"wordCount":1235,"publisher":{"@id":"https:\/\/nventive.com\/en\/#organization"},"image":{"@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp","keywords":["Cybersecurity"],"articleSection":["Solutions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/","url":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/","name":"Guide: How to Securely Manage User Identification? | nventive","isPartOf":{"@id":"https:\/\/nventive.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#primaryimage"},"image":{"@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp","datePublished":"2023-05-11T14:54:00+00:00","dateModified":"2025-05-28T02:34:10+00:00","description":"Learn how user identification enhances the security of your applications while meeting the expectations of modern users.","breadcrumb":{"@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#primaryimage","url":"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp","contentUrl":"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp","width":842,"height":561,"caption":"How to Securely Manage User Identification"},{"@type":"BreadcrumbList","@id":"https:\/\/nventive.com\/en\/articles\/guide-how-to-securely-manage-user-identification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/nventive.com\/en\/"},{"@type":"ListItem","position":2,"name":"Guide: How to Securely Manage User Identification"}]},{"@type":"WebSite","@id":"https:\/\/nventive.com\/en\/#website","url":"https:\/\/nventive.com\/en\/","name":"nventive","description":"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al","publisher":{"@id":"https:\/\/nventive.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nventive.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nventive.com\/en\/#organization","name":"nventive","url":"https:\/\/nventive.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"nventive"},"image":{"@id":"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/nventive\/","https:\/\/www.instagram.com\/hellonventive\/","https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w"]},{"@type":"Person","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/f35141b0241d5646d92b9c9081ac763e","name":"Guillaume Dussault","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/975673e3d1d51a950ac6c3f95bb13728f412959464b1189b8d7b7d0470f2fc0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/975673e3d1d51a950ac6c3f95bb13728f412959464b1189b8d7b7d0470f2fc0e?s=96&d=mm&r=g","caption":"Guillaume Dussault"}}]}},"jetpack_featured_media_url":"https:\/\/nventive.com\/app\/uploads\/how-to-securely-manage-user-identification.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/8729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/comments?post=8729"}],"version-history":[{"count":1,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/8729\/revisions"}],"predecessor-version":[{"id":15769,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/8729\/revisions\/15769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/media\/8670"}],"wp:attachment":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/media?parent=8729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/categories?post=8729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/tags?post=8729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}