Blog EN

World-wide 4 out of 5 data breaches arise from weak or stolen passwords
Blog EN

World-wide 4 out of 5 data breaches arise from weak or stolen passwords

World-wide 4 out of 5 data breaches arise from weak or stolen passwords

Initiative Bye Bye Password: With advanced login we create more comfort and security for users on digital channels.

“Your password must be at least 8 characters long and must contain at least one uppercase letter, one lowercase letter, a number and a special character.” We are all too familiar with the failure of password guidelines.

Some time ago we were relying only on passwords that we needed to secure our digital lives. Over time, the passwords lost their value as we users began to reuse an endless series of easy to guess phrases. This is not surprising. With countless accounts with different password policies, it became impossible to remember them all.

Furthermore, the underlying technology also made passwords vulnerable to a variety of attacks. For example, phishing attacks.

Let us get some facts: Weak or stolen passwords are responsible for an average of four out of five global data breaches.

If we free ourselves from passwords, then:

Our users can smoothly use the offered digital services. Our interest in the registration of a user has different sides. First, we want to recognize our customers, create a personal experience, and create new added value. Secondly, we do not, as a matter of principle, want someone unknown to us to use the digital service. Third, the user has certain rights to perform tasks. By identifying the user, he can use the system accordingly.

The users’ authentication is therefore important. The end devices that are used can look very different. On a smartphone, for example, complex character strings are not practical. The manufacturers recognized this early on and created mechanisms such as Android Fingerprint, TouchID or FaceID. If gloves are worn at work, the fingerprint is not a sophisticated authentication method.

Protect our users from identity theft

A password is a secret word or string of characters used for user authentication to prove identity.
For a long time, the BSI has issued guidelines on when a password is considered secure and how often a new password should be issued. Meanwhile, they have distanced themselves from this because as soon as guidelines are known, it is even easier for attackers. In the blog Identity Theft: The 3 most frequent hacker attacks it becomes clear why password fewer procedures are important.

Secure our systems against unauthorized access

In addition to protecting users, we also use password-free procedures to prevent unauthorized access to the system. In addition to internal company data, we also protect ourselves against activities on the system that could damage the company.

Let us create more efficiency in the company

The volume of passwords and password changes make the use of internal applications time-consuming for employees as well. The password forgetting processes are also complex and expensive.

The motto is “Bye password, hello modern login”: passwordless authentication is nothing but using authentication methods that we already know from mobile devices, or one-time passwords, such as e-mail, push and many more. With the help of advanced authentication methods, users can be offered a better digital experience.

Please follow and like us:
Identitätsdiebstahl: Was sind die häufigsten Hacker-Attacken?
Blog EN

Identity theft: The 3 most common hacker attacks

Identity theft: The 3 most common hacker attacks

Identity theft: The 3 most common hacker attacks

Hacker attacks come in many forms with different targets. Identity theft is one of them. In this blog we would like to show you what kind of hacker attacks there are in the field of identity theft. Why don’t password rules help with hacker attacks? How to prevent identity theft?

Every company now has digital identities through the bank. In one case, it is more like employee data, in another, it is countless customer data. We owe this to digitalization and the new possibilities in the form of digital services. This also increased the potential for hacker attacks.

As a rule, users gain access to the digital service by entering a username, an e-mail address, and the password they have been given.
In some cases, passwords must also be changed after a certain period of time and set according to certain password rules, so that they are as complex as possible.

Are passwords and password rules the ideal protection?

I think the answer to this question is quite clear. But passwords are not insecure per se. Rather, we make them insecure because we often reuse them or create them so that we can still remember them.

In early February, the BSI took leave of the following item on security and passwords: “Passwords should contain upper- and lower-case letters, numbers and special characters and should be changed periodically.”

Which hacker attacks are there and why do password rules not help?

Phishing:

Let us unpack the dictionary definition. “Phishing means the interception of data from Internet users via fake Internet addresses, e-mails or SMS.” (Gabler Business Dictionary)

Basically, it is exactly that, criminals try to trick users into entering their access data via e-mails, SMS or other media, some of which appear very authentic.

In this context, I would like to mention the term social engineering attack. The users are manipulated by interactions and abilities of the attacker and are therefore unfortunately a risk. For this reason, security awareness training courses are typically held in companies, in which exactly these types of dangers are pointed out.

The access data can quickly fall into the wrong hands and a password rule has no protection mechanism at all.

Password Spray / Brute Force:

In password spray or brute force attacks, the most common passwords are used and tried on countless accounts. This is a way to bypass the number of attempts before the next common password is tried.

Brute force means that login attempts are made by a machine within a very short time.

Password rules can even have negative effects. As soon as it is known which password rules are used, some common passwords can already be excluded. As a rule, they provide at least a little protection, as this typically makes users’ passwords more complex.

In principle, however, the protection here is not sufficient. Instead, the value should be placed on smart multi-factor authentication and botnet detection to counteract such attacks.

Credential stuffing

Data theft and the sale of data on the Internet seems to be a lucrative business. Since users like to use the same login data on different platforms, Credential Stuffing has emerged as a new form of brute force attack.

Well, you cannot really blame users for it either. There are so many digital channels, platforms, and services and different devices on which you want to use all these services. A user simply cannot remember passwords in this number.

The stolen access data is therefore tried out on the various platforms during credential stuffing to gain access to the user account.

In our opinion, there are two important measures to be taken against this: Again, Bot Net Detection is critical to detect and block a bot network. Second, for users, password-less methods, such as those we already use on TouchID smartphones, or one-time passwords, offer not only greater convenience but also much greater security and protection against identity theft.

If you want to know more about security, check out our article “Security for data in the digital and real-world” or see how our customers use cidaas.

Please follow and like us:
EU-U.S.-Privacy Shield – Die Absprache zum Schutz von personenbezogenen Daten wird erneut aufgrund von Überwachungsängsten für nichtig erklärt.
Blog EN

EU-U.S. Privacy Shield – The agreement on the protection of personal data has been declared null and void again due to surveillance fears.

 EU-U.S.-Privacy Shield – Die Absprache zum Schutz von personenbezogenen Daten wird erneut aufgrund von Überwachungsängsten für nichtig erklärt.

EU-U.S. Privacy Shield – The agreement on the protection of personal data has been declared null and void again due to surveillance fears.

The discontinuation of the EU-US Privacy Shield had made headlines in the press in the last few days. The USA is home to the world’s leading communications and data processing service providers. The transfer of personal data from the EU to the United States is therefore a frequent occurrence. It has become an integral part of many companies in recent years through the Google Cloud, Amazon or Azure. As a legal basis for data protection, the EU-U.S. Privacy Shield was thus an important agreement for US companies and for Europeans.

The EU-U.S. Privacy Shield was drafted by the U.S. Department of Commerce and found by the European Commission in 2016 to be adequate for the level of data protection in the EU. It was designed to provide companies on the other side of the Atlantic with a structure to meet the protection of personal data – for the second time. After all, companies could refer to the Safe Harbor Agreement until 2015.

The European Court of Justice has concluded that the mechanism does not provide adequate protection for European citizens. This decision would immediately stop and in many cases eliminate data transfers between the EU and the United States.

The reason for the EU-US Privacy Shield

The reason for stopping the Privacy Shield is since US security authorities have excessive powers to access the data. On one hand, access is not limited to the “absolutely necessary extent”. On the other hand, data subjects in third countries are entitled to an effective remedy against interference with fundamental rights. This enables data subjects to protect their data from state access. This cannot be guaranteed in this case.

In identity management, ensuring GDPR conformity is extremely important. This concerns the digital identities of users.

As German Cloud Identity and Access Management, the personal data of your users remain here in Germany.

cidaas is a modern, European Cloud Identity and Access Management. Find out in our News the EU Data Protection Basic Regulation, which functions of cidaas ensure security and GDPR conformity or learn more about all that is involved in consent management.

Please follow and like us:
Moderner Login in Flutter: Social Login, Single-Sign-On und Device Biometrics
Blog EN

Modern login in Flutter: Social Login, Single-Sign-On and Device Biometrics

Modern login in Flutter: Social Login, Single-Sign-On and Device Biometrics

Modern login to Flutter: Social Login, Single-Sign-On and Device Biometrics

Social Logins, Device Biometrics, Single-Sign-on – For users, comfortable access is essential so that they can use an app smoothly and repeatedly. What is possible with the new cidaas Flutter SDK and how it works we will reveal in this blog.

The new Google SDK makes it possible to develop beautiful native apps for iOS and Android with only one codebase. The cross-platform framework Flutter makes the development of applications fast and efficient because besides iOS and Android Flutter can also be used to build web and desktop apps. A modern login in Flutter must not be missing.

To inspire users with convenient access to the apps, the cidaas SDK makes it easy to build a modern login screen in Flutter, integrate popular authentication methods such as social login or device biometrics and create a single sign-on.

Based on the de facto standards OAuth2.0 and OpenID Connect, reliable, standardized authentication and authorization of the user is enabled. In addition, the SDK implicitly stores the id_tokens securely so that your apps and the endpoints are carefully secured. The cidaas Flutter SDK can be downloaded via Pub, the package manager for Dart. The integration guide and the link to our sample project can be found here.

Once the cidaas Flutter SDK is integrated, multiple Fraud Detection Systems below the hood will detect suspicious activity. This allows e.g. a smart multi-factor authentication to be implemented directly.

Via webhooks, events such as a new registration or the detected suspicious behavior can be forwarded to the CRM, the Marketing Automation System or the SIEM.

In our Docs you will learn how to configure the app, activate the authentication procedures and in the next step recognize your users in the real world.

Please follow and like us:
shopware-integration
Blog EN

Shopware Login: Single Sign On, Social Login, passwordless

Accessing shopware with the help of cidaas

Shopware Login: Single Sign On, Social Login, passwordless

Identifying, acknowledging and personally addressing customers enables an excellent customer experience. As a result, customers like to return to the attractive online shop again and again.

Shopware is one of the most popular shop systems in Germany. Functionalities can be easily extended here via Shopware plug-ins. Functions related to customer identity should not be missing.

Just as easily as you have been able to expand your shop system so far, you can now offer your customers social logins, single sign-on or even passwordless authentication such as TouchID just as quickly.

You can find our plugin in the Shopware Store and we show you in our Docs how the integration is done amazingly fast.

Thus, you achieve more user comfort and above all security through fraud detection, multi-factor authentication, reliable authentication and fine-grained permissions.

cidaas is the most innovative Identity and Access Management, with which you can inspire your customers through all your channels.

  • Choose one or more of 16 different modern authentication methods and allow your users to log in effortlessly.
  • Your users can stay logged in.
  • You can obtain GDPR-compliant consent during registration and login
  • With cidaas you identify your customers uniformly on your Shopware online shop and on all your other channels.
  • Your channels become even more secure.

We would be very happy to hear from you. Ask us questions or give us feedback in the comments, and find us on Twitter, Facebook, LinkedIn.

Please follow and like us:
Digitale Identität „zum Frühstück“ beim Digital Breakfast
Blog EN

Digital identity “for breakfast” at the Digital Breakfast

Digitale Identität „zum Frühstück“ beim Digital Breakfast

Digital identity “for breakfast” at the Digital Breakfast

On 02.07.2020, we had the pleasure to attend the Digital Breakfast and discuss with you about the protection of digital identities, user experience and security of biometric authentication methods

Secure, digital, and personal identity, that was the title of our online breakfast. This morning, we focused on identity, why passwords are no longer sufficient for protection, and which modern, secure, password-free processes are gaining acceptance.

In this article, we would like to share the exciting questions and answers from our discussion group with you once again.

Question 1: Passwords are stored in a hash. If criminals get access to my passwords, they can be changed, but biometric methods cannot. How can biometrics be secured?

Meanwhile, with little effort, passwords can be guessed and misused in several attacks. On the contrary, biometric procedures are much more complex.

Fingerprint, FaceID of the smartphone, Windows Hello or other biometric methods of the end device is and will be the biometric authentication methods on the end device. Basically, cidaas asks for an authentication process, so that the terminal device displays a stored biometric process with the query. After the user successfully confirms his identity, the terminal device informs cidaas that the authentication has taken place and the user is authenticated.

Question 2: How secure are device biometrics against cybercrime?

Passwords which are entered in the browser can be guessed by various attacks such as phishing, credential stuffing, etc. They are also significantly vulnerable to virus attacks.

The devices protect these sensitive, biometric procedures by means of technically separated, secure areas in the device itself. Thus, these procedures are more secure, especially in comparison to attacks to obtain passwords.

Question 3: How is the acceptance of biometric techniques?

Most of our customers currently offering their users passwordless procedures, including biometric procedures. Overall, we see an increasing acceptance of passwordless methods, whether one-time passwords or device biometrics.

Demographic characteristics, especially age, are an influencing factor in the decision for an authentication procedure.

According to our estimates, about 10% of users already occasionally use passwordless methods and this number is on the rise. The driving force behind this is the convenience on the various end devices, namely smartphones, but in future also smart home devices.

Question 4: How does it look like from a user perspective? Can I bring my own identity and use my preferred method?

When managing your own identity, we enter into another area, the Self Sovereign Identity. This is about bringing your own identity with you. The common identity providers here are Facebook, Twitter, Office365, or other social login providers. Increasingly, other identity providers are also being formed.

Authentication is carried out with Self Sovereign Identity. What is critical on all digital channels is the authorization management, i.e. what the user has access to, what he is entitled to see. Therefore, you need cidaas, which can smoothly add login providers in a pluggable approach.

Question 5: Does not the security of biometric procedures lose when registering with social login?

If a Social Login is used, it is still possible for the registered user to set up another procedure, e.g. TouchID. From the point of view of cidaas, both Social Login and the newly established authentication procedure TouchID are then accepted.

Question 6: To what extent do social login providers then have access to the user data?

It is impossible to say in general terms for all providers. In most cases, the providers will at least be able to track when a user has carried out an authentication on a platform.

Question 7: How do I relate customer experience to security?

Fundamentally, it can be said that the more convenient procedures are, the more carelessly users deal with them. Passwords with their password rules are understandably difficult for users to remember, so many tend to use passwords that are easy to remember and reuse.

Customer Experience at cidaas stands for comfort in authentication, as well as comfort in registration, e.g. B2B customers no longer need to send an e-mail with their name to board additional team members. Instead, the manager manages his employees and their authorizations with the group functionality of cidaas, as delegated admin. Procedures that the customer uses internally can also be integrated directly into the portal and activated for him, such as Office365.

In any case, there is a need for repetition on our part! Write to us with pleasure.

You can also find the whole presentation on Youtube.

Please follow and like us:
Omnichannel-Experience
Blog EN

A brilliant Omnichannel experience through modern customer identification

Glänzende Omnichannel-Experience durch moderne Kundenidentifikation

A brilliant Omnichannel experience through modern customer identification

Christmas is just around the corner… For retailers, Christmas is more than just a festive time. To them, it is the most important and probably also the most exciting time of the year, because the atmosphere of consumption is almost euphoric during this time.

According to the German Retail Association (HDE), the year 2019 will see a 1.5% increase in revenues in stationary retail and a rise of more than 10% in online retail. This has experienced a real boom in recent years in conjunction with the rapid increase in mobile devices. A survey conducted by Capgemini shows that 48% of those surveyed intend to do their Christmas shopping online this year and only around 14% visit stationary stores to do so.

The classic username/password login is no longer necessary

The retail trade on the local level is far from being out of the race. Rather, digital channels need to be complementary to the stationary retail trade. Studies show that contact with digital channels increases the probability of purchase. The opportunity for the stationary retail of tomorrow is to exploit the potential of the digital world, to get to know and identify the customer everywhere. In this way they revitalize the physical shopping experience. But how can this be achieved?

The core element of the Omnichannel Experience is the identification of the customer along the entire customer journey. First and foremost, the registration process must be kept as streamlined as possible. Through progressive profiling, the customer profile is gradually completed according to need, without discouraging the customer with “curiosity” at the beginning. The aim is to gain the customer’s trust that his data will be handled carefully and sensibly.

The classic username/password login is no longer necessary

To ensure that the user continues to enjoy using the dealer’s digital channels, the login is extremely crucial. Users are often confronted with annoying “password forgetting practices”. Well, at home, he will reset the password, however reluctantly, and re-enter it, but only when he has time to do so. But if the customer stands at the cash register with the digital customer card and is suddenly logged out of the app, the joy evaporates and disappointment and anger take over. Unfortunately, he cannot collect the valuable points, is unable to record his purchase in the app or, in the worst case, fails to redeem the voucher he received just at the time of purchase.

It is better to give the customer the choice of how he would like to authenticate himself. The modern login can be a social login or one-time password on a laptop, for example. On the smartphone, a biometric procedure, as he already uses for unlocking, is certainly popular.

Real World Identification connects online and offline world

The next step is the Real-World Identification. With customer identity and access management, the online and offline worlds can be connected by using modern technologies such as NFC (Near Field Communication) or beacons to identify the customer. Webhooks then stimulate the business software so that location-based, personalized news, offers and services are offered in the stationary store. At Christmas time, the Omnichannel Experience sparkles with this.

Christmas business in 2019 is almost over, but as every year, the motto is: after the holiday is before the holiday. And: Easter is approaching with big steps.

If you are a retailer and would like to take a breather after the holidays, then take a look at our lates blog post “Aunt Emma 2.0 – unique customer experience thanks to the connection of the online and offline worlds”, which describes the connected Customer Journey in detail, or even better, arrange a non-binding Meeting appointment.

Please follow and like us:
blod de 3
Blog EN

We vs. COVID-19: hand in hand to the digital solution

WIDAS vs. COVID-19: Hand in Hand zur digitalen Lösung in Zeiten der Pandemie

We vs. COVID-19: hand in hand to the digital solution

Due to the exceptional situation caused by the COVID 19 pandemic, we have also decided to consider the recommendations of the Government and the WHO. We have decided to limit personal contact within the company to a great extent, therefore our employees can work from their homes until Easter. Our offered services will not be limited, as we can fall back on our cloud infrastructure despite the decentralization. We mainly rely on software such as Office 365 with MS-Teams to avoid restricting the work efficiency within the team.

On 11 March 2020, the international spread of the SARS CoV-2 virus has declared a pandemic. The number of cases is increasing enormously worldwide. Meanwhile, the virus is also restricting public life in Germany. The new guidelines of the Federal Government (as of 23 March 2020) for restricting social contacts provide for unprecedented conditions. Both in private everyday life and in professional life, new challenges lie ahead. For many, an efficient digital solution is essential to maintain economic operations. We are here for you to help you through the crisis.

Staying together in times of pandemic: Creating a unique digital solution.

The spread of the virus will be responsible for lasting and far-reaching changes in the economy. Nearly all organizations will have to resort to digitalized solutions and make lasting changes to their everyday working lives. Making systems accessible from the home office within the shortest possible time and being able to offer services to customers digitally is an immense challenge. The demand for digital channels has grown exponentially in times of pandemic and we want to support you in meeting this demand.

For that reason, we wanted to give you a little guidance: We will help you. As the 2010 “GfK/Serviceplan” survey shows, market shares lost in a crisis cannot be recovered in a subsequent growth phase. So, the most important thing from an economic point of view should first be to make companies’ systems securely available for external access and to create digital sales and collaboration channels so that operations do not stagnate. Together, we can work to develop a unique digital solution tailored to your needs and get through this period together.

Today design the solution for the future. From conception, development, operation, and maintenance, we are at your side and provide strategic advice on-trend topics related to digitization such as IoT, AI, and Big Data. With the help of modern cloud solutions, the entire company infrastructure can be adapted sustainably and efficiently. This includes, for example, optimizing data traffic, monitoring and setting up your IT infrastructure, setting up convenient security and change management, and productive service monitoring. Redesign your digital footprint today.

Cloud IAM software for free: Protecting digital identities in the age of COVID-19

Unfortunately, cybercriminals are ruthlessly exploiting the pandemic for their own benefit. Phishing mails, malware, contaminated info maps and countless Trojans are currently circulating around the topic of COVID-19. No company can foresee such a situation. Due to the urgency it is almost impossible to make the systems available from the home office, to create new digital distribution channels and at the same time to protect the systems sufficiently. Together we can stand up to hackers.

“In most cases, their goal is to steal data such as passwords or credit card numbers.” (BSI, 2020)

For the protection of such sensitive data, a Cloud IAM System (Cloud Identity and Access Management System) can be used. With this system, digital identities can be conveniently managed and your systems can be comprehensively protected. Functions such as 2-factor or passwordless authentication enable your employees or customers to be protected extensively on your digital channels against potential identity theft. With the Single Sign-On function, your employees can use all your services conveniently and securely with just one authentication through a single login, so that you can significantly reduce the scope for phishing attacks, for example. With the help of rights, group and role management you keep the overview and can easily and quickly manage and authorize rights and access.

Due to the present situation we offer our Cloud Identity & Access Management – cidaas for 6 months free of charge. Herewith we want to show our solidarity towards SMEs and other companies in times of pandemic. We can overcome everything if we stand together.

Glimpse into the future

Due to the forced conversion to digital business fields as well as digital working methods, companies are also prepared for the time after the crisis and can even benefit from it. Faster communication channels and greater reach represent added value for every company. Once implemented, a digital infrastructure offers a high level of comfort for every employee, business partner and customer as well as security and long-term cost savings for every entrepreneur.

See the present circumstances as an opportunity and prepare for the future together with us!

Your WIDAS team

Please follow and like us:
E-Commerce Week - digitale Kanäle absichern mit modernen Login Verfahren von cidaas
Blog EN

Recap of E-Commerce Week 2020 – “Securing digital channels.”

„Hallo modernes Login“

Recap of E-Commerce Week 2020 – “Securing digital channels.

At the beginning of May we were part of E-Commerce Week 2020 with the presentation “Securing digital channels. Bye password, hello modern login!”.
Sadrick Widmann showed how important the passwordless login is for security. Which password alternatives do users want to be offered today and, how do our customers use this important feature of cidaas to inspire their customers?

Especially in e-commerce, companies are now being targeted by cyber criminals very quickly, yet at the same time customer expectations regarding outstanding comfort are enormous.

We have summarized the following points of E-Commerce Week for you:

1. Passwords are no longer up to date.

Nowadays, users have numerous accounts with various portals and it is impossible to remember strong, complex passwords. As a result, the same passwords or just simple passwords are used quite often.

Even the BSI withdrew its recommendation for password guidelines. We believe this is a clear sign of passwords no longer being up-to-date, insufficient for high security and above all leading to bad user comfort.

2. We are already using modern, password-free procedures

TouchID, FaceID, the fingerprint sensor, or the voice recognition of the laptop or the smart home device – these are all already the common authentication methods that users are using every day. Hardware manufacturers quickly noticed that passwords and PINs are annoying with mobile devices. Biometric methods are practical alternatives.

However, procedures such as SMS (mTAN) or push codes are also reliable password alternatives for transaction releases in banking.

3. How Conrad inspires its users with passwordless authentication

cidaas integration in Conrad

Read the Conrad reference story to find out how Conrad is using cidaas to provide an excellent user experience to its customers.

Did you miss our E-Commerce Week presentation? Our next series of webinars are coming up soon or we will talk about your opportunities with cidaas and your requirements in a personal meeting.

Please follow and like us:
Wordpress plugin from wordpress
Blog EN

Secure your WordPress Site absolutely Free

Secure your WordPress Site absolutely Free

Are you running your WordPress Site with adequate security? Do you want to encourage your customers to use the login of their choice., say social login, password-less, or do you need to enforce additional protection like Multi-Factor Authentication, identify Brute Attacks/malware and stop them affecting your website?

What if you are running multiple websites, and keeping a list of users in sync would be a challenge, and would you appreciate if all your users can be managed in one place, moreover allowing them to use the same user credentials to log in to all your websites?

Here is what cidaas can help you. cidaas, is one of the fastest upcoming quality product entering the enterprise space as a Cloud-based Identity Systems. Integrating your WordPress Website or any complex web system with cidaas will immediately enhance security as well as login related experiences of your users. It comes with a long list of social providers that can be enabled during login while following secure protocols & standards. End-user can benefit this convenience of not needing to sit and fill a huge registration screen, but simply use their already existing profiles on socially significant providers like LinkedIn, Google, or any such.

Why cidaas?

cidaas integration to CMS is only a few minutes if not an hour and with that, the samurai of authentication & authorization is put to work. cidaas secure user information storage, secure authentication and comply with authorization standards like OpenIDConnect or OAuth 2.0 standards.

Authentication is not fun to write. cidaas has Authentication and User Management API that allows you to develop your apps faster and cidaas will take care of login headache. Our API and SDKs make it easy for you to authenticate, manage, and secure your users in no time.

With all these superior security features, cidaas offers absolutely free Starter pack which will allow you to have 10000 active users for $0.

Mitigate the problem before it arises, secure your website communication using HTTPS and OAuth 2.0.

Please visit this page https://docs.cidaas.de/extension/wordpress.html for WordPress plugin that replaces the WordPress login form with the cidaas Sign-In Widget!

Once you install and activate this plugin, the next time you try to log in to WordPress, you’ll instead see the cidaas sign-in page.

As always, we’d love to hear from you. Hit us up with questions or feedback in the comments, or find us on Twitter, FaceBook, LinkedIn

Please follow and like us: