Loading...
 

Landing Page

Social login can be implemented on your website, mobile applications, or WiFi Hotspots. We recommend placing your Social Login buttons more prominently than your traditional user registration forms which should be presented as a secondary alternative option. For more tips on how and where to implement your social login option, please visit Best Practices.

 


Documentation Icons   Laptop.001
Practical Use CaseX CloseDocumentation Icons   Laptop Heineken.001 In the following example, a user would browse to a campaign launched by Heineken, with the option of entering their age and pressing “Acceder” to continue, or to simply signing up using their Facebook account. In this instance, Facebook itself is used as an Age Gate allowing the user to participate based on the Age data extracted from their Facebook account. Facebook users' ages are usually very reliable, possibly even more reliable than the age entered manually by the user.


Documentation Icons   Mobile App.001
Practical Use CaseX CloseDocumentation Icons   Laptop Heineken.001 In the following example, a user would browse to a campaign launched by Heineken, with the option of entering their age and pressing “Acceder” to continue, or to simply signing up using their Facebook account. In this instance, Facebook itself is used as an Age Gate allowing the user to participate based on the Age data extracted from their Facebook account. Facebook users' ages are usually very reliable, possibly even more reliable than the age entered manually by the user.

Documentation Icons   Mobile Wifi1234
Practical Use CaseX CloseDocumentation Icons   Laptop Heineken.001 In the following example, a user would browse to a campaign launched by Heineken, with the option of entering their age and pressing “Acceder” to continue, or to simply signing up using their Facebook account. In this instance, Facebook itself is used as an Age Gate allowing the user to participate based on the Age data extracted from their Facebook account. Facebook users' ages are usually very reliable, possibly even more reliable than the age entered manually by the user.

 

Once a user selects a social login option, the social network application behind that button is activated, establishing a connection with the corresponding social media platform. The user will then proceed to: Authentication + Permissions.