Santa Clara, CA, USA
Sep 27, 2022   |  By Rodrigo Mota
WSO2 will be officially moving from Slack to Discord from Saturday, October 1, 2022. Our Slack community has grown to over 7,000 users, and we are excited to have them be a part of our new community on Discord! You can join the WSO2 server by clicking here. We love Slack, but it's not built for large online communities as it lacks certain moderation features. Which makes sense – after all, Slack was built for corporate teams.
Sep 21, 2022   |  By WSO2
Matching users' keystrokes to confirm their identity adds a layer of robust, comprehensive protection against sophisticated cyber threats while providing a superior user experience.
Digital transformation initiatives have been a top priority for several years in most companies. However, while such programmes are considered a necessity for the long-term survival of most businesses, they haven't always been prioritised or given the resources they deserve. That all changed with the COVID-19 pandemic. Today, according to analyst Gartner, customers expect companies to accelerate digital initiatives due to COVID-19 and all industries are experiencing widespread digitisation.
Sep 21, 2022   |  By Sanjeewa Malalgoda
WSO2, a leading fully open source API Management solution provider, today announced that Forrester has recognized WSO2 as a Strong Performer in The Forrester Wave™: API Management Solutions, Q3 2022. WSO2 received the highest possible scores in the commercial model and supporting services criteria. The report can be accessed here.
Sep 1, 2022   |  By Dhanushka Madushan
Photo by Kieran Somerville on Unsplash First published on DZone. This article is about how to secure WSO2 Micro Integrator on microservices integration deployment. It describes how to use keystores, secure vaults, and more. WSO2 Micro Integrator is an integration solution widely used in enterprise integration. You can use WSO2 Micro Integrator to implement mediation policies, message transformation, security, and more.
Aug 30, 2022   |  By Alok Bardiya [Consultant]
With the global increase in digital adoption, our customers must build better digital experiences for their own customers to stay relevant. There are, however, many underlying components that need to be stitched together and maintained before an organization can start building digital experiences. This process is complex and time consuming, and there are very few organizations that have the capabilities to do so.
Aug 22, 2022   |  By Dimuthu Kasun
Next.js is an open source React web development framework built on top of Node.js. The Next.js framework is known for: With the help of the NextAuth.js library, I will explain how to authenticate a user in a Next.js application with WSO2 Identity Server. NextAuth is an open source authentication solution for Next.js applications. More information about NextAuth.js is available here.
Without effective management and reuse, APIs will not deliver their digital transformation potential. There is an urgent need to make application programming interfaces (APIs) efficient and utilised more effectively. This need is being driven by the rapidly increased rate of digitisation that customers and business lines are demanding from CIOs and CTOs. APIs are a powerful tool that can be employed to deliver competitive advantage and market differentiation, the two biggest demands being placed on the technology team.
Aug 18, 2022   |  By WSO2
WSO2 also delivers stronger analytics, typing biometric authentication, multi-attribute login, and added device support with today's releases of WSO2 Identity Server 6.0 and WSO2 Private CIAM Cloud.
Aug 16, 2022   |  By Chamin Dias
The rapid growth in the development and use of APIs shows no sign of slowing down, and the central role APIs play in digital business across industries continues to surge right along with that growth. One recent survey of IT leaders found that 98% consider APIs mission critical, with 81% currently working with microservices and 18% planning to do so soon. The exponential growth in APIs has been such that most software in use today either uses an API or is one.
Sep 21, 2022   |  By WSO2
In today's episode, we will discuss how you can configure OAuth2.0 device flow for your applications. Device flow is an OAuth2.0 extension that expands the range of devices an organization can use within their overall digital customer experience solution to include devices with limited user input capabilities (such as smart TVs which do not have keyboards). With device flow support, users can leverage other devices, such as smartphones, to complete the login on the limited input device.
Aug 31, 2022   |  By WSO2
In this episode of #IdentityIn15, we will demonstrate how we are implementing rest api, how you can use rest apis and how we have secured rest apis in the identity server 6.0.0 in just 15mins.
Aug 23, 2022   |  By WSO2
WSO2 Identity Server is an API-driven open source IAM product designed to help you build effective CIAM solutions. ELK-based analytics solution is introduced to view the login and session-related analytics data. Three dashboard templates are provided by default: Auth dashboard, Session dashboard, and alert dashboard. The session dashboard includes statistics related to sessions that get created for different applications accessed via the WSO2 Identity Server. Auth dashboard includes statistics related to login attempts made via the WSO2 Identity Server. The Alert dashboard includes suspicious Login Alerts and Long session alerts.
Aug 23, 2022   |  By WSO2
Depending on the business, the applications may need to authenticate with different login attributes. For example, social media applications use userId, email, or mobile number as the identifier, Internet banking applications use userId or username as the identifier, Corporate enterprise applications use email as the identifier. In WSO2 Identity Server 6.0.0 provides the capability to use different login attributes as a productized feature. It gives users the flexibility to choose their preferred identity attribute when logging in, such as email, username, or mobile number. A privileged user in the organization can configure the list of allowed attributes that can be used as the login identifier.
Aug 22, 2022   |  By WSO2
WSO2 Private CIAM Cloud supports B2B and B2C business models through the B2B organization management feature. Unlike other CIAM products that are limited to simple organization management, the B2B organization management in WSO2 Private CIAM Cloud handles complex nesting.
Aug 22, 2022   |  By WSO2
Device flow is an OAuth2.0 extension that expands the range of devices an organization can use within their overall digital customer experience solution to include devices with limited user input capabilities (such as smart TVs which do not have keyboards). With device flow support, users can leverage other devices, such as smartphones, to complete the login on the limited input device.
Aug 17, 2022   |  By WSO2
In this episode, we will be discussing all about account locking in the WSO2 Identity Server. There are two main types of Account Locking in the IS which are Admin-Initiated Account Locking and Account Locking due to Failed Login Attempts. In this session we will be discussing these types in depth and how you can enforce them.
Jul 27, 2022   |  By WSO2
In today's episode, we will discuss how you can manage your user profiles with SCIM by using WSO2 Identity Server as a SCIM service provider in just 15mins. The System for Cross-domain Identity Management (SCIM) specification is designed to manage user identity in cloud-based applications and services in a standardized way to enable interoperability, security, and scalability.
Jul 13, 2022   |  By WSO2
In this episode, we will be demonstrating how to plug in your existing user base to the WSO2 Identity Server in just 15mins.
Jun 21, 2022   |  By WSO2
As the organization adapts the process to the needs of the stakeholders, the delivery process becomes faster and more efficient..
Mar 28, 2022   |  By WSO2
APIs have been in the technology canvas for nearly two decades now, with almost all the major software vendors releasing their APIs after the year 2000. For example, Salesforce and eBay released their APIs in 2000, Amazon in 2002, and Facebook in 2006. Today, APIs are a fundamental building block in digital business and integrations.
Mar 28, 2022   |  By WSO2
Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication as well as other nice-to-have features.
Mar 1, 2022   |  By WSO2
Current estimates suggest widespread adoption of open source software (OSS) in organizations worldwide. Compared to sectors such as operating systems and big data, adoption in the security and identity management sector has been low until now. While there were a number of open source projects around libraries for security and identity management-related functionalities, there were only a few projects based on an end-to-end security or identity and access management (IAM) solution.
Mar 1, 2022   |  By WSO2
With the fast-growing popularity of cloud computing, an increasing number of organizations are now moving towards cloud-based solutions. Gartner predicts that1, "by 2020, 90 percent of organizations will adopt hybrid infrastructure management" where some parts of a solution would be in the cloud while other parts would be in traditional on-premises data centers.
Feb 1, 2022   |  By WSO2
Identity and access management (IAM) is the efficient integration and management of identities, giving users access to the right resources at the right time. Identity is no longer a mere security project for enterprises. In the integration and API domain, as businesses continue to increase the number of internal and third-party APIs, it's more important than ever that APIs are integrated and governed securely. In the user domain, with increasing user identity spaces, company-wide policies, complex structure hierarchies and roles, regulatory pressures, and customer-facing applications, security becomes a bigger challenge each day for identity architects and administrators.

Founded in 2005, WSO2 enables thousands of enterprises, including hundreds of the world's largest corporations, top universities, and governments, to drive their digital transformation journeys—executing more than 18 trillion transactions and managing more than 500 million identities annually. Using WSO2 for API management, integration, and customer identity and access management (CIAM), these organisations are harnessing the full power of their APIs to securely deliver their digital services and applications.

Our open-source, API-first approach to software that runs on-premises and in the cloud helps developers and architects to be more productive and rapidly compose digital products to meet demand while remaining free from vendor lock-in. WSO2 has over 900 employees worldwide with offices in Australia, Brazil, Germany, India, Sri Lanka, the UAE, the UK, and the US.

Our Products:

  • Choreo - iPaaS: Reduce complexity. Build cloud-native, digital products and solutions with agility and at scale.
  • API Manager: Harness the full power of your APIs to optimize business performance.
  • Enterprise Integrator: Speed application development with the fastest integration runtime available in the market.
  • Identity Server: Effectively build API-driven CIAM solutions that delight customers.

Next-generation technologies to future-proof your business.