Santa Clara, CA, USA
May 19, 2022   |  By Dinali Dabarera
Are you someone who already has a legacy system in place and wants to migrate to a modern authentication system with Identity and Access Management (IAM) features? The first thing you need to consider is how you can use the existing legacy user store with this new system. Keep in mind that if the legacy user store uses an old security mechanism to store your data, we would recommend that you migrate to the WSO2 JDBC user store format or Active Directory (AD).
May 18, 2022   |  By WSO2
Virtusa and WSO2 will combine their technical competency, market reach, and developer-focused technology stack to provide global digital transformation solutions for various industries.
May 11, 2022   |  By Thamindu Jayawickrama
Have you ever found passwords to be extremely inconvenient? In a developing world, you've been using older technology?
May 9, 2022   |  By Kanchana Wickremasinghe
Recent events over the past two years have shown that delivering enhanced digital experiences is critical for business success. The ability to innovate fast is now the differentiating factor that determines whether a business is a leader or a follower.
May 9, 2022   |  By Yathindra Kodithuwakku
This is the second installment of the series. As a result, if you haven't yet completed Part 01 of the series, it is highly urged that you do so first. According to the official website, Asgardeo is an IDaaS that allows developers to create seamless login experiences in minutes. Let's concentrate on the performance optimization approaches utilized in react and webpack in this article.
May 6, 2022   |  By Yathindra Kodithuwakku
This post explains the approaches we used to improve performance in our application. This knowledge will also assist you in applying these strategies to your projects as required. Please keep in mind that this post series focuses solely on the front end. According to the official website, Asgardeo is an IDaaS that allows developers to create seamless login experiences in minutes.
May 6, 2022   |  By Johann Nallathamby
Consumer onboarding is one of the, if not the most, important functions of a customer identity and access management (CIAM) solution. An overly complicated onboarding workflow significantly detracts from the consumer experience. Providing an effective, engaging and efficient onboarding workflow without compromising security has always been a challenge among security and risk professionals.
May 6, 2022   |  By Johann Nallathamby
In part 1 of this series, we introduced the three most common abstract workflows based on the method in which they are initiated. But what makes an abstract workflow a concrete workflow are the different types of components that make up the workflow. In this article, we will take a look at these components.
May 4, 2022   |  By Ashen Weerathunga
Do you recall what your first password was? It was probably something easy that you could remember easily, such as your birthdate or the name of your pet. However, as you created additional online accounts, your passwords grew more complex and difficult to remember. It's a problem that many people face. As a result, many of us tend to reuse passwords across many accounts, exposing our personal information to theft.
Apr 28, 2022   |  By Chamin Dias
First published on The New Stack. The pandemic has accelerated the shift towards digital channels for banking, retail, and a host of other services. As a result, businesses are shifting their digital transformation initiatives into overdrive in order to meet customer demand for online interactions, which should be both inviting and secure. APIs act as key drivers behind most successful digital enterprises.
May 11, 2022   |  By WSO2
WSO2 API Manager 4.1 is out! Come learn what’s new! This release improves productivity in development and operations, expands support for different protocols and third-party technologies, and completes the product’s analytics story.
May 6, 2022   |  By WSO2
This screencast shows how to expose legacy SOAP backends as REST APIs through WSO2 Enterprise Integrator. The generated REST service can be directly deployed into WSO2 Micro Integrator. It is also possible to edit the generated REST API using the IDE.
May 6, 2022   |  By WSO2
When you are running a micro-integrator on a microservices environment, administrators who have admin access to the micro-integrator are able to change its configurations via admin services API. When someone needs to debug the system and find out which person did what change, then the micro-integrator needs to keep a log of activities performed on the micro-integrator. Audit logs are simply a set of logs that let you find what are the changes performed on the micro-integrator instance. Audit logs feature support from the APIM 4.1.0 onward.
May 5, 2022   |  By WSO2
APIM per API logging support lets you enable logging request details per API basis. This will significantly impact APIM performance when you need to collect logs that come in to and out of the APIM instance. Users are able to enable or disable logging for each API by using the APIM REST API. WSO2 APIM logging gives you multiple log levels that let you log information in different levels.
Apr 27, 2022   |  By WSO2
In this episode, we will be discussing about using the FIDO for multi-factor authentication with the WSO2 Identity Server in just 15 minutes.
Apr 27, 2022   |  By WSO2
In this 2 part series, Eric Newcomer, Chief Technology Officer at WSO2 speaks to FinextraTV about the type of technologies that are conducive to self-disruption, what banks need to consider when revamping their technology and operations divisions to promote innovation, how this translates into a culture of innovation, and how migration to the cloud reinforce banks’ cybersecurity and resilience.
Apr 26, 2022   |  By WSO2
In this 2 part series, Eric Newcomer, Chief Technology Officer at WSO2 speaks about self-disruption across the industry, what is meant by this and how this approach is helping FIs address business challenges. We learn how the internal disruption that comes with new technology strategies can benefit the customer, the type of strategies that could formalise this natural disruption to create a process of structured self-disruption, and how this fits in with the regulatory landscape.
Apr 20, 2022   |  By WSO2
Adaptive authentication is an evolved form of MFA where the authentication mechanism is decided depending on the user’s risk profile and behavior. In this episode of #IdentityIn15, we are going to discuss with you about what is #adaptiveauthentication, sample adaptive authentication script, write a custom adaptive authentication function, and how to use adaptive authentication with the #WSO2identityserver.
Apr 13, 2022   |  By WSO2
Nowadays most businesses adopt GraphQL Subscriptions for their event-driven applications for interactive and immediate user experience. WSO2 API Manager 4.1.0 helps you to create, publish and deploy GraphQL APIs with subscriptions. API Manager Gateway manages your GraphQL subscription backends by applying authentication, authorization, rate limiting, query payload validation, query complexity, and depth validation.
Apr 12, 2022   |  By WSO2
Choreo Connect 1.1.0 supports multiple topics, rate limiting, API Insights for WebSocket APIs. Multiple topics support URL mappings which may include path params. You can enable advanced, application or subscription rate limiting based on event count or data bandwidth. API analytics can be published to the Choreo platform. Try out in your local environment.
Mar 28, 2022   |  By WSO2
APIs have been in the technology canvas for nearly two decades now, with almost all the major software vendors releasing their APIs after the year 2000. For example, Salesforce and eBay released their APIs in 2000, Amazon in 2002, and Facebook in 2006. Today, APIs are a fundamental building block in digital business and integrations.
Mar 28, 2022   |  By WSO2
Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication as well as other nice-to-have features.
Mar 1, 2022   |  By WSO2
Current estimates suggest widespread adoption of open source software (OSS) in organizations worldwide. Compared to sectors such as operating systems and big data, adoption in the security and identity management sector has been low until now. While there were a number of open source projects around libraries for security and identity management-related functionalities, there were only a few projects based on an end-to-end security or identity and access management (IAM) solution.
Mar 1, 2022   |  By WSO2
With the fast-growing popularity of cloud computing, an increasing number of organizations are now moving towards cloud-based solutions. Gartner predicts that1, "by 2020, 90 percent of organizations will adopt hybrid infrastructure management" where some parts of a solution would be in the cloud while other parts would be in traditional on-premises data centers.
Feb 1, 2022   |  By WSO2
Identity and access management (IAM) is the efficient integration and management of identities, giving users access to the right resources at the right time. Identity is no longer a mere security project for enterprises. In the integration and API domain, as businesses continue to increase the number of internal and third-party APIs, it's more important than ever that APIs are integrated and governed securely. In the user domain, with increasing user identity spaces, company-wide policies, complex structure hierarchies and roles, regulatory pressures, and customer-facing applications, security becomes a bigger challenge each day for identity architects and administrators.

Founded in 2005, WSO2 enables thousands of enterprises, including hundreds of the world's largest corporations, top universities, and governments, to drive their digital transformation journeys—executing more than 18 trillion transactions and managing more than 500 million identities annually. Using WSO2 for API management, integration, and customer identity and access management (CIAM), these organisations are harnessing the full power of their APIs to securely deliver their digital services and applications.

Our open-source, API-first approach to software that runs on-premises and in the cloud helps developers and architects to be more productive and rapidly compose digital products to meet demand while remaining free from vendor lock-in. WSO2 has over 900 employees worldwide with offices in Australia, Brazil, Germany, India, Sri Lanka, the UAE, the UK, and the US.

Our Products:

  • Choreo - iPaaS: Reduce complexity. Build cloud-native, digital products and solutions with agility and at scale.
  • API Manager: Harness the full power of your APIs to optimize business performance.
  • Enterprise Integrator: Speed application development with the fastest integration runtime available in the market.
  • Identity Server: Effectively build API-driven CIAM solutions that delight customers.

Next-generation technologies to future-proof your business.