WSO2 Blogs

WSO2 Featured in DZone’s 2014 Guide to the Internet of Things On August 1, 2014 By Hasmin AbdulCader, We are happy to be recognized as a featured vendor in DZone’s 2014 Guide to the Internet of Things, a report focused on IoT development trends, strategies, and tools. The guide includes: Expert opinions and tips Industry knowledge Product and... Continue reading
WSO2 Expands Bay Area Presence On July 11, 2014 By Jonathan Marsh, We outgrew another office. This is becoming a trend! Our Palo Alto office served us well for the last couple of years but with our accelerating hiring we needed more space. The new location, 787 Castro Street in Mountain View,... Continue reading
WSO2Con Insights – BarclaycardUS Optimizes Backend Services and Performance Across 10 Distinct Environments with WSO2 ESB On July 10, 2014 By Hasmin AbdulCader, As one of the world’s largest and most respected financial services companies, with partnerships that include over 60 best-in-class companies and brands, BarclaycardUS is dedicated to making the purchasing experience simple and rewarding for its customer community. A key part... Continue reading
API Registry and Service Registry On July 24, 2014 By Asanka Abeysinghe, [Based on a post originally appearing at http://asanka.abeysinghe.org/2014/07/api-registry-and-service-registry.html.] Registry acts as a core component in Service Oriented Architecture (SOA). Early SOA reference architecture named the registry as a service broker for service providers to publish service definitions, allowing service consumers... Continue reading
Implementing an API Façade with the WSO2 API Management Platform On May 28, 2013 By Asanka Abeysinghe, [Based on a post originally appearing at http://asanka.abeysinghe.org.] In my previous post I described about the reference architecture of API Façade. This post gives implementation details using the WSO2 API Management Platform and the WSO2 ESB. Business scenario: A backend... Continue reading
A Pragmatic Approach to the API Façade Pattern On May 24, 2013 By Asanka Abeysinghe, [Based on a post originally appearing at http://asanka.abeysinghe.org/2013/04/pragmatic-approach-to-api-facade-pattern.html.] Business APIs expose business functionality for access by external and internal consumers.  In technical terms APIs provide an abstract layer for the internal business services to cater to consumer demand. Most service... Continue reading
Four Point DevOps Story On July 21, 2014 By haddadcblg, Build team interest and passion in DevOps by promoting four DevOps themes: DevOps PaaS Delivers at the Speed of Business Demand DevOps Equals DevOps Principles Plus DevOps Practices The Agile DevOps PaaS Mindset ALM PaaS Bridges the Dev Gap Every team member desires to fulfill their objective while delivering  at the Speed of Business Demand. High performance […] Continue reading
REST Tooling On July 10, 2014 By haddadcblg, In section 6.3 of Roy’s dissertation, he explains how REST applies to HTTP.   But the implementing a RESTful approach requires painstaking assembly without REST tooling.   Java JAX-RS and API Management infrastructure reduce the learning curve, increase API adoption and decrease development effort by simplifying API creation, publication, and consumption. The Java API for RESTful Web […] Continue reading
Aligning Work with REST On July 7, 2014 By haddadcblg, RESTful systems must consider security, separation of concerns, and legacy web services. Build an API Security Ecosystem Security is not an afterthought. It has to be an integral part of any development project. The same applies to APIs as well. API security has evolved significantly in the past five years. The growth of standards to […] Continue reading
Adding Custom Claims to the SAML Response - (How to Write a Custom Claim Handler for WSO2 Identity Server) By Pushpalanka OverviewThe latest release of WSO2 Identity Server (version 5.0.0), is armed with an "application authentication framework" which provides lot of flexibility in authenticating users from various service providers who are using heterogeneous protocols. It has several extension points, which can be used to cater several customized requirements commonly found in... Continue reading
Using TCPMon with secured services By Chintana You might have noticed when you secure a service in the WSO2 platform, that service is only exposed through https for security. This from a security standpoint is critical for any deployment. However, it’s a minor inconvenience when you’re a developer and developing a secured service and want to find... Continue reading
Securing the Internet of Things with WSO2 IS By Senaka The popularity of the Internet of Things (IoT) is demanding for more solutions to make it easier for users to integrate devices, with a wide-variety of on-premise and cloud services. There are many existing solutions which makes integration possible, but there are many gaps in several aspects including usability and... Continue reading