Library

Latest Content

[Screencast] WSO2 App Cloud Tutorial 6 - Taking Your App through the Complete Lifecycle

In our fifth tutorial on WSO2 App Cloud, we showed you how to invite new members to your team in the cloud, grant them access to applications, and enforce permissions within each role. In this tutorial, we show you how these invited teams of developers, quality control and operations can work together, moving applications through lifecycle phases.

[Screencast] WSO2 API Cloud Tutorial 2 - Subscribe to a Published API and Invoke It

In our first API Cloud tutorial, you learnt to create a simple API, and publish it to your web portal. In this tutorial, we will subscribe to the published API to learn more about it, and invoke it.

[Article] OAuth2 Grant Types and Need For Implicit Grant for JavaScript and Mobile Applications

The current state-of-the-art of web is that service providers expose their services as web accessible application programming interfaces (APIs) for users to build applications or consume services. One of the key aspects of designing an API platform is controlling who has access to data. This article will specifically discuss OAuth2 grant types and the importance of implicit grant for JavaScript and mobile applications.

API Management
API Management

[Article] OAuth2 Grant Types and Need For Implicit Grant for JavaScript and Mobile Applications

The current state-of-the-art of web is that service providers expose their services as web accessible application programming interfaces (APIs) for users to build applications or consume services. One of the key aspects of designing an API platform is controlling who has access to data. This article will specifically discuss OAuth2 grant types and the importance of implicit grant for JavaScript and mobile applications.

[Article] Customize JSON Web Token Generation with WSO2 API Manager 1.8.0

In the WSO2 API Manager default product, we do have JWT generation implementation. In that implementation, we retrieve basic application-specific details, subscription details, and user information available on the system. However, when we have more complex use cases, we might need to send more information with JWT. For this, we have an extension point to implement a custom JWT generator to meet this requirement. This article will discuss how you could use external implementation for JWT generating logic.

[Blog Post] State of Development vs. State of Availability

In this blog post, Senaka explains runtime governance focusing on the type of processes involved as well as the complexities.

App Dev

[Presentation] From shadow IT to empowered IT: Unshackling your developers’ creativity!

Project teams often use shadow IT, instead of the more slower moving traditional IT, to facilitate rapidly changing complex business requirements and quick release cycles. As a result an unmanaged, ungoverned set of IT solutions reside in enterprises without ownership. In this session Asanka Abeysinghe, VP of Solutions Architecture presented how enterprises can leverage cloud enabled ALM frameworks to build empowered IT. In addition Asanka explained how innovative WSO2 clients are already gaining startup speed, reducing project risk, and enabling new business models by adopting WSO2 DevOps PaaS solutions.

[Blog Post] JavaEE WebProfile Support in WSO2 Application Server

In this blog post, Sagara explains some common queries related to JavaEE WebProfile support in WSO2 Application Server.

[Screencast] Creating an ESB Project and End-Point with WSO2 Developer Studio

In this screencast, Susinda will take you through the process of creating an ESB project and end-point with WSO2 Developer Studio.

Big Data
Big Data

[Article] Real-time Intruder Detection with R, PMML, and WSO2 CEP

This tutorial will explain how you could use WSO2 Complex Event Processor (CEP) and Predictive Model Markup Language (PMML) for building real-time predictive modeling applications, using network intruder detection as an example. At the end of this tutorial, you will be able to create and test PMML models in the CEP for practical applications.

[Tutorial] Reliable Message Publishing (JMS) to BAM using MB

This tutorial will provide a step-by-step approach on how to successfully implement a simple example of reliable message publishing to a business activity monitor using JMS communication.

[Article] Implementing Time Series Functions on WSO2 Complex Event Processor

WSO2 Complex Event Processor (WSO2 CEP) supports the application of Time Series Functions in order to identify patterns between data series, forecast future events, and identify outliers. This article will explain in detail how to implement each function of the time series toolbox and describe how to optimize the performance of time series queries.

Cloud

[Screencast] WSO2 App Cloud Tutorial 6 - Taking Your App through the Complete Lifecycle

In our fifth tutorial on WSO2 App Cloud, we showed you how to invite new members to your team in the cloud, grant them access to applications, and enforce permissions within each role. In this tutorial, we show you how these invited teams of developers, quality control and operations can work together, moving applications through lifecycle phases.

[Screencast] WSO2 API Cloud Tutorial 2 - Subscribe to a Published API and Invoke It

In our first API Cloud tutorial, you learnt to create a simple API, and publish it to your web portal. In this tutorial, we will subscribe to the published API to learn more about it, and invoke it.

[Screencast] WSO2 API Cloud Tutorial 1 - Create a Simple API and Publish to Your Web Portal

WSO2 API Cloud is a powerful service that lets you create and publish APIs in minutes, manage their full lifecycle, and distribute them to developers across the Internet. Our introductory video on WSO2 API Cloud gives an overview of its services and functionality. In this first API Cloud tutorial, you will learn to create a simple API, and publish it to your web portal.

Identity and Entitlement Management

[Tutorial] How to Secure a Jaggery File by Using Single Sign-On

This tutorial will demonstrate the use of SSO to secure a jag file and the process of obtaining the roles of the current logged in user.

[Article] Authentication Protocols Comparison and Analysis

This article aims to compare and contrast various authentication protocols, which include SAML 2.0, WS-Federation Passive profile (Passive STS), OpenId, and CAS (Central Authentication Service).

[Blog Post] POODLE Attack and Disabling SSL V3 in WSO2 Carbon 4.2.0-Based Products

In this blog post, Prabath explains how you could disable SSL V3 in WSO2 Carbon 4.2.0-based products in the wake of the 'POODLE' attack.

Integration

[Presentation] Sharing Best Practices and Recommendations from the Integration Battlefield

APIs are the tip of the iceberg of enterprise integration. In this workshop conducted at API Days Paris, Isabelle discussed how WSO2’s customers engaged in successful enterprise deployments. She shared best practices and recommendations from the "integration battlefield" around security, monitoring and performance.

[Screencast] RESTful Integration with WSO2 Enterprise Service Bus

In this screencast, Dushan will discuss RESTful integration with WSO2 Enterprise Service Bus (ESB); he will explain RESTful services and take you through some key features of WSO2 ESB and also touch on REST support with WSO2 ESB. He will carry out a demonstration as well to further explain RESTful integration with WSO2 ESB.

[Blog Post] How to Aggregate Responses of Two REST Endpoints and Convert to JSON Using WSO2 ESB

In this blog post, Lahiru describes a use case that demonstrates how you could aggregate responses of two REST endpoints and convert to JSON with WSO2 Enterprise Service Bus.

Latest Library for the recent month
More Content

[Screencast] WSO2 App Cloud Tutorial 6 - Taking Your App through the Complete Lifecycle

In our fifth tutorial on WSO2 App Cloud, we showed you how to invite new members to your team in the cloud, grant them access to applications, and enforce permissions within each role. In this tutorial, we show you how these invited teams of developers, quality control and operations can work together, moving applications through lifecycle phases.

[Screencast] WSO2 API Cloud Tutorial 2 - Subscribe to a Published API and Invoke It

In our first API Cloud tutorial, you learnt to create a simple API, and publish it to your web portal. In this tutorial, we will subscribe to the published API to learn more about it, and invoke it.

[Article] OAuth2 Grant Types and Need For Implicit Grant for JavaScript and Mobile Applications

The current state-of-the-art of web is that service providers expose their services as web accessible application programming interfaces (APIs) for users to build applications or consume services. One of the key aspects of designing an API platform is controlling who has access to data. This article will specifically discuss OAuth2 grant types and the importance of implicit grant for JavaScript and mobile applications.

[Presentation] Connected Architecture Fabric Creating a Connected World

Chris Haddad, Director - VP of Technology Evangelism at WSO2 delivered a talk at Gartner AADI Summit in December, held in Las Vegas, Nevada. In this session, he described how leading IT teams incorporate new reference architecture components and practices that enhance connections across people, devices, and partners.

[Tutorial] How to Secure a Jaggery File by Using Single Sign-On

This tutorial will demonstrate the use of SSO to secure a jag file and the process of obtaining the roles of the current logged in user.

[Article] Customize JSON Web Token Generation with WSO2 API Manager 1.8.0

In the WSO2 API Manager default product, we do have JWT generation implementation. In that implementation, we retrieve basic application-specific details, subscription details, and user information available on the system. However, when we have more complex use cases, we might need to send more information with JWT. For this, we have an extension point to implement a custom JWT generator to meet this requirement. This article will discuss how you could use external implementation for JWT generating logic.

[Article] Authentication Protocols Comparison and Analysis

This article aims to compare and contrast various authentication protocols, which include SAML 2.0, WS-Federation Passive profile (Passive STS), OpenId, and CAS (Central Authentication Service).

[Presentation] Sharing Best Practices and Recommendations from the Integration Battlefield

APIs are the tip of the iceberg of enterprise integration. In this workshop conducted at API Days Paris, Isabelle discussed how WSO2’s customers engaged in successful enterprise deployments. She shared best practices and recommendations from the "integration battlefield" around security, monitoring and performance.

[WSO2Con USA 2014] Big Data at Home

[Screencast] WSO2 API Cloud Tutorial 1 - Create a Simple API and Publish to Your Web Portal

WSO2 API Cloud is a powerful service that lets you create and publish APIs in minutes, manage their full lifecycle, and distribute them to developers across the Internet. Our introductory video on WSO2 API Cloud gives an overview of its services and functionality. In this first API Cloud tutorial, you will learn to create a simple API, and publish it to your web portal.

WSO2 API Cloud - Introduction

Most organizations, in today’s world of APIs, have become successful by following best practices in API Management to build better connected ecosystems. In this introductory video, Vice President - Cloud, Dmitry Sotnikov, talks about the evolution of API Management, and the advantages of using WSO2 API Cloud, a service based on the 100% open source WSO2 API Manager product.

[Screencast] RESTful Integration with WSO2 Enterprise Service Bus

In this screencast, Dushan will discuss RESTful integration with WSO2 Enterprise Service Bus (ESB); he will explain RESTful services and take you through some key features of WSO2 ESB and also touch on REST support with WSO2 ESB. He will carry out a demonstration as well to further explain RESTful integration with WSO2 ESB.

[Presentation] A Reference Architecture for IoT: How to Create a Resilient, Secure IoT Cloud

Co-Founder and CTO at WSO2, Paul Fremantle, presented a talk titled "A Reference Architecture for IoT: How to create a resilient, secure IoT cloud" at the IoT World Forum in London. The talk discussed how the world is moving from thousands of connected clients to millions of connected devices; and how we are moving from a known security perimeter to an almost infinite attack space. Scalable and secure architecture enables IoT to succeed and Paul elaborated what such an architecture should look like, and how major companies have implemented this using best of breed open-source components.

[Article] Real-time Intruder Detection with R, PMML, and WSO2 CEP

This tutorial will explain how you could use WSO2 Complex Event Processor (CEP) and Predictive Model Markup Language (PMML) for building real-time predictive modeling applications, using network intruder detection as an example. At the end of this tutorial, you will be able to create and test PMML models in the CEP for practical applications.

[Presentation] The Evolution of Linux Container Virtualization

Traditional virtualization technologies have been used by cloud infrastructure providers for many years in providing isolated environments for hosting applications. These technologies make use of full-blown operating system images for creating virtual machines (VMs). According to this architecture, each VM needs its own guest operating system to run application processes. More recently, with the introduction of the Docker project, the Linux Container (LXC) virtualization technology became popular and attracted the attention of the entire software industry. Imesh explains the evolution of Linux Container virtualization in this presentation.

[Screencast] WSO2 App Cloud Tutorial 5 - Teamwork, Roles and Permissions

With the help of our previous tutorial, you can now take an existing Java WAR package and get it running in the cloud. In this, our fifth tutorial, we show you how to invite new members to your team in the cloud, grant them access to applications, and enforce permissions within each role.

[Blog Post] Let's get started with WSO2 App Cloud

In this blog post, Amila explains some improvements made to enhance the experience provided to WSO2 Cloud users.

[Blog Post] State of Development vs. State of Availability

In this blog post, Senaka explains runtime governance focusing on the type of processes involved as well as the complexities.

[Tutorial] Reliable Message Publishing (JMS) to BAM using MB

This tutorial will provide a step-by-step approach on how to successfully implement a simple example of reliable message publishing to a business activity monitor using JMS communication.

[Article] Implementing Time Series Functions on WSO2 Complex Event Processor

WSO2 Complex Event Processor (WSO2 CEP) supports the application of Time Series Functions in order to identify patterns between data series, forecast future events, and identify outliers. This article will explain in detail how to implement each function of the time series toolbox and describe how to optimize the performance of time series queries.

[Blog Post] A Connected Retail World Requires Digital Transformation, APIs, and Platforms

In this blog post, Chris explains how WSO2 is helping enterprise retail organizations fulfill their vision of digital transformation and connect their business to the world across both digital and brick and mortar channels.