Latest Content

[Article] Leveraging digital-ready businesses with WSO2 API Manager

Rapid development of the Internet and web-based technologies have significantly contributed to the growth of IT recently. Business too are reaping the benefits by

In the recent past, growth of IT was boosted due to the rapid development of internet and web based technologies. As a result, businesses were also expanded with the aid of internet and web services. Most business entities have adapted to this new change with the intention of reaching more customers and maximizing revenue. This article describes how WSO2 API Manager can be used to facilitate the growth of a digital ready business with an API driven business model.

Leveraging IoT in Your Enterprise - Use Cases

From behavioral tracking, asset management, vehicle fleet tracking, building automation controls to digital telematics, WSO2’s extensive IoT platform provides enterprises the capability to build mobile device and app management and enterprise IoT solutions.


Use Cases


[Article] JMS 2.0 Support with WSO2 Enterprise Integrator

Java Message Service (JMS) is an application program interface (API) from Sun Microsystems that supports the formal communication known as messaging between computers in a network. This article will explain the support for JMS 2.0 features which was introduced in WSO2 Enterprise Integrator. The article also includes use cases and configurations required when implementing those features with WSO2 Enterprise Integrator.

Writing a Custom Inbound Authenticator for WSO2 Identity Server 5.3.0

Authentication is an integral part of any identity and access management suite, and WSO2 Identity Server is no exception. It offers a comprehensive and feature-rich authentication framework which is capable of handling almost all kinds of authentication protocols out-of-the-box with the added advantage of support for any type of authentication protocol through simple Java code.

WSO2 Identity Server 5.3.0 introduces a new authentication framework and brings with it the ability to write improved pluggable inbound/outbound authenticators. This article explores the constituent parts of an inbound authenticator component as found in WSO2 Identity Server 5.3.0 and how they fit together to handle a given custom authentication protocol.

Pages