LIBRARY

Securing APIs with WSO2 API Manager

This article focuses on WSO2 API Manager’s security aspects when it comes to securing APIs.
Undefined

How To: Federated Account Linking

Introduction

This article provides an introduction to federated account linking, which refers to linking the digital identifiers of an identity in multiple federated identity providers to a digital identifier of the same identity in the resident identity provider. Federated account linking is one of the key requirements under federated identity management. The digital identifier in the resident identity provider is also known as the local identifier.

Undefined

CIAM: The Future of the (Digital) Enterprise

A few months back, I came across the following diagram in the World Economic Forum's Twitter feed. I thought this was one of the best visual representations on the strength and size of the economy around the internet.
Undefined

What is Federated Identity Management?

Federated login without account linking
Identity Federation between the Enterprise and SaaS Application
Federated login with account linking
Federated login with just-in-time account provisioning
Federated identity management is an arrangement that can be made between two or more trust domains, to allow users of these trust domains to access applications and services using the same digital identity. An identity such as this is known as federated identity and the use of such a solution pattern is known as identity federation.
Undefined

Identity Management Solution Patterns

Tackling Identity Management in a Heterogeneous IT Landscape
Undefined

What is Stream Processing?

In this blog Srinath outlines the basics of stream processing and streaming SQL.
Undefined

Essentials: Here's How IAM Helps With GDPR

The General Data Protection Regulation (GDPR), formalized in the EU parliament in 2016, will come in to effect on May 2018. GDPR compliance is absolutely a must for any organization which processes personal data of individuals who live in EU territory. Managing various security and privacy aspects of individuals is one of the top priorities of any identity and access management (IAM) product and this is the same for WSO2 IS as well.

Undefined

Multi-region Deployment for WSO2 Identity Server - Part 2

In this article we will continue the discussion on multi-region deployment use cases for WSO2 Identity Server (IS) from part one in this series. If you haven’t already read the first part, we suggest that you read it before you continue with this article.

We identified 3 types of multi-region deployment use cases for WSO2 IS in the previous article:

Undefined

How To Optimize Your GDPR Strategy: Some Best Practices

As we get closer to the General Data Protection Regulation (GDPR) compliance deadline of May 25, 2018, organizations are eager - than ever before - to explore possible optimization strategies. This article gives an overview of optimization strategies and the topmost best practices that organizations can adopt, with an in-depth explanation of technology related optimization strategies in particular.

Undefined

Managing Business Processes in Your Enterprise

This article explores how we can use Business Process Modeling Notation (BPMN) in enterprise integration, the importance of business processes in an organization, and introduces the business process profile of WSO2 Enterprise Integrator (EI). Furthermore, I will also discuss some best practices on business process modeling (BPM) which can be used as a guideline when developing a BPM solution.

Undefined