LIBRARY

A Deep Dive of Transaction Risk Analysis for Open Banking and PSD2

This article will discuss the basics of Transaction Risk Analysis and how it affects strong customer authentication (SCA) in the second Payment Services Directive (PSD2) accounts/payments flows.
Undefined

UMA 2 in Action: Part 2

This is the second part of our article series which explores practical use cases of User-Managed Access (UMA 2.0 or UMA 2). The primary focus of this article is to discuss a UMA 2 specification known as the Federated Authorization for UMA 2. This specification standardizes interactions among the authorization server (AS), the resource server (RS), and the resource owner (RO).

Undefined

Understanding the Open API Specification for Australia

Open banking is a game changer for the financial services industry in Australia. Securely opening up banking data in a standardized form with the intent of improving customer experiences is the main goal of the Consumer Data Right (CDR). This notion is backed by the Treasury and the Australian Competition and Consumer Commission (ACCC). The idea of opening up data through APIs to be consumed by accredited third parties may pose several security concerns to banks.

Undefined

Brownfield Integration: Why It's Important For Modernizing Your Enterprise

Transforming a conventional business into a digital business is essential to expand the business and increase its productivity. Integrating heterogeneous systems and building an ecosystem with these integrated components are fundamental requirements in the digital transformation of enterprises. Many organizations have one or more legacy systems that provide limited support for integrating with other systems. However, it is impractical to replace all existing systems by building them from scratch.

Undefined

APIs and Beyond - Getting Your Technology in Place for Open Banking Australia

This article examines the key technology components required for open banking in Australia and how to build your technology vision to stay true to your open banking goals.
Undefined

UMA 2 in Action: Part 1

Privacy has become a very significant global concern, not limited to any specific country or geographical area. Massive data breaches, data misuse by some large enterprises, and unauthorized surveillance have fueled large scale social movements that demand better privacy regulations and secure technologies. The General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA) are some of the best examples of modern-day privacy regulations that try to address key privacy concerns at present.

Undefined

Cost-effective Open Banking Compliance for Australia

The content of this post was updated on February 28, 2020 to reflect the current regulatory position.

Undefined

Federating Azure Active Directory using Azure Federation with WSO2 Identity Server

This article will explore how Office 365 integration with WSO2 Identity Server enables organizations with existing on-premise user stores to securely and conveniently extend user identities to Office 365 without the burden of Microsoft provided federation tools.

Undefined

Enhancing Security Using Threat Protection and Mutual SSL in WSO2 API Manager Gateway

In this article, we focused on enhancing the security of the API management deployment using WSO2 API Manager's gateway using threat protection and mutual SSL.
Undefined

A Quick Guide To User-Managed Access 2.0

User Managed Access (UMA) components
How UMA makes requests to Resource Registration Endpoint
UMA Permission Endpoint
UMA Token Introspection Endpoint
UMA Grant
How UMA works in WSO2 Identity Server

Introduction

User-Managed Access (UMA) 2.0 is a federated authorization standard protocol built on top of Open Authentication (OAuth) 2.0 which enables party-to-party sharing. The award winning protocol was introduced by the Kantara Initiative.

Undefined