LibraryIdentity & Access Management

Blog

WSO2 Identity Server supports SAML authentication and single sign-on capabilities where it can be used as the identity provider for a relying party application (service provider). This blog post will focus on how you can retrieve user claims in SAML response with service provider claim configuration in WSO2 IS.

Library Search

Security

Pages

Digital Transformation with Mobile Connect: Enhancing your Customer Experience

With it’s zero-code configuration approach, WSO2 Identity Server further simplifies the integration of GSMA Mobile Connect with your consumer applications. Any application that supports open standards such as SAML and OpenID Connect can leverage this approach.

https://go.pardot.com/l/142131/2017-09-13/4fb7qq*673046451****Digital Transformation with Mobile Connect: Enhancing Customer Experience

[Blog Post] General Data Protection Regulation (GDPR) for Identity Architects

The EU General Data Protection Regulation (GDPR) is the regulation 2016/679 of the European Parliament and of the Council, which replaces the Data Protection Directive 95/46/EC. It was designed to harmonize data privacy laws across Europe to protect and empower all EU citizens' (and residents') data privacy and to reshape the way organizations across the region approach data privacy.

What is WSO2 Identity Server?

  • By  Ishara Karunarathna and Isura Karunaratne
  • 14 Aug, 2017

Enterprise Identity and Access Management Use Cases

This webinar will explore how to address identity and access management of complex heterogeneous enterprises through some common use cases and solution patterns.

https://go.pardot.com/l/142131/2017-06-28/454pd2*505404499*171735731,492645603,607800995,505404499*https://go.pardot.com/l/142131/2017-06-28/454hhz, https://go.pardot.com/l/142131/2017-06-28/454hj4,https://go.pardot.com/l/142131/2017-06-28/454gsq,https://go.pardot.com/l/142131/2017-06-28/454pd2*Sign up for all webinars in the Summer School Webinar Series 2017*Enterprise Identity and Access Management Use Cases

Building a Customer Identity and Access Management Solutions (CIAM) with WSO2 Identity Server

This webinar will explore how to achieve the perfect amount of restriction in order to create a customer IAM solution that provides a seamless user experience.

Securing Access to SaaS Apps with WSO2 Identity Server

This webinar will explore the security concerns that arise when adopting SaaS applications and how you can overcome them using common solution patterns.

https://go.pardot.com/l/142131/2017-06-28/454hj4*492645603*171735731,492645603,607800995,505404499*https://go.pardot.com/l/142131/2017-06-28/454hhz, https://go.pardot.com/l/142131/2017-06-28/454hj4,https://go.pardot.com/l/142131/2017-06-28/454gsq,https://go.pardot.com/l/142131/2017-06-28/454pd2*Sign up for all webinars in the Summer School Webinar Series 2017*Securing Access to SaaS Apps with WSO2 Identity Server

Identity Federation Patterns with WSO2 Identity Server

This webinar will explore the challenges of identity federation and how you can leverage identity federation patterns to overcome these challenges.

https://go.pardot.com/l/142131/2017-06-28/454hhz*171735731*171735731,492645603,607800995,505404499*https://go.pardot.com/l/142131/2017-06-28/454hhz, https://go.pardot.com/l/142131/2017-06-28/454hj4,https://go.pardot.com/l/142131/2017-06-28/454gsq,https://go.pardot.com/l/142131/2017-06-28/454pd2*Sign up for all webinars in the Summer School Webinar Series 2017*Identity Federation Patterns with WSO2 Identity Server

[Blog Post] OAuth 2.0 Threat Landscapes

Not long ago — early one day in May, I got an email from a good friend of mine, which I didn't resist to open and check out what it was. He had shared a Google doc — and once I clicked on the link a suspicious screen appeared, asking me permission to read, delete, send and manage my emails. Why on the earth would ‘Google Docs’ ask permissions to access my emails? I really didn’t bother to see whether it’s the real Google Docs — or fake, but I didn’t proceed any further.

[Blog] The Role of Identity and Access Management in the Era of Digital Transformation

In this blog Prabath Siriwardana explores what encompasses a successful identity and access management strategy for digital transformation.

Pages