LibraryIdentity & Access Management

Blog

WSO2 Identity Server supports SAML authentication and single sign-on capabilities where it can be used as the identity provider for a relying party application (service provider). This blog post will focus on how you can retrieve user claims in SAML response with service provider claim configuration in WSO2 IS.

Library Search

Security

Pages

What is WSO2 Identity Server?

  • By  Ishara Karunarathna and Isura Karunaratne
  • 14 Aug, 2017

Enterprise Identity and Access Management Use Cases

This webinar will explore how to address identity and access management of complex heterogeneous enterprises through some common use cases and solution patterns.

http://go.pardot.com/l/142131/2017-06-28/454pd2*505404499*171735731,492645603,607800995,505404499*http://go.pardot.com/l/142131/2017-06-28/454hhz, http://go.pardot.com/l/142131/2017-06-28/454hj4,http://go.pardot.com/l/142131/2017-06-28/454gsq,http://go.pardot.com/l/142131/2017-06-28/454pd2*Sign up for all webinars in the Summer School Webinar Series 2017*Enterprise Identity and Access Management Use Cases

Building a Customer Identity and Access Management Solutions (CIAM) with WSO2 Identity Server

This webinar will explore how to achieve the perfect amount of restriction in order to create a customer IAM solution that provides a seamless user experience.

http://go.pardot.com/l/142131/2017-06-28/454gsq*607800995*171735731,492645603,607800995,505404499*http://go.pardot.com/l/142131/2017-06-28/454hhz, http://go.pardot.com/l/142131/2017-06-28/454hj4,http://go.pardot.com/l/142131/2017-06-28/454gsq,http://go.pardot.com/l/142131/2017-06-28/454pd2*Sign up for all webinars in the Summer School Webinar Series 2017*Building a Customer Identity and Access Management Solutions with WSO2 Identity Server

Securing Access to SaaS Apps with WSO2 Identity Server

This webinar will explore the security concerns that arise when adopting SaaS applications and how you can overcome them using common solution patterns.

http://go.pardot.com/l/142131/2017-06-28/454hj4*492645603*171735731,492645603,607800995,505404499*http://go.pardot.com/l/142131/2017-06-28/454hhz, http://go.pardot.com/l/142131/2017-06-28/454hj4,http://go.pardot.com/l/142131/2017-06-28/454gsq,http://go.pardot.com/l/142131/2017-06-28/454pd2*Sign up for all webinars in the Summer School Webinar Series 2017*Securing Access to SaaS Apps with WSO2 Identity Server

Identity Federation Patterns with WSO2 Identity Server

This webinar will explore the challenges of identity federation and how you can leverage identity federation patterns to overcome these challenges.

http://go.pardot.com/l/142131/2017-06-28/454hhz*171735731*171735731,492645603,607800995,505404499*http://go.pardot.com/l/142131/2017-06-28/454hhz, http://go.pardot.com/l/142131/2017-06-28/454hj4,http://go.pardot.com/l/142131/2017-06-28/454gsq,http://go.pardot.com/l/142131/2017-06-28/454pd2*Sign up for all webinars in the Summer School Webinar Series 2017*Identity Federation Patterns with WSO2 Identity Server

[Blog Post] OAuth 2.0 Threat Landscapes

Not long ago — early one day in May, I got an email from a good friend of mine, which I didn't resist to open and check out what it was. He had shared a Google doc — and once I clicked on the link a suspicious screen appeared, asking me permission to read, delete, send and manage my emails. Why on the earth would ‘Google Docs’ ask permissions to access my emails? I really didn’t bother to see whether it’s the real Google Docs — or fake, but I didn’t proceed any further.

[Blog] The Role of Identity and Access Management in the Era of Digital Transformation

In this blog Prabath Siriwardana explores what encompasses a successful identity and access management strategy for digital transformation.

[Article] Frictionless Adoption of Security Recommendations for the Payment Services Directive 2 (PSD2) with WSO2

The Payment Services Directive 2 has been initiated by the European Union for the advancement of digital payment services. In order to adhere to the directive, payment service providers are required to follow several rules and recommendations in API security, API exposure, user authentication and user authorization. This article discusses the main considerations under PSD2 and how WSO2 products (mainly WSO2 Identity Server and WSO2 API Manager) can be leveraged when adapting and moving beyond PSD2.

Writing a Custom Inbound Authenticator for WSO2 Identity Server 5.3.0

Authentication is an integral part of any identity and access management suite, and WSO2 Identity Server is no exception. It offers a comprehensive and feature-rich authentication framework which is capable of handling almost all kinds of authentication protocols out-of-the-box with the added advantage of support for any type of authentication protocol through simple Java code.

WSO2 Identity Server 5.3.0 introduces a new authentication framework and brings with it the ability to write improved pluggable inbound/outbound authenticators. This article explores the constituent parts of an inbound authenticator component as found in WSO2 Identity Server 5.3.0 and how they fit together to handle a given custom authentication protocol.

Frictionless Adoption of Payment Services Directive (PSD2) with WSO2

In this webinar, Pushpalanka Jayawardhana, senior software engineer at WSO2 will will discuss and demonstrate how WSO2 can help you comply with PSD2 with ease.

http://go.pardot.com/l/142131/2016-09-22/2dn19f*275161955****Frictionless Adoption of Payment Services Directive (PSD2) with WSO2

Pages