Latest Content

What’s New in WSO2 API Manager Version 3.0?

An Introduction to WSO2 API Manager

WSO2 API Manager is a fully open-source, full lifecycle API management product that can be deployed on-prem, is available on SaaS, deployed on a private cloud, or deployed in a hybrid model. It comprises the following components.

Undefined

Por que nem todos os projetos do IAM cruzam a linha de chegada

De acordo com um estudo realizado pela KPMG em 2009, 75% dos projetos do IAM oferecem menos que o esperado. Em um estudo conduzido pela McKinsey & Company em conjunto com a Universidade de Oxford, 17% dos grandes projetos de TI têm um desempenho tão baixo que podem ameaçar a própria existência da empresa. Este estudo utilizou uma amostra de 5.400 projetos de TI de grande escala (projetos com orçamentos iniciais maiores que US $ 15 milhões).

Undefined

O que é o WSO2 Identity Server?

Undefined

WSO2 API Manager for Pivotal Cloud Foundry

Full API lifecycle management for Pivotal Cloud Foundry

WSO2 API Manager is an open-source solution to design, develop, publish, document, and consume APIs in a secure manner. The solution is highly extensible and customizable and can be deployed in highly scalable configurations.

Undefined

How Identity and Access Management Meets CIO and CISO Goals

Identity and access management (IAM) is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges. It enables you to provide a seamless experience to all users of your system while making sure that security is given the highest priority.

Undefined

Architecture for Third Party Authorization Server Integration

Figure 1: OAuth2 client credentials generation in authorization server replacement
Figure 2: OAuth2 authorization server validates request and OAuth2 access token request in authorization server replacement
Figure 3: OIDC userinfo request in authorization server replacement
Figure 4: OAuth2 access token introspection in authorization server replacement
Figure 5: OAuth2 access token revocation in authorization server replacement
Figure 6: OAuth2 authorization request and OAuth2 access token request in authorization server proxying
Figure 7: OIDC userinfo request in authorization server proxying
Figure 8: OAuth2 token introspection request in authorization server proxying
Figure 9: OAuth2 token revocation request in authorization server proxying
Figure 10: Client credentials generation in third party Key Manager Integration
Figure 11: OAuth2 token introspection call in third party key manager integration

Introduction

In an API management ecosystem, sometimes there are requirements for components from multiple vendors to work together:

Undefined

Are You Ready for the CCPA?

Over the past few years, consumer data protection and privacy has become a hot topic in the consumer identity and access management (CIAM) domain. Owing to numerous new ways to aggregate personal data and the development of powerful analytical tools, the financial value of consumer data has skyrocketed within a short period.

Undefined

Local Account Linking

Introduction

In the article Identity Management Solution Patterns, we took a look at some of the reasons why organizations may need to continue to manage some parts of a digital identity under specific applications or services (relying parties or RPs), even if they are utilizing a centralized identity management system. In such cases, an important requirement is to establish the link between these related digital identities.

Undefined

Consent Management for Open Banking

This article covers the basic concepts around consent management, tips for successful implementation, and how banks should prepare for it.

Undefined

The CCPA and IAM: A Deep Dive

The California Consumer Privacy Act (CCPA), which will come into effect on 1 January 2020, grants consumers new rights regarding the use and collection of their personal information. Since it is a must to comply, now is the right time to move into a CCPA-compliant solution. Gaining knowledge about the new law and how to use identity and access management (IAM), to be compliant with CCPA, will provide an advantage to select the right solution for your business.

Undefined

Pages