Latest Content

Cost-effective Open Banking Compliance for Australia

Open Banking at Westpac is estimated to be around AU$200 million, according to Westpac CEO Brian Hartzer's address to the House of Representatives Standing Committee on Economics. He further explained that this can be attributed to the complexity of the existing environment of systems as well as the need for specialized skills in order to implement open banking. What’s alarming about this statement is that if an open banking implementation comes at such a large cost, then it’s going to be economically prohibitive for a majority of the 134 Authorized

Federating Azure AD with WSO2 Identity Server

This article will explore how Office 365 integration with WSO2 Identity Server enables organizations with existing on-premise user stores to securely and conveniently extend user identities to Office 365 without the burden of Microsoft provided federation tools.

Enhancing Security Using Threat Protection and Mutual SSL in WSO2 API Manager Gateway

In this article, we focused on enhancing the security of the API management deployment using WSO2 API Manager's gateway using threat protection and mutual SSL.

A Quick Guide To User-Managed Access 2.0

Introduction

User-Managed Access 2.0 or UMA is a new federated authorization standard protocol built on top of OAuth 2.0 which enables party-to-party sharing. Kantara Initiative has introduced this award winning protocol.

[WSO2Con EU 2018] Enhancing Business Agility: An End-to-end Solutions Architecture Use Case

This tutorial will explore a use case where an airline is trying to enhance its customer experience by making various airline information services available to customers and allowing them to manage their travel experience.

OAuth 2.0 Threat Landscape

Not long ago — on a day in May, I got a mail from a good friend of mine, which I opened without hesitation. He was sharing a Google doc — and once I clicked on the link to open it up, a suspicious-looking screen appeared, asking permissions from me to read, delete, send, and manage my emails. Why on the earth was ‘Google Docs’ asking my permissions to access my emails? Well, yes — the screen said it's ‘Google Docs’. I really didn’t bother to check if it’s real Google Docs — or fake, but I didn’t proceed any further after this.

[WSO2Con EU 2018] Decentralized Data Architecture

[WSO2Con EU 2018] Building Reactive Applications Using APIs, Events and Streams

[WSO2Con EU 2018] Realizing Implementation of Cell-based Architecture

[WSO2Con EU 2018] Up-leveling Brownfield Integration

In this session, Nandika will discuss how you can use the lean, enterprise-ready, high performing WSO2 integration platform to solve integration and innovation challenges that organizations face when carrying out brownfield integration.

Pages