WSO2

Introducing the Choreo AI Gateway

In recent years, AI technologies have evolved rapidly, and these capabilities are now accessible through APIs, making it easier for developers and enterprises to integrate AI into their applications. Whether it's natural language processing, image generation, or text summarization, AI APIs have become essential for modern applications.

Nigeria's Open Banking: A Technical Blueprint for CIOs and CISOs

The launch of Nigeria's open banking era is a mandate that is rapidly moving from a regulatory concept to a technical requirement. For CIOs and CISOs of Nigerian banks, this shift presents both a significant compliance challenge and a strategic opportunity. The primary concerns are maintaining security while exposing customer data, understanding the specific technology needed, and ensuring the investment delivers ROI are paramount.

WSO2 Changelog

  • 27 Mar, 2026

Attribute-Driven Account Linking with Custom Provisioning Controls

We’ve enhanced account linking functionality to provide greater flexibility and control. Administrators can now define any attribute beyond just username or email as the lookup attribute for linking accounts. In addition, provisioning behavior during account linking failures is fully configurable.

Documentation:

WSO2 Changelog

  • 27 Mar, 2026

Enhanced Organization Search in Console with Nested Hierarchy Support

We’ve introduced a nested-level organization search option in the Console.

Previously, searches were limited to immediate child organizations. With this enhancement, you can now search across the entire organization hierarchy, making it easier to locate and manage organizations at any depth.

Documentation:

WSO2 Changelog

  • 27 Mar, 2026

Configure Allowed headers and parameters to be shared with Pre-Issue Access Token extension and Custom Authenticator (Service-based)

In extension points such as Pre-Issue Access Token and Custom Authenticator actions, it is common to rely on additional headers and parameters from the request flow. However, allowing unrestricted access to all headers and parameters poses security risks, as they may contain sensitive information, personally identifiable data (PII), or internal infrastructure details.

Subscribe to