Systems | Development | Analytics | API | Testing

Latest Videos

Identity Server 6 & Private CIAM Cloud with B2B CIAM, WSO2 Webinar

In today’s competitive environment, many organizations seek to expand their business operations through innovative partnerships (B2B). These partnerships can transform an organization’s entire value delivery chain, allowing them to create new business models and reach more customers. Learn about WSO2’s latest feature enhancements that enable organizations to create innovative, low-friction customer experiences across B2C, B2B, and G2C use cases.

Surviving the API Security Apocalypse

With more and more businesses transforming themselves digitally, it has become critical to secure your APIs. An insecure API is an easy target for attackers to gain access to an otherwise secure computer or network. We invite you to learn about API security best practices to protect against cyberattacks, API misuse, data breaches, and zombie APIs.

Device flow support in WSO2 Identity Server #Identityin15

In today's episode, we will discuss how you can configure OAuth2.0 device flow for your applications. Device flow is an OAuth2.0 extension that expands the range of devices an organization can use within their overall digital customer experience solution to include devices with limited user input capabilities (such as smart TVs which do not have keyboards). With device flow support, users can leverage other devices, such as smartphones, to complete the login on the limited input device.

Elastic stack-based Analytics Integration with WSO2 Identity Server

WSO2 Identity Server is an API-driven open source IAM product designed to help you build effective CIAM solutions. ELK-based analytics solution is introduced to view the login and session-related analytics data. Three dashboard templates are provided by default: Auth dashboard, Session dashboard, and alert dashboard. The session dashboard includes statistics related to sessions that get created for different applications accessed via the WSO2 Identity Server. Auth dashboard includes statistics related to login attempts made via the WSO2 Identity Server. The Alert dashboard includes suspicious Login Alerts and Long session alerts.

Multi-Attribute Login with WSO2 Identity Server

Depending on the business, the applications may need to authenticate with different login attributes. For example, social media applications use userId, email, or mobile number as the identifier, Internet banking applications use userId or username as the identifier, Corporate enterprise applications use email as the identifier. In WSO2 Identity Server 6.0.0 provides the capability to use different login attributes as a productized feature. It gives users the flexibility to choose their preferred identity attribute when logging in, such as email, username, or mobile number. A privileged user in the organization can configure the list of allowed attributes that can be used as the login identifier.