Systems | Development | Analytics | API | Testing

March 2022

Building a Next-Gen API Platform with the All-New Choreo Connect Microgateway, WSO2 Webinar

Microservices have become the de facto standard in modern application architecture. Modern application workloads are spread among several groups of microservices, cloud services, and legacy services. Kubernetes has become the industry standard for deploying microservices, with service meshes allowing developers to isolate and control service-to-service connections. Choreo Connect is an API microgateway that is cloud-native, open-source, and developer-focused. It offers first-rate Kubernetes support while supporting a variety of API management quality of services (QoS), such as message security rate-limiting, observability, and message mediation.

WSO2 Conducts First APAC Partner Developer Hackathon

While the year 2021 was a huge success, we've re-energized ourselves for 2022. By launching new cloud platforms, we began our path to radically simplify the production of digital experiences for our clients. This allows us to offer products and solutions as software as a service (SaaS), private cloud, or on-premises, with the ability to seamlessly move between the three alternatives in the future.

The Five Pillars of Customer Identity and Access Management

Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication as well as other nice-to-have features.

How to Optimize Customer Identity and Access Management

Customer identity and access management (CIAM) has become indispensable for organizations. According to an article by the Business Research Company, the CIAM market is expected to reach $45.56 billion in 2025, at a compound annual growth rate of 18.6%. The research firm adds that the increasing use of Internet of Things (IoT) devices — such as smartphones, smartwatches, smart homes and medical sensors — will be the primary driving factor for this growth.

Getting the Developer Community Involved (Scenario 5) - WSO2 API Manager 4.0 Use Case - Part 6

This tutorial is part of a series and can also be used as a standalone tutorial on how to get the developer community involved. For more details on the scenario and general prerequisites, please watch the previous videos on this series.

What the heck is DPoP? | IAM Community Meetups - 2022

An Application-level proof-of-possession protections for access and refresh tokens. DPoP (Demonstrating-Proof-of-Possession) is an additional security mechanism for the token generation which overcomes the issue of bearer token which will not validate between who is requested token and who is actually using the token for the access of a particular resource. In DPoP, this will be avoided by validating the client who requested the token is the one who is actually using the token using the Signed JWT tokens known as DPoP Proof.

How to Migrate from the Open Source WSO2 Identity Server to the Subscription Version?

WSO2 Identity Server is the most popular open-source CIAM system on the market, and it is widely used by educational institutions and government agencies as an on-premise CIAM solution. Single sign-on/sign-out (SSO), identity federation, strong authentication, identity administration, account management, identity provisioning, fine-grained access control, API security, monitoring, reporting, and auditing are all possible with WSO2 Identity Server's seamless integration capabilities.

The Case for Open Source IAM

Current estimates suggest widespread adoption of open source software (OSS) in organizations worldwide. Compared to sectors such as operating systems and big data, adoption in the security and identity management sector has been low until now. While there were a number of open source projects around libraries for security and identity management-related functionalities, there were only a few projects based on an end-to-end security or identity and access management (IAM) solution.

Hybrid API Management: Run Your API Gateways Anywhere

With the fast-growing popularity of cloud computing, an increasing number of organizations are now moving towards cloud-based solutions. Gartner predicts that1, "by 2020, 90 percent of organizations will adopt hybrid infrastructure management" where some parts of a solution would be in the cloud while other parts would be in traditional on-premises data centers.