Systems | Development | Analytics | API | Testing

Latest Posts

FIDO Passkeys With Asgardeo

In March 2022, FIDO Alliance and the W3C WebAuthn working group proposed a new version of the WebAuthn specification where they claim to resolve common usability issues with FIDO while ensuring a high level of security. This has started to gain significant attention in the identity domain during the past couple of months especially with the joint announcement from Google, Apple and Microsoft on their extended support for the FIDO passwordless standard.

Generate Customized Tokens in WSO2 API Manager

There are two types of tokens which can be generated when invoking the token endpoint in WSO2 API Manager. They are Opaque tokens and JWT tokens. You can easily create a service provider through the Management console and select which type of token you wish to generate using the service provider. What if you want the generated tokens to be in a customized format? In this article, we will look at how to create our own token issuer and generate customized tokens.

How MOSIP Uses Ballerina WebSubHub for Event-Driven Integration

Ballerina is an open source programming language for the cloud that makes it easier to use, combine and create network services. In addition to the powerful language features, it comes with a rich standard library, which covers network data, messaging and communication protocols.

Simplifying B2B CIAM Using WSO2 Identity Server 6.0

The past few years have accelerated the need for every business, irrespective of their industry of operation, to provide dynamic digital experiences. Consumers now demand digital experiences that are simple, seamless, personalized, always on, and (inherently) secure from every organization they do business with. During this journey towards digitalization, businesses have often realized that this process enables them to open themselves up towards new business opportunities and modern business models.

Integrate Facebook Login to an Application Using Asgardeo

As a result of the rapid growth in the number of applications and systems in the world, it has become arduous to create multiple user accounts and remember the credentials for each application. Addressing this concern, social login has become a widely adopted login option. Social login is a simple process where a user can select a social network as their identity provider.

Identity Verification and KYC in a Digital Age

Identity verification is a crucial step in ensuring someone is who they say they are. This idea is brought through digital identity verification. This reduces the effects of individuals from creating a fraudulent identity, engaging in fraud-related crimes, or acting without the permission of someone else. Organizations must detect the identity of an individual as they manage many prominent security issues like identity theft, data breaches, and fraudulent transactions.