Systems | Development | Analytics | API | Testing

Latest Videos

CIAM Responsible Solutions for Creating Positive Consumer Experiences - CIAM Trend Chat NA 2022

Consumers see the world as all digital with no divide. As a result, whether those consumers are young, old, digitally savvy, or technophobes; organizations are going to have to find a way to ‘deliver better customer interactions’ than their competitors if they are to acquire and retain them. Customer Identity and Access Management (CIAM) can be defined as “A customer-focused IAM discipline that facilitates leveraging identity data with business data to catalyze business growth”.

Secure your apps with Proof Key for Code Exchange (PKCE) using WSO2 Identity Server #Identityin15

PKCE is an OAuth 2.0 security extension for public clients to avoid a malicious programme creeping from intercepting the authorisation code. In this episode of #IdentityIn15, we will be demonstrating how PKCE works with OAuth 2.0 Authorization Code Grant using the WSO2 Identity Server in just 15mins.

Mock Implementation with Choreo Connect, WSO2 API Manager

In Choreo Connect 1.1.0 release, mock APIs are supported considering the API definition file. Users can define mock responses in Open API Specification 3 (OAS 3) or using Swagger definition. With the latest WSO2 API Manager 4.1.0 release, the relevant endpoint type for this API type is Mock Implementation Endpoint type. These APIs are manipulated under the pre-released API lifecycle state. With Choreo Connect API definition based mock implementations, you can define default responses, HTTP status code based responses, status code based preferred response retrievals.

Validate WSO2 API Manager gateway request with open policy agent

Open policy agent (OPA) enables you to write security and compliance policies as code, or call any external policies using the OPA standard. WSO2 API manager uses this capability to offload policy decisions of API gateway requests to this policy engine. By decoupling the policy enforcement from evaluation, API policymakers now have the opportunity to write dynamic and reusable policies for ever-changing requirements. You can then reuse an OPA policy like any other policy in the API Manager by graphically dragging and dropping it into a policy pipeline. This video explains how it works and gives a demo.

Proof of possession for OAuth2 tokens(DPoP) with WSO2 Identity Server #Identityin15

In today's episode, we will discuss how you can secure OAuth2 Tokens with DPoP using the WSO2 Identity Server. DPoP (Demonstrating-Proof-of-Possession) is an additional security mechanism for the token generation which overcomes the issue of bearer token which will not validate between who is requested token and who is actually using the token for the access of a particular resource. The following is the outline for today's session.