Systems | Development | Analytics | API | Testing

Security

The Red Velvet Rope of Low-Code Data Security

Here at Appian we're really excited to have released our low-code data security feature earlier this year. If you're not sure what that is, you're in good company. Even our parents just look at us blankly before saying "that's nice, dear" and changing the subject. Someone who doesn't love us unconditionally might be more skeptical.

5 ways we make sure your data is safe on Bitrise - compliance, access control, encryption, and more

Some of the world's most security-conscious companies rely on Bitrise to build safely. This article is a summary of the most important security-related measures we take to make sure your sensitive data is always protected.

Multi-Attribute Login with WSO2 Identity Server

Depending on the business, the applications may need to authenticate with different login attributes. For example, social media applications use userId, email, or mobile number as the identifier, Internet banking applications use userId or username as the identifier, Corporate enterprise applications use email as the identifier. In WSO2 Identity Server 6.0.0 provides the capability to use different login attributes as a productized feature. It gives users the flexibility to choose their preferred identity attribute when logging in, such as email, username, or mobile number. A privileged user in the organization can configure the list of allowed attributes that can be used as the login identifier.

WSO2 Private CIAM Cloud Delivers B2B CIAM Capabilities Through Organization Management

WSO2 Private CIAM Cloud supports B2B and B2C business models through the B2B organization management feature. Unlike other CIAM products that are limited to simple organization management, the B2B organization management in WSO2 Private CIAM Cloud handles complex nesting.

Device flow support with WSO2 Identity Server

Device flow is an OAuth2.0 extension that expands the range of devices an organization can use within their overall digital customer experience solution to include devices with limited user input capabilities (such as smart TVs which do not have keyboards). With device flow support, users can leverage other devices, such as smartphones, to complete the login on the limited input device.

WSO2 Identity Server User Authentication in a Next.js Application

Next.js is an open source React web development framework built on top of Node.js. The Next.js framework is known for: With the help of the NextAuth.js library, I will explain how to authenticate a user in a Next.js application with WSO2 Identity Server. NextAuth is an open source authentication solution for Next.js applications. More information about NextAuth.js is available here.

The Complete Guide to API Tokens

The use of APIs has rapidly been on the rise over the last several years. In fact, data shows that nearly 90% of developers are using APIs and REST APIs in some capacity. APIs or application programming interfaces refer to functions that allow applications to access data and interact with external software components, operating systems, and microservices. Essentially, the main goal of an API is to enable multiple applications to communicate with one another as APIs.

WSO2 Launches WSO2 Private CIAM Cloud to Deliver Best-in-Class CIAM Support for Both B2B and B2C Demands

WSO2 also delivers stronger analytics, typing biometric authentication, multi-attribute login, and added device support with today's releases of WSO2 Identity Server 6.0 and WSO2 Private CIAM Cloud.

Medical Device Security Best Practices

Growing concerns surrounding medical device security are increasing across the globe. In the U.S., new legislation is being introduced due to the increasing number of connected devices and a cyberattack’s ability to disrupt patient care. On June 8, 2022, the U.S. House of Representatives passed bill, H.R. 7667, which in addition to several other items, is meant to address the cybersecurity of medical devices.