Systems | Development | Analytics | API | Testing

WSO2

Supporting custom user attributes with SCIM 2 #Identityin15

In today's episode, we will discuss how you can define custom user attributes in SCIM 2.0 using a custom schema in just 15mins. WSO2 Identity Server allows adding custom attributes into user objects through Enterprise User Extension. From IS-6.0.0 onwards, you can use a custom schema to manage your custom attributes of the user.

Policy Management with WSO2 API Manager

REST APIs have become the building blocks of all enterprise business applications over the last few years. There have been significant improvements for these components to make them more convenient to implement, manage, and maintain. Authentication and authorization have been the key element controlling these REST APIs. However, with the advancement of business use-cases, they are used to address modern business problems.

Identity Server 6 & Private CIAM Cloud with B2B CIAM, WSO2 Webinar

In today’s competitive environment, many organizations seek to expand their business operations through innovative partnerships (B2B). These partnerships can transform an organization’s entire value delivery chain, allowing them to create new business models and reach more customers. Learn about WSO2’s latest feature enhancements that enable organizations to create innovative, low-friction customer experiences across B2C, B2B, and G2C use cases.

WSO2 and Fluidra to Share Case Study on Driving Digital Transformation with APIs at Gartner IT Symposium/Xpo 2022 in Barcelona

Gartner IT Symposium/Xpo Solutions Provider Session will examine how adopting an API-first strategy with WSO2's technology has enabled Fluidra to improve quality, performance and collaboration and achieve faster delivery times.

What's Happening To Middleware In The Cloud-Native Era?

Spending two decades in the middleware field has given me deep insight into the evolution of this technology domain. I began my career as a software engineer in a platform group, building reusable components using technologies like object linking and embedding (OLE), the distributed component object model (DCOM) and common object request broker architecture (CORBA).

New WSO2 Research Reveals Where Organisations Are Floundering to Successfully Digitise Services

While APIs are at the heart of digital transformation, 74% of survey respondents do not have a fully rolled out API strategy. 87% of respondents value open-source platforms combined with hybrid environments that deliver flexibility and enable deployment choices. 95% of respondents are experiencing challenges with their CIAM platform.

Not All MFA is Created Equal, Especially in CIAM

Since October is cybersecurity awareness month, it’s a great time to revisit the question of what are the best ways to secure user authentication in CIAM. In many industries (finance and healthcare, to name a few), regulations require the use of multifactor authentication (MFA) to protect access to sensitive data and transactions.

Surviving the API Security Apocalypse

With more and more businesses transforming themselves digitally, it has become critical to secure your APIs. An insecure API is an easy target for attackers to gain access to an otherwise secure computer or network. We invite you to learn about API security best practices to protect against cyberattacks, API misuse, data breaches, and zombie APIs.