What’s up people? Today I’m going to talk about how you can easily run the SAML2 based single-sign-on sample with WSO2 Identity Server. SAML stands for Security Assertion Markup Language and SAML2 is a version of the SAML standard for exchanging authentication and authorization data between security domains. You can read more about SAML2 here. As a prerequisite, you’ll need ...
WSO2 Identity Server is capable of exposing REST APIs to manage users in your user stores, via SCIM. SCIM or System for Cross-domain Identity Management is a standard for automating the exchange of user identity information between identity domains, or IT systems. You can read more about SCIM, here. WSO2 Identity Server supports SCIM 1.0 standard from version 5.3.0 and ...
When a user authenticates with the WSO2 Identity Server, a session is created. These sessions are stored as session context objects, against the commonAuthId cookie in WSO2 implementation. Information about the logged in user is inside these session objects. But, there are times where we want to query these sessions by passing the user. A practical example is where we ...
Hello friends! This is the part 3 of implementing our own customized authentication flow based on session data with WSO2 Identity Server 5.3.0. If you didn’t see the first and second parts of the project, please read them before continuing. In the first post, we wrote a custom data publisher and invoke that class in the authentication flow. At first, ...
Hi all! This is the first post I’m writing under the new category, IS Diaries. The post talks about what I learned first when I started working in WSO2 Identity Server. Fixing a small issue in a project is the best way to get familiarize with its code while doing something useful. Even though I talk about wso2/product-is repository, most ...
Hi folks, Today I’m going to talk about Artifact Binding specification of SAML 2.0. Before we being, I’ll give you a brief understanding of SAML. SAML 2.0 stands for Security Assertion Markup Language version 2.0. This is an XML-based protocol which is recognized by the OASIS Standard and it’s widely used in the software industry for enabling cross-domain single sign-on ...
Hi there, It’s been a while… Today I’m gonna talk about how to manage a software development project properly, at least how I see it should. Bear with me here, when I say ‘managing’, this isn’t a Project Management Tutorial as in a responsibility of a project manager, but more of a practical guide how not to screw up your software ...
Hi all, Today I’m going to walk through how we can connect Microsoft Azure Active Directory with WSO2 Identity Server as a federated identity provider. First of all, if you’re not familiar with Azure AD, you can read about it from here. “Azure Active Directory (Azure AD) is Microsoft’s multi-tenant, cloud-based directory, and identity management service that combines core directory ...
What’s up, folks? WSO2 Identity Server team is quite busy these days writing REST APIs for all of its functions and old SOAP APIs. Accordingly, I myself got to write a REST API for an old SOAP service we had, and today I’m going to tell you what I learned in that effort. This article will cover the most common ...
Today I’m going to explain how we can write our own custom authenticator with WSO2 Identity Server. As you may already know, almost all the features of the WSO2 Identity Server can be extended and customized to cater to any business use case you have. And one of such extension point is the AbstractApplicationAuthenticator. Methods of the Extension Point Let’s ...
Hi all, This is the second part of my REST API guide where I’ll be focussing on designing a simple API using SwaggerHub, explaining basic functionalities of the SwaggerHub editor and the Open API Specification. My previous article covered the basic concepts of REST APIs. Introduction OpenAPI OpenAPI is a format of writing an API definition to describe the structure ...
Introduction Hello everyone, today I’m gonna talk about hash algorithms. First of all, what is a hash algorithm? A hash algorithms can be simply described as a set of instructions, that can be used to convert or map any arbitrary sized data into a fixed size string. Confused? Well see the follow diagram. How a hash function works. Source : ...
Hi guys, blogging after a long time… :) First of all, this post is about some code I developed in C for an assignment in my degree program, which I think would be very helpful to those who are in need, specially my juniors. ;) But please use this just to get an idea and copy pasting will guarantee a ...
This is a problem that many has come to when working with SCIM2 APIs. I think the main reason for this requirement to be a “problem” is the added complexity of the SCIM API. The target of this post to be the simplest guide on getting $subject done. Adding SCIM Extension configs. Open the file [IS-HOME]/repository/conf/scim-schema-extension.config Add the following configuration ...
vihangaliyanage:කාලෙකට පස්සේ නියම blog post එකක් හම්බුනා. Reblog නොකර ඉන්න හිත දුන්නෙම නෑ. ;) කියවල බලන්න ගොඩක් වැදගත්. Originally posted on Gnomez Grave: This is not regarding any techie thing or any project I have done. This is simply about how properly make a CV, in my point of view. The main cause is, I had the chance to review ...
In my previous post, Identity Governance 101: Popular User Stories, I talked about the basics of identity governance and most popular governance user stories in the IAM domain. Following the same topic, let’s dive deep into User Self Registration and how you can see it in action with WSO2 Identity Server. The Concept Self registration is the most used method ...
Introduction Identity Verification has been a popular concept for over a decade now, and when simply put, it’s about verifying the identity of an online user. In other words, figuring out whether the person submitting the information is actually who they claim to be or not. There are many companies in the world that offer identity verification as a service, ...
This is the third post on the series about Identity Governance and today we’re looking into user account locking. Have a look on my Identity Governance 101: Popular User Stories first, to understand the big picture if you haven’t already done! Let’s dive in… The Concept This is a bit advanced user story that we can see in the Identity ...