Password Recovery via User Preferred Notification Channel in WSO2 Identity ServerThis blog explains how to recover the password of a user account using a user preferred notification channel using WSO2 Identity Server…May 13May 13
Published inIdentity Beyond BordersIntroduction to JSON Web Tokens (JWTs)JSON Web Token (JWT) is a compact claims representation format intended for space constrained environments such as HTTP Authorization…Dec 20, 2022Dec 20, 2022
Published inIdentity Beyond BordersUpdating email templates in Asgardeo using APIsWith the increased security threats in the digital world, providing a secure authentication and authorization mechanism has become an…Jun 26, 2022Jun 26, 2022
Published inIdentity Beyond BordersConfiguring Asgardeo as an External IDP using OIDCHave you ever used social login options such as Google sign-in, Facebook login and GitHub sign-in to log in to any application you used? If…Jun 1, 2022Jun 1, 2022
Published inIdentity Beyond BordersIntegrate Facebook login to an application using AsgardeoDue to the rapid growth of applications and systems in the world, it has become arduous to create user accounts and mange the credentials…May 31, 2022May 31, 2022
Published inIdentity Beyond BordersCIAM and EIAMIdentity and Access Management (IAM) is a framework of processes, policies and tools which defines and manages digital identities and their…May 16, 2022May 16, 2022
Published inIdentity Beyond BordersAccount Recovery configurations in WSO2 Identity ServerIn Identity and Access Management, Account Recovery is one of the most important use cases that we need to explore on. Due to the rapid…Feb 28, 2022Feb 28, 2022
Published inIdentity Beyond BordersOAuth 1.0 Vs OAuth 2.0OAuth (Open Authorization) is a protocol used for access delegation, where resource owners grant third-party applications to access their…Aug 29, 20212Aug 29, 20212
Published inIdentity Beyond BordersUser Provisioning with WSO2 Identity ServerIf you consider a scenario like joining an organization or open a new bank account, your identity is represented by a digital identity…Jun 28, 2021Jun 28, 2021
Published inIdentity Beyond BordersA Beginner’s Guide to SCIMWith the advancement in technology, a significant amount of attention should be paid to ensure security and confidentiality of users when…May 23, 2021May 23, 2021