Open in app

Sign In

Write

Sign In

Rashmini Naranpanawa
Rashmini Naranpanawa

57 Followers

Home

About

Published in

Identity Beyond Borders

·Dec 20, 2022

Introduction to JSON Web Tokens (JWTs)

JSON Web Token (JWT) is a compact claims representation format intended for space constrained environments such as HTTP Authorization headers and URI query parameters. It represents a set of claims as a JSON object. …

Jwt

5 min read

Introduction to JSON Web Tokens (JWTs)
Introduction to JSON Web Tokens (JWTs)
Jwt

5 min read


Published in

Identity Beyond Borders

·Jun 26, 2022

Updating email templates in Asgardeo using APIs

With the increased security threats in the digital world, providing a secure authentication and authorization mechanism has become an essential requirement. Due to that, managing a large user base while providing security has become a burden for the developers. Asgardeo was introduced to help developers implement secure authentication flows to…

Iam

5 min read

Updating email templates in Asgardeo using APIs
Updating email templates in Asgardeo using APIs
Iam

5 min read


Published in

Identity Beyond Borders

·Jun 1, 2022

Configuring Asgardeo as an External IDP using OIDC

Have you ever used social login options such as Google sign-in, Facebook login and GitHub sign-in to log in to any application you used? If so, you are already aware of how easy it is to sign in to an application using an existing social account. Similarly, we can use…

Iam

4 min read

Configuring Asgardeo as an External IDP using OIDC
Configuring Asgardeo as an External IDP using OIDC
Iam

4 min read


Published in

Identity Beyond Borders

·May 31, 2022

Integrate Facebook login to an application using Asgardeo

Due to the rapid growth of applications and systems in the world, it has become arduous to create user accounts and mange the credentials separately for each application. Addressing this concern, Social Login has become one of the most widely adopted login options. Social Login is a simple process where…

Iam

4 min read

Integrate Facebook login to an application using Asgardeo
Integrate Facebook login to an application using Asgardeo
Iam

4 min read


Published in

Identity Beyond Borders

·May 16, 2022

CIAM and EIAM

Identity and Access Management (IAM) is a framework of processes, policies and tools which defines and manages digital identities and their access privileges to applications and services. It should be capable of storing identity data securely, and should share only necessary and relevant data. …

Identity Management

4 min read

CIAM and EIAM
CIAM and EIAM
Identity Management

4 min read


Published in

Identity Beyond Borders

·Feb 28, 2022

Account Recovery configurations in WSO2 Identity Server

In Identity and Access Management, Account Recovery is one of the most important use cases that we need to explore on. Due to the rapid growth in digital transformation and technology, these days people have multiple accounts in multiple websites. Hence, there is a high probability of the users loosing…

Wso2is

6 min read

Account Recovery configurations in WSO2 Identity Server
Account Recovery configurations in WSO2 Identity Server
Wso2is

6 min read


Published in

Identity Beyond Borders

·Aug 29, 2021

OAuth 1.0 Vs OAuth 2.0

OAuth (Open Authorization) is a protocol used for access delegation, where resource owners grant third-party applications to access their resources without sharing their user credentials. This blog will explore on OAuth protocol with a real world scenario and let’s try to understand the differences between OAuth 1.0 and OAuth 2.0. …

Oauth

4 min read

OAuth 1.0 Vs OAuth 2.0
OAuth 1.0 Vs OAuth 2.0
Oauth

4 min read


Published in

Identity Beyond Borders

·Jun 28, 2021

User Provisioning with WSO2 Identity Server

If you consider a scenario like joining an organization or open a new bank account, your identity is represented by a digital identity which is usually known as a user account. It can be a self-registered one or an account created by an administrator depending on the scenario. The organization…

Wso2is

6 min read

User Provisioning with WSO2 Identity Server
User Provisioning with WSO2 Identity Server
Wso2is

6 min read


Published in

Identity Beyond Borders

·May 23, 2021

A Beginner’s Guide to SCIM

With the advancement in technology, a significant amount of attention should be paid to ensure security and confidentiality of users when accessing applications. Therefore, there should be a proper way to manage digital identities across multiple applications. This concept is known as user provisioning. User provisioning is the process of…

Scim

4 min read

A Beginner’s Guide to SCIM
A Beginner’s Guide to SCIM
Scim

4 min read


Published in

Analytics Vidhya

·Mar 12, 2021

Subword Techniques for Neural Machine Translation

Neural Machine Translation (NMT) is the current state-of-the-art machine translation technique which produces fluent translations. However, NMT models are affected by the Out of Vocabulary (OOV) and Rare word problems, thus it degrades the translation quality. OOV words are the words that are not appearing in the corpus and rare…

Machine Learning

6 min read

Subword Techniques for Neural Machine Translation
Subword Techniques for Neural Machine Translation
Machine Learning

6 min read

Rashmini Naranpanawa

Rashmini Naranpanawa

57 Followers

Senior Software Engineer @WSO2 | Graduate @Department of Computer Science and Engineering, University of Moratuwa

Following
  • Pinterest Engineering

    Pinterest Engineering

  • Theviyanthan Krishnamohan

    Theviyanthan Krishnamohan

  • TDS Editors

    TDS Editors

  • Ratnajothy Sangeethanan (Ratne)

    Ratnajothy Sangeethanan (Ratne)

  • Sithumini Senevirathne

    Sithumini Senevirathne

See all (58)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams