Open in app

Sign In

Write

Sign In

Hasanthi Purnima Dissanayake
Hasanthi Purnima Dissanayake

51 Followers

Home

About

Mar 22, 2022

Cookie-Based Authentication vs Token-Based Authentication

What to choose? So, what are your plans? Are you attempting to replace cookie-based authentication with cookieless authentication in your web application? Be cautious, and proceed with caution… What is Authentication? Let’s start by understanding what authentication is. Authentication is the process of confirming a certain entity’s identity before allowing access to a…

Wso 2

7 min read

Cookie-Based Authentication vs Token-Based Authentication
Cookie-Based Authentication vs Token-Based Authentication
Wso 2

7 min read


Sep 15, 2021

Zero Trust Security

Future of IAM Identity Security This focuses on securing individual identities throughout the cycle of accessing critical assets. Nowadays Identity Security is a very crucial thing to consider as the trend is more towards cloud-based solutions, not on-premise ones. With the multi-cloud solutions and the worldwide pandemic situation, the users (employees, customers…

Iam

5 min read

Zero Trust Security
Zero Trust Security
Iam

5 min read


Nov 23, 2020

Introduction to Self Sovereign Identity

Controlling our own identity by ourselves What is Self Sovereign Identity? In the physical world, we use different types of techniques to prove our identity on different occasions. For example, we use a driving license, national identity card, or passport to prove our identity to certain parties in different scenarios. In the digital world, we…

Self Sovereign Identity

3 min read

Introduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Self Sovereign Identity

3 min read


Apr 10, 2020

Adding Multi-Factor Authentication to your application

What is Multi-Factor Authentication? First of all, what is ‘Authentication’? Simply ‘Authentication’ is the process of distinctly identifying a certain entity. As the name implies the Multi-Factor Authentication is to use multiple factors to identify a certain entity. Those factors can be categorized as ; Knowledge factor Ownership factor Inherence factor Knowledge Factor The…

Wso 2

4 min read

Adding Multi-Factor Authentication to your application
Adding Multi-Factor Authentication to your application
Wso 2

4 min read


Jul 21, 2019

Privileged Access Management

Future of IAM — Conventional identity management deals with two types of accounts. They are , User accounts Privileged Accounts User Accounts User accounts have a limited set of privileges to access different resources. Some examples are online shopping accounts, social media accounts and many more. …

Security

4 min read

Privileged Access Management
Privileged Access Management
Security

4 min read


Jun 9, 2019

Building Competitive Edge in User On-boarding

What is User On-boarding in IAM User on-boarding is a very broad topic, first of all let’s check what’s the wikipedia definition for user on-boarding User on-boarding is the process of improving a person’s success with a product or service. …

Iam

5 min read

Building Competitive Edge in User On-boarding
Building Competitive Edge in User On-boarding
Iam

5 min read


Jun 3, 2019

WSO2 Charon Library

Future of SCIM2 — What is Charon Charon is a greek mythology that wikipedia says, Charon is the ferryman of Hades who carries souls of the newly deceased across the rivers Styx and Acheron that divided the world of the living from the world of the dead When it comes with the context WSO2 and SCIM2, Charon…

Scim 2

4 min read

WSO2 Charon Library
WSO2 Charon Library
Scim 2

4 min read


May 27, 2019

WSO2 Identity Server 5.8.0 Released !!!

Summer Release: WSO2 Identity Server is the latest success story of WSO2 Identity and Access Management team. After a marathon effort we are glad to release v5.8.0 with few new features, major improvements and some bug fixes What is new? New Features OpenID Connect Back Channel Logout So far WSO2 Identity Server supported OIDC Session…

Wso 2

3 min read

WSO2 Identity Server 5.8.0 Released !!!
WSO2 Identity Server 5.8.0 Released !!!
Wso 2

3 min read


May 2, 2019

Fed Up with User Provisioning? Try with WSO2 Identity Server.

This is the first blog of Provisioning Blog series with WSO2 Identity Server. User Provisioning What is user provisioning? User Provisioning is an important aspect of the Identity Federation. …

Wso 2 Identity Server

5 min read

Fed Up with User Provisioning? Try with WSO2 Identity Server.
Fed Up with User Provisioning? Try with WSO2 Identity Server.
Wso 2 Identity Server

5 min read


Mar 18, 2019

Memory Leaks in Java applications

What is a memory leak in java Usually when objects are no longer used by an application those object should be garbage collected. But if these objects are still referenced, then the garbage collector can not remove these objects from the working memory. Further there are some objects stay in the memory through out the life of…

Programming

3 min read

Memory Leaks in Java applications
Memory Leaks in Java applications
Programming

3 min read

Hasanthi Purnima Dissanayake

Hasanthi Purnima Dissanayake

51 Followers

Technical Lead @ WSO2

Following
  • Ishara Naotunna

    Ishara Naotunna

  • Tharindu Bandara

    Tharindu Bandara

  • Lakshitha Samarasingha

    Lakshitha Samarasingha

  • Prabath Siriwardena

    Prabath Siriwardena

  • Nilasini Thirunavukkarasu

    Nilasini Thirunavukkarasu

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech