Future of IAM

Identity Security

This focuses on securing individual identities throughout the cycle of accessing critical assets.

Nowadays Identity Security is a very crucial thing to consider as the trend is more towards cloud-based solutions, not on-premise ones. With the multi-cloud solutions and the worldwide pandemic situation, the users (employees, customers…

Controlling our own identity by ourselves

What is Self Sovereign Identity?

In the physical world, we use different types of techniques to prove our identity on different occasions. For example, we use a driving license, national identity card, or passport to prove our identity to certain parties in different scenarios. In the digital world, we…

What is Multi-Factor Authentication?

First of all, what is ‘Authentication’? Simply ‘Authentication’ is the process of distinctly identifying a certain entity. As the name implies the Multi-Factor Authentication is to use multiple factors to identify a certain entity.

Those factors can be categorized as ;

  • Knowledge factor
  • Ownership factor
  • Inherence factor

Knowledge Factor


Future of IAM

Conventional identity management deals with two types of accounts. They are ,

  • User accounts
  • Privileged Accounts

User Accounts

User accounts have a limited set of privileges to access different resources. Some examples are online shopping accounts, social media accounts and many more. …

What is User On-boarding in IAM

User on-boarding is a very broad topic, first of all let’s check what’s the wikipedia definition for user on-boarding

User on-boarding is the process of improving a person’s success with a product or service. …

Future of SCIM2

What is Charon

Charon is a greek mythology that wikipedia says,

Charon is the ferryman of Hades who carries souls of the newly deceased across the rivers Styx and Acheron that divided the world of the living from the world of the dead

When it comes with the context WSO2 and SCIM2, Charon…

Summer Release: WSO2 Identity Server is the latest success story of WSO2 Identity and Access Management team. After a marathon effort we are glad to release v5.8.0 with few new features, major improvements and some bug fixes

What is new?

New Features

So far WSO2 Identity Server supported OIDC Session…

This is the first blog of Provisioning Blog series with WSO2 Identity Server.

User Provisioning

What is user provisioning?

User Provisioning is an important aspect of the Identity Federation. …

What is a memory leak in java

Usually when objects are no longer used by an application those object should be garbage collected. But if these objects are still referenced, then the garbage collector can not remove these objects from the working memory. Further there are some objects stay in the memory through out the life of…

How to use Mutual TLS with client id and client secret In wso2 IS 5.5.0

This authenticator has the same architecture as the mutual authenticator, https://docs.wso2.com/display/IS550/Mutual+TLS+for+OAuth+Clients.

The only difference is we need to pass the client secret as an query param in the token request. In order to consume the…

Hasanthi Purnima Dissanayake

Associate Technical Lead @ WSO2

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store