Homepage
Open in app
Sign inGet started

Identity Beyond Borders

IAM is a key enabler to build agile businesses and the use of Open source IAM is becoming a game changer. Learn from IAM experts at WSO2 as to why IAM is all the rage and how it can help empower your enterprise.

  • Stories
  • Asgardeo
  • IdentityIn15
  • Contribute
  • WSO2 Identity Server
  • WSO2 Identity Server Now Available on Azure and AWS Marketplaces — Free and Ready to Deploy

    WSO2 Identity Server Now Available on Azure and AWS Marketplaces — Free and Ready to Deploy

    The WSO2 Identity Server is now available on both Azure and AWS Marketplaces as deployable offers, free of charge!
    Go to the profile of Lakshan Banneheke
    Lakshan Banneheke
    May 15
    🔐 How to Configure nuxt-auth with Asgardeo in a Nuxt 3 App

    🔐 How to Configure nuxt-auth with Asgardeo in a Nuxt 3 App

    Integrating authentication in a Nuxt 3 app is easier than ever with @sidebase/nuxt-auth, which brings the power of NextAuth.js to Nuxt. In…
    Go to the profile of Thineth Gamage
    Thineth Gamage
    Apr 21
    The Four Horsemen of Authorization: The P*Ps (PEP, PDP, PAP, and PIP)

    The Four Horsemen of Authorization: The P*Ps (PEP, PDP, PAP, and PIP)

    If you’ve ever installed an app on your smartphone and seen a pop-up asking for access to your camera, contacts, or location —…
    Go to the profile of Mikunthan Thumilan
    Mikunthan Thumilan
    Apr 3
    X25519MLKEM768: Post-Quantum Secure Key Exchange for Transport Layer Security (TLS)

    X25519MLKEM768: Post-Quantum Secure Key Exchange for Transport Layer Security (TLS)

    X25519MLKEM768 is a combination of Elliptic Curve Diffie Hellman based X25519 and post-quantum secure MLKEM768 Key Encapsulation Mechanism.
    Go to the profile of Linuka Ratnayake
    Linuka Ratnayake
    Mar 18
    Post-Quantum Security Recommendations: A Technical Guide

    Post-Quantum Security Recommendations: A Technical Guide

    As quantum computing advances, classical cryptographic systems face significant risks. Quantum algorithms like Shor’s and Grover’s can…
    Go to the profile of Udara Pathum
    Udara Pathum
    Feb 25
    Enhancing WSO2 Identity Server with Cursor-Based Pagination: Key Differences and Benefits 🚀

    Enhancing WSO2 Identity Server with Cursor-Based Pagination: Key Differences and Benefits 🚀

    WSO2 Identity Server and Asgardeo currently utilize offset-based pagination for SCIM 2.0 to list resources. While this method has been…
    Go to the profile of Kumuditha Dodanwela
    Kumuditha Dodanwela
    Oct 2, 2024
    Asgardeo On Demand Silent Password Migration

    Asgardeo On Demand Silent Password Migration

    In today’s dynamic digital landscape, migrating users to a new Identity and Access Management (IAM) system is a complex yet crucial task…
    Go to the profile of Thamindu Dilshan Jayawickrama
    Thamindu Dilshan Jayawickrama
    Aug 11, 2024
    Key Strategies and Planning Tips for A Successful User Migration in IAM

    Key Strategies and Planning Tips for A Successful User Migration in IAM

    Imagine steering a massive ship through turbulent waters towards a new promising horizon. This is what user migration often feels like for…
    Go to the profile of Thamindu Dilshan Jayawickrama
    Thamindu Dilshan Jayawickrama
    Jul 21, 2024
    Pioneering Change: Navigating User Migration with Confidence in IAM

    Pioneering Change: Navigating User Migration with Confidence in IAM

    Businesses tend to evolve frequently and adapt their systems in today’s dynamic digital landscape due to the growth of the world and…
    Go to the profile of Thamindu Dilshan Jayawickrama
    Thamindu Dilshan Jayawickrama
    Jul 14, 2024
    Simplify React App Login

    Simplify React App Login

    Implementing a login feature in a React app involves several key steps to ensure both functionality and security. In this post, we will…
    Go to the profile of Sagara Gunathunga
    Sagara Gunathunga
    Jul 4, 2024
    Securing Your React App to Combat the Common Threats

    Securing Your React App to Combat the Common Threats

    In today’s digital landscape, web applications are prime targets for various security threats. React, a JavaScript library widely used to…
    Go to the profile of Nipuni Bhagya
    Nipuni Bhagya
    Jul 3, 2024
    The Foundation of Secure Authentication

    The Foundation of Secure Authentication

    Discover how scalable SDK architecture enhances authentication workflows, ensuring security, flexibility, and compatibility of…
    Go to the profile of Brion Mario
    Brion Mario
    Jul 3, 2024
    Simplify React App Login with Asgardeo

    Simplify React App Login with Asgardeo

    Introduction
    Go to the profile of Savindi Waduge
    Savindi Waduge
    Jul 2, 2024
    Integrating Asgardeo with Your Web Application and Salesforce Using Choreo

    Integrating Asgardeo with Your Web Application and Salesforce Using Choreo

    In today’s fast-paced digital world, seamless integration of various services is crucial for efficient business operations. This article…
    Go to the profile of Sachin Mamoru
    Sachin Mamoru
    Jun 22, 2024
    Post-quantum communication with WSO2 Identity Server 7.0

    Post-quantum communication with WSO2 Identity Server 7.0

    WSO2 Identity Server 7.0 secures HTTPS communication with post-quantum X25519Kyber768 key exchange, offering quantum-resistant protection…
    Go to the profile of Udara Pathum
    Udara Pathum
    Jun 12, 2024
    Securing API Resources with WSO2 Identity Server

    Securing API Resources with WSO2 Identity Server

    The latest version of WSO2 Identity Server makes securing your API resources easier than ever!
    Go to the profile of Yoshani Ranaweera
    Yoshani Ranaweera
    Jun 12, 2024
    Why DIY when you can fly?

    Why DIY when you can fly?

    Greetings, fellow developers! Today, we embark on a journey through the intricacies of authentication, exploring why integrating with an…
    Go to the profile of Nipuni Bhagya
    Nipuni Bhagya
    Jun 8, 2024
    Solving 5 Developer IAM Nightmares

    Solving 5 Developer IAM Nightmares

    Can Identity Providers (IDPs) be the lifeline for Developers? Find out more in this blog.
    Go to the profile of Hasini Samarathunga
    Hasini Samarathunga
    May 31, 2024
    React App Authentication with Asgardeo

    React App Authentication with Asgardeo

    Asgardeo is a developer-focused, identity-as-a-service (IDaaS) platform that simplifies application login experiences and identity and…
    Go to the profile of Savindi Waduge
    Savindi Waduge
    May 26, 2024
    Elevate Your Brand Identity with Branding AI on Asgardeo

    Elevate Your Brand Identity with Branding AI on Asgardeo

    In today’s market, the power of a cohesive brand identity cannot be overstated. However, manually configuring consistent branding themes…
    Go to the profile of Chamath
    Chamath
    May 7, 2024
    Try Login Flow AI — Asgardeo

    Try Login Flow AI — Asgardeo

    AI-powered login flow configuration
    Go to the profile of Nuthara N. R. Andrahennedi
    Nuthara N. R. Andrahennedi
    May 6, 2024
    IAM in a Cosmopolitan World

    IAM in a Cosmopolitan World

    A guide to understanding basic IAM concepts by exploring the captivating universe of an online magazine.
    Go to the profile of Shenali Jayakody
    Shenali Jayakody
    Mar 17, 2024
    A Release Tale Rewind 📽

    A Release Tale Rewind 📽

    Once upon a time…. wait… who am I kidding??!! this ain’t no fairy tale!!. This is the real deal — a gritty tale of perseverance and hustle…
    Go to the profile of Nipuni Bhagya
    Nipuni Bhagya
    Mar 12, 2024
    Mastering IAM Simplified: Unleash Your Potential with Asgardeo’s Novice-Friendly Login Flow Visual…

    Mastering IAM Simplified: Unleash Your Potential with Asgardeo’s Novice-Friendly Login Flow Visual…

    Elevate your development journey with Asgardeo’s Visual Flow Editor. Effortlessly integrate IAM for seamless login experiences.
    Go to the profile of Brion Mario
    Brion Mario
    Mar 7, 2024
    X25519Kyber768 Post-Quantum Key Exchange for HTTPS Communication

    X25519Kyber768 Post-Quantum Key Exchange for HTTPS Communication

    The X25519Kyber768 algorithm combines the elliptic curve-based X25519 with the Kyber768 post-quantum key exchange scheme, offering a robust…
    Go to the profile of Udara Pathum
    Udara Pathum
    Feb 2, 2024
    About Identity Beyond BordersLatest StoriesArchiveAbout MediumTermsPrivacyTeams