Homepage
Open in app
Sign in
Get started
Identity Beyond Borders
IAM is a key enabler to build agile businesses and the use of Open source IAM is becoming a game changer. Learn from IAM experts at WSO2 as to why IAM is all the rage and how it can help empower your enterprise.
Stories
Asgardeo
IdentityIn15
Contribute
WSO2 Identity Server
Follow
The Four Horsemen of Authorization: The P*Ps (PEP, PDP, PAP, and PIP)
The Four Horsemen of Authorization: The P*Ps (PEP, PDP, PAP, and PIP)
If you’ve ever installed an app on your smartphone and seen a pop-up asking for access to your camera, contacts, or location —…
Mikunthan Thumilan
Apr 3
X25519MLKEM768: Post-Quantum Secure Key Exchange for Transport Layer Security (TLS)
X25519MLKEM768: Post-Quantum Secure Key Exchange for Transport Layer Security (TLS)
X25519MLKEM768 is a combination of Elliptic Curve Diffie Hellman based X25519 and post-quantum secure MLKEM768 Key Encapsulation Mechanism.
Linuka Ratnayake
Mar 18
Post-Quantum Security Recommendations: A Technical Guide
Post-Quantum Security Recommendations: A Technical Guide
As quantum computing advances, classical cryptographic systems face significant risks. Quantum algorithms like Shor’s and Grover’s can…
Udara Pathum
Feb 25
Enhancing WSO2 Identity Server with Cursor-Based Pagination: Key Differences and Benefits 🚀
Enhancing WSO2 Identity Server with Cursor-Based Pagination: Key Differences and Benefits 🚀
WSO2 Identity Server and Asgardeo currently utilize offset-based pagination for SCIM 2.0 to list resources. While this method has been…
Kumuditha Dodanwela
Oct 2, 2024
Asgardeo On Demand Silent Password Migration
Asgardeo On Demand Silent Password Migration
In today’s dynamic digital landscape, migrating users to a new Identity and Access Management (IAM) system is a complex yet crucial task…
Thamindu Dilshan Jayawickrama
Aug 11, 2024
Key Strategies and Planning Tips for A Successful User Migration in IAM
Key Strategies and Planning Tips for A Successful User Migration in IAM
Imagine steering a massive ship through turbulent waters towards a new promising horizon. This is what user migration often feels like for…
Thamindu Dilshan Jayawickrama
Jul 21, 2024
Pioneering Change: Navigating User Migration with Confidence in IAM
Pioneering Change: Navigating User Migration with Confidence in IAM
Businesses tend to evolve frequently and adapt their systems in today’s dynamic digital landscape due to the growth of the world and…
Thamindu Dilshan Jayawickrama
Jul 14, 2024
Simplify React App Login
Simplify React App Login
Implementing a login feature in a React app involves several key steps to ensure both functionality and security. In this post, we will…
Sagara Gunathunga
Jul 4, 2024
Securing Your React App to Combat the Common Threats
Securing Your React App to Combat the Common Threats
In today’s digital landscape, web applications are prime targets for various security threats. React, a JavaScript library widely used to…
Nipuni Bhagya
Jul 3, 2024
The Foundation of Secure Authentication
The Foundation of Secure Authentication
Discover how scalable SDK architecture enhances authentication workflows, ensuring security, flexibility, and compatibility of…
Brion Mario
Jul 3, 2024
Simplify React App Login with Asgardeo
Simplify React App Login with Asgardeo
Introduction
Savindi Waduge
Jul 2, 2024
Integrating Asgardeo with Your Web Application and Salesforce Using Choreo
Integrating Asgardeo with Your Web Application and Salesforce Using Choreo
In today’s fast-paced digital world, seamless integration of various services is crucial for efficient business operations. This article…
Sachin Mamoru
Jun 22, 2024
Post-quantum communication with WSO2 Identity Server 7.0
Post-quantum communication with WSO2 Identity Server 7.0
WSO2 Identity Server 7.0 secures HTTPS communication with post-quantum X25519Kyber768 key exchange, offering quantum-resistant protection…
Udara Pathum
Jun 12, 2024
Securing API Resources with WSO2 Identity Server
Securing API Resources with WSO2 Identity Server
The latest version of WSO2 Identity Server makes securing your API resources easier than ever!
Yoshani Ranaweera
Jun 12, 2024
Why DIY when you can fly?
Why DIY when you can fly?
Greetings, fellow developers! Today, we embark on a journey through the intricacies of authentication, exploring why integrating with an…
Nipuni Bhagya
Jun 8, 2024
Solving 5 Developer IAM Nightmares
Solving 5 Developer IAM Nightmares
Can Identity Providers (IDPs) be the lifeline for Developers? Find out more in this blog.
Hasini Samarathunga
May 31, 2024
React App Authentication with Asgardeo
React App Authentication with Asgardeo
Asgardeo is a developer-focused, identity-as-a-service (IDaaS) platform that simplifies application login experiences and identity and…
Savindi Waduge
May 26, 2024
Elevate Your Brand Identity with Branding AI on Asgardeo
Elevate Your Brand Identity with Branding AI on Asgardeo
In today’s market, the power of a cohesive brand identity cannot be overstated. However, manually configuring consistent branding themes…
Chamath
May 7, 2024
Try Login Flow AI — Asgardeo
Try Login Flow AI — Asgardeo
AI-powered login flow configuration
Nuthara N. R. Andrahennedi
May 6, 2024
IAM in a Cosmopolitan World
IAM in a Cosmopolitan World
A guide to understanding basic IAM concepts by exploring the captivating universe of an online magazine.
Shenali Jayakody
Mar 17, 2024
A Release Tale Rewind 📽
A Release Tale Rewind 📽
Once upon a time…. wait… who am I kidding??!! this ain’t no fairy tale!!. This is the real deal — a gritty tale of perseverance and hustle…
Nipuni Bhagya
Mar 12, 2024
Mastering IAM Simplified: Unleash Your Potential with Asgardeo’s Novice-Friendly Login Flow Visual…
Mastering IAM Simplified: Unleash Your Potential with Asgardeo’s Novice-Friendly Login Flow Visual…
Elevate your development journey with Asgardeo’s Visual Flow Editor. Effortlessly integrate IAM for seamless login experiences.
Brion Mario
Mar 7, 2024
X25519Kyber768 Post-Quantum Key Exchange for HTTPS Communication
X25519Kyber768 Post-Quantum Key Exchange for HTTPS Communication
The X25519Kyber768 algorithm combines the elliptic curve-based X25519 with the Kyber768 post-quantum key exchange scheme, offering a robust…
Udara Pathum
Feb 2, 2024
Authentication: A Deep Dive into Ready-Made Components
Authentication: A Deep Dive into Ready-Made Components
In web development, the choice of authentication providers can significantly impact the user experience. Many providers redirect users to…
Movin Silva
Jan 16, 2024
CRYSTALS Kyber : The Key to Post-Quantum Encryption
CRYSTALS Kyber : The Key to Post-Quantum Encryption
In the digital realm, quantum computing threatens traditional encryption. NIST’s Post-Quantum Cryptography Standardization initiative aims…
Udara Pathum
Jan 4, 2024
About Identity Beyond Borders
Latest Stories
Archive
About Medium
Terms
Privacy
Teams