blog.facilelogin.com
F a c i l e L o g i n: September 2014
http://blog.facilelogin.com/2014_09_01_archive.html
Tuesday, September 9, 2014. Building an API Security Ecosystem @ APIStrat Amsterdam. Subscribe to: Posts (Atom). Prabath AT apache.org. Prabath AT wso2.com. The API Security Blog. Building an Ecosystem for API Security. WSO2 Security and Identity Gateway Solution. Building an API Security Ecosystem @ APIStrat Amst. Axis2 1.4.1. Carbon 2.0.x. Carbon 3.0.x. Carbon 3.1.0. Carbon 3.2.0. Carbon 3.2.2. Identity Server 2.0. Identity Server 3.0. Identity Server 3.2.0. Identity Server 3.2.2. Liferay 6.1.1.
blog.facilelogin.com
F a c i l e L o g i n: July 2013
http://blog.facilelogin.com/2013_07_01_archive.html
Saturday, July 27, 2013. Building a Manufacturing Service Bus (MSB) with WSO2 ESB. Before getting in to the subject, I would like to introduce few terminology commonly used in the manufacturing industry. The term Manufacturing Execution System (MES). Manufacturing Execution Systems (MES) deliver information that enables the. Optimization of production activities from order launch to finished goods. Using current. And accurate data, MES guides, initiates, responds to, and reports on plant activities as.
blog.facilelogin.com
F a c i l e L o g i n: April 2015
http://blog.facilelogin.com/2015_04_01_archive.html
Thursday, April 30, 2015. Borderless Identity: Managing Identity in a Complex World. While the initial consumerization hype was focused on the bring your own device (BYOD) trend, we are now seeing the emergence of bring your own identity (BYOID) concept. The rise of BYOID is being driven by users' "identity fatigue.". If you look at the history, most enterprises grow today via acquisitions, mergers and partnerships. In U.S only, mergers and acquisitions volume totaled to $865.1 billion in the...You would...
blog.facilelogin.com
F a c i l e L o g i n: December 2014
http://blog.facilelogin.com/2014_12_01_archive.html
Thursday, December 4, 2014. 1 LDAP is mostly picked over Database if the read/write ratio is more than 10,000/1 (this number is bit arguable) - since its more optimized for read operations. So in general LDAP is more preferred for static data. 4 LDAP has inbuilt support to manage hierarchical relationships between user entities. If this is a requirement, and go for a Database - has to be implemented from the scratch. 7 LDAP has an inbuilt security model over the data it stores. You can define ACLs ov...
blog.facilelogin.com
F a c i l e L o g i n: May 2015
http://blog.facilelogin.com/2015_05_01_archive.html
Monday, May 18, 2015. Connected Identity: Benefits, Risks and Challenges - EIC 2015 Recording. Friday, May 15, 2015. Two Security Patches Issued Publicly for WSO2 Identity Server 5.0.0. Wolfgang Ettlinger (discovery, analysis, coordination) from the SEC Consult Vulnerability Lab contacted WSO2 security team on 19th March and reported following three vulnerabilities in WSO2 Identity Server 5.0.0. 1) Reflected cross-site scripting (XSS, IDENTITY-3280). 2) Cross-site request forgery (CSRF, IDENTITY-3280).
blog.facilelogin.com
F a c i l e L o g i n: August 2014
http://blog.facilelogin.com/2014_08_01_archive.html
Tuesday, August 12, 2014. Book] Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE. Another major objective of this book is to not just present concepts and theories, but also explain each of them with concrete examples. The book presents a comprehensive set of examples that work with APIs from Google, Twitter, Facebook, Yahoo! BBAuth, Google AuthSub, Google ClientLogin, and ProtectServe in detail. Amazon : http:/ www.amazon.com/Advanced-API-Security-Securing-Connec...The A...
blog.facilelogin.com
F a c i l e L o g i n: October 2014
http://blog.facilelogin.com/2014_10_01_archive.html
Friday, October 31, 2014. Securing the Insecure - WSO2Con USA 2014. Tuesday, October 28, 2014. Let me take another example. When my little daughter was three months old, she used to go to anyone's hand. Now - she is eleven months and knows who her mother is. Whenever she finds any difficulty she keeps on crying till she gets to the mother. She only feels secured in her mother's arms. What I am try to say with all these examples is, insecurity is a perception. You deposit $ 1000 in your account you would ...
blog.facilelogin.com
F a c i l e L o g i n: Webinar with KuppingerCole - Borderless Identity
http://blog.facilelogin.com/2015/05/webinar-with-kuppingercole-borderless.html
Friday, May 1, 2015. Webinar with KuppingerCole - Borderless Identity. Subscribe to: Post Comments (Atom). Prabath AT apache.org. Prabath AT wso2.com. The API Security Blog. Building an Ecosystem for API Security. WSO2 Security and Identity Gateway Solution. Connected Identity: Benefits, Risks and Challenges -. Two Security Patches Issued Publicly for WSO2 Iden. Identity Mediation Language (IML) - Requirements S. The Mobile Connect implementation by Dialog Axiat. Axis2 1.4.1. Carbon 2.0.x.
blog.facilelogin.com
F a c i l e L o g i n: March 2014
http://blog.facilelogin.com/2014_03_01_archive.html
Friday, March 28, 2014. Bring Your Own IDentity (BYOID) Benefits and Challenges @ WSO2Con Asia 2014. Subscribe to: Posts (Atom). Prabath AT apache.org. Prabath AT wso2.com. The API Security Blog. Building an Ecosystem for API Security. WSO2 Security and Identity Gateway Solution. Bring Your Own IDentity (BYOID) Benefits and Chal. Axis2 1.4.1. Carbon 2.0.x. Carbon 3.0.x. Carbon 3.1.0. Carbon 3.2.0. Carbon 3.2.2. Identity Server 2.0. Identity Server 3.0. Identity Server 3.2.0. Identity Server 3.2.2.
blog.facilelogin.com
F a c i l e L o g i n: MQTT Security Fundamentals
http://blog.facilelogin.com/2015/05/mqtt-security-fundamentals.html
Tuesday, May 12, 2015. MQTT Essentials http:/ www.hivemq.com/mqtt-essentials-wrap-up/. Introducing the MQTT Security Fundamentals http:/ www.hivemq.com/introducing-the-mqtt-security-fundamentals/. Authentication with Username and Password http:/ www.hivemq.com/mqtt-security-fundamentals-authentication-username-password/. Advanced Authentication Mechanisms http:/ www.hivemq.com/mqtt-security-fundamentals-advanced-authentication-mechanisms/. Subscribe to: Post Comments (Atom). Prabath AT apache.org.
SOCIAL ENGAGEMENT