Analysis of previous research done on Automatic Speech Recognition Models for Low Resource LanguageToday we widely use speech-related applications in many fields like speech topic identification and spoken command recognition. Automatic…Feb 15, 2024Feb 15, 2024
Published inIdentity Beyond BordersDecoding Asgardeo User Types: A Practical OverviewIf you're new to Asgardeo, you might find the user types and their related concepts a bit complex. These user classifications are essential…Oct 30, 2023Oct 30, 2023
Breaking Down Barriers: How to Federate between Asgardeo OrganizationsThis article will provide a step-by-step guide on how to federate the identities of business users from one Asgardeo organization to…Mar 27, 2023Mar 27, 2023
Published inIdentity Beyond BordersDemystifying Asgardeo Console authenticationHave you ever wondered how authentication works in the Asgardeo console? So far we are using the Asgardeo console to register new business…Mar 31, 2022Mar 31, 2022
Review on “Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications”It was introduced in 2001 by Ion Stoica, Robert Morris, David Karger, Frans Kaashoek, and Hari Balakrishnan, and was developed at MIT.Dec 23, 2021Dec 23, 2021
Review on Existing Distributed File SystemA Distributed File System (DFS) enables programs to store and access remote files exactly as they do local ones, allowing users to access…Jun 30, 2021Jun 30, 2021
Introduction to Model-Driven Test DesignIn this article, we simply introduce the concepts in Model-Driven Test Design and the different phases in it.Jun 30, 2021Jun 30, 2021
Publishing Login events over HTTP or Log files in WSO2 ISThis article contains the quick steps to publish the Login events over HTTP in WSO2 IS & Log Files. This will help to integrate with other…Jan 21, 2021Jan 21, 2021
IS Login analytics using Splunk — Part 1In this article, we are going to use Splunk to analyse the WSO2 IS authentications. WSO2 IS have the capability to publish HTTP event…Apr 8, 2020Apr 8, 2020
Analyse WSO2 IS with SplunkEvents can be used to analyse data more efficiently and effectively than doing log analysis. WSO2 IS has the capability to publish events…Oct 7, 2019Oct 7, 2019
Let’s add a custom claim to OIDC in WSO2 ISIn this article, we will see how to add a custom claim into OIDC and retrieve it in the ID_Token.Aug 22, 2019Aug 22, 2019
Let’s engage the user in WSO2 Adaptive authenticationAdaptive authentication is one of the trending topics in IAM. It changes the authentication mechanism based on conditions like user roles…Jul 30, 2019Jul 30, 2019
Signature verification Using JWKS endpoint in WSO2 Identity ServerJWT tokens have a signature to prove their legitimacy to the client or resource servers. In the testing environments, it is easy to…Jun 30, 20191Jun 30, 20191
Example Applications related to key store in WSO2 Identity ServerLast few months I worked on keystores in wso2 IS. I got the chance to understand how encryption and signing work in IS. In this article, I…Jun 30, 2019Jun 30, 2019
Key Rotation in WSO2 Identity serverSignature and Encryption are the two basic methods used in secure transactions. Especially in the case of tokens where most of the OAuth…Jun 28, 2019Jun 28, 2019
Adding Multiple keys to WSO2 KeystoresKeystore is a repository where private keys, certificates and symmetric keys can be stored. Ideally, a keystore should accommodate more…Jun 23, 20191Jun 23, 20191
Introduction to key stores in WSO2 Identity ServerOften people get confused when it comes to keystore. Most of the times people ignore the capabilities and importance of it. As one of the…Jun 18, 20191Jun 18, 20191
Creating your own ArchetypeCopy paste is the basic art, a programmer should master. Always there is code or style that can be copied and reproduced to facilitate our…Feb 5, 2019Feb 5, 2019
User Operation Event Listener for WSO2 serverI come across a task to write a custom event listener to log user operation. It seems like a complex task but you can easily develop this…Jan 24, 2019Jan 24, 2019
Token Binding with TLS Terminating Reverse ProxiesIf you really like to use token binding and reluctant to do the TLS modification by your self this the article for you.Although token…Nov 25, 2017Nov 25, 2017