SlideShare a Scribd company logo
WSO2 Identity Server 5.1.0
Overview
Agenda
o  Introduction
o  Product Overview
o  Authentication & SSO
o  User Provisioning & Management
o  Authorization & Entitlement
o  Deployment Options
Introduction
Security Landscape
Borders	
  across	
  systems	
  don’t	
  work	
  anymore	
  
Why ?
o  Bring Your Own Device
o  Bring Your Own Identity
o  Identity is maintained in one domain, accessed in other domains
o  Social network identities (Facebook, LinkedIN, Google)
o  Open APIs
o  Ecosystems
o  Mergers / Acquisitions
o  Value Webs (Composable Enterprises)
Introducing Enterprise Identity Bus (EIB)
What Does an EIB Do ?
Bridges
Tokens
•  OAuth/2
•  OpenID/OpenID Connect
•  SAML2
•  WS-Federation
•  Kerberos, etc
Claims & Claim
Dialects
•  Email Addresses
•  Phone Numbers
•  Names, etc
User Stores
•  SPML, SCIM, Salesforce,
Google, etc
•  Just in Time provisioning,
inbound, outbound
Unified SSO Platform
How Does it Work ?
o  Bridges multiple web applications across multiple
protocols
o  Login into Drupal using SAML and get automatically signed
on your Web application, which requires Open ID Connect.
o  Connect to Facebook and be automatically connected to
Salesforce
o  Bridges across: OpenID Connect, SAML 2.0, OAuth
2.0, OpenID, WS-Federation (Passive)
o  Benefits
o  Transparent to the application users
o  Extensible
Federated Identity
How Does it Work ?
o  Bridge multiple identity providers
o  Identity Server serves a central authentication hub for
all applications - Each application continues to use their own
IdP of choice (say OpenID Connect)
o  Home Realm Discovery - Identity Server uses the request to
redirect the user to the correct IdentityProvider
o  Benefits:
o  Client App only need to trust its own Identity Provider
o  Authentication protocol at the client side is decoupled from
the Identity Provider
o  Trust relationship maintained centrally
User Provisioning
How Does it Work ?
o  Bus serves as central hub to provision identities to
multiple IdPs
o  Transforms provisioning requests, from SCIM to SPML
for example
o  Provides just-in-time provisioning
o  Benefits
o  Supports SCIM (System for Cross-Domain Identity
Management) standard
o  Supports SPML, JDBC, LDAP, GoogleApps, Salesforce
o  Simple extension model
Mobile IdP Proxy
How Does it Work ?
o  IDP proxy application delivers SSO functionality for
native mobile applications
o  SDK is used to invoke IdP proxy from the mobile
application
o  Allows the application to obtain an OAuth access token
from an identity
o  Benefits - Leverage enterprise identity management system for
mobile applications
Product Overview
WSO2 Identity Server
o  5th Generation Product
o  Current version 5.0.0 (released May 2014)
o  Why did we build it?
o  Federated identity and entitlement is a key part of any distributed
architecture
o  Internal security threats, Partnerships
o  Mergers, De-mergers
o  APIs, Cloud systems
o  SSO is important but need to federate and bridge across SSOs
o  Open Standards for Identity are changing the industry landscape
o  Based on WSO2 Carbon platform, which provides support
for multi-tenancy, logging, clustering, and other common
services
Identity Server Landscape
Benefits
o  Scenario-driven configuration
o  Large number of scenarios supported out of the box,
through simple configuration
o  Single Sign On
o  Federated Identity
o  User Provisioning and Management
o  Authorization and Entitlements
o  Extensible & Customizable - Custom Authenticators
Authentication & SSO
Authentication
o  Extensible user stores integration
o  Security for APIs and Web Services
o  Web Single Sign On for heterogeneous systems
o  Highly configurable and extensible authentication flows
o  Federation and Social integration
User Stores
o  Identity Server supports connecting 1 to N user
repositories to a single server
o  One primary and multiple secondary
o  Configurable through UI
o  Supports following
o  Built-in LDAP based on Apache DS
o  JDBC - Any data store, tested with Oracle, MySQL, DB2 and
others
o  Active Directory
Securing SOAP Services
o  Security Token Service (STS)
o  Supports WS-Trust 1.4
o  Issues SAML 1.1 and SAML 2.0 Tokens
o  HOK and Bearer subject confirmations
o  Configurable Security Policies for the STS
o  Kerberos token based
o  X509 Certificate based
o  User Name password based
o  Built on Apache Rampart project
Securing REST APIs
o  Complete OAuth 2.0 and OAuth 1.0a supported
Authorization Server
o  Supported OAuth 2.0 Grants - Authorization Code, Implicit,
Resource Owner Password, Client Credential, SAML Bearer,
IWA-NTLM, Refresh Token
o  JWT implementation
o  Key Manager for the WSO2 API Manager
Authenticators
o  Local Authenticators
o  Basic Authenticator - Username, password
o  IWA Authenticator – Zero password login
o  FIDO (Fast Identity Online) - Multifactor authentication
o  Federated
o  SAML 2.0 Web SSO Authenticator
o  OAuth2/OpenID Connect Authenticator
o  OpenID Authenticator
o  WS-Federation (Passive) Authenticator
Configurable Authenticator Flow
o  Multi-Step : Add any number of authentication steps
o  Multi-Option : Add any number of authenticators for a step
o  Configuration per service provider (application)
Web Single Sign On
o  SAML 2.0 Web Browser SSO
o  Basic Attribute Profile
o  IDP initiated SSO
o  OpenID 2.0
o  Simple Registration Extension
o  Attribute Exchange
o  OpenID Connect
o  IDToken
o  User Endpoint
o  WS-Federation Passive STS
o  SAML 1.1 Tokens
o  Preferred by Windows Identity Foundation (WIF) based
clients (ASP.NET)
o  Based on Apache Rampart project
SSO for Heterogeneous Systems
o  Web Applications can speak in any identity language
(e.g. SAML2, OpenID, OpenID Connect) to the Identity
Server
o  Single Login
o  Role transformations
o  Claim transformations
o  Customizable login screens
Federation
o  Configure Trusted Identity Providers (IdPs)
o  Add Trusted IDPs to application authentication flows to
enable Federation
o  Configure Provisioning for Identity Providers
o  Just-In-Time (JIT) provisioning
o  Outbound provisioning
o  Role transformations
o  Claims Transformations
Home Realm Discovery
o  Process of identifying correct federated IDP for an
authentication request
o  A key feature of federation
o  Uses the information in the authentication request to
identity the IDP
o  Logic is pluggable
User Provisioning & Management
Provisioning and Management
o  Just In Time Provisioning
o  Highly extensible User Provisioning Framework
o  Users and groups management
o  Accounts and Policies Management
o  Self Service Dashboard
o  Logging and Monitoring
o  Custom user management workflows – user specific
approvals, multi-step approvals, approvals requiring multiple roles
Just-in-time Provisioning
o  Federated Identities can be provisioned into the WSO2
Identity Server while federating
o  Users can be provisioned to any primary or secondary
user store
o  JIT provisioned users can be provisioned to any other
systems instantly
Provisioning Framework
o  Three inbound provisioning APIs
o  System for Cross-Domain Identity Management (SCIM) API
– REST/JSON
o  UserAdmin – SOAP/XML
o  RemoteUserStoreManagerService – SOAP/XML
o  Pluggable outbound provisioning connectors
o  Out-of-the-box provisioning connectors : SCIM, SPML,
Google and SalesForce
o  Custom connectors (create and drop in !)
SCIM Implementation
o  System cross-domain identity management -
http://www.simplecloud.info/
o  Adopted by many vendors and SaaS applications
(Salesforce for example)
o  Supports users
(including bulk creation)
and groups
provisioning, via REST
API
o  IS supports SCIM 1.1 -
SCIM 2.0 work ongoing
User and Role Management
o  Comprehensive Administrative UI for User and Roles
Management
o  Add, delete, update user profiles and roles
o  Search/list users and roles
o  Reset user passwords
o  Can manage users / groups in multiple user stores
Account and Password Policy Management
o  Configure password complexity – E.g. 8 character long,
must include numbers and symbols
o  Password expiry configuration
o  Failed login attempts and account locking
o  Captcha verification
o  Self registration and user account verification
o  Account recovery, forgotten password
Self-service Dashbaord
Auditing
o  Privileged operations are saved to log files, including
login/logout operations
o  Data is saved in XDAS format
o  Through extensions, events can be published to our
Data Analytics solutions (BAM and CEP)
Authorization & Entitlements
Authorization and Entitlement
o  Role Based Access Control
o  Attribute Based Access Control
o  Policy Based Access Control
o  XACML 2.0/3.0
o  Support for OpenAz
o  Hierarchical Resource Profile
o  Hierarchical Role Profile
o  Multiple Decision Profile
Role-based Access Control
o  Provisioning UI for assigning permissions for Roles and
assigning users for roles
o  SOAP/XML APIs for authorization
o  UserAdmin
o  RemoteUserStoreManagerService
o  RemoteAuthorizationManagerService
Scope-based Access Control
o  OAuth is a scope based authorization framework
o  WSO2 Identity Server supports OAuth version 1.0a
and 2.0
o  Users and Permit/Deny granting authorization for
applications
o  Access Token is validated over SOAP API - JWT (JSON
Web Token) attached to response, contains information about
token authorized scopes (for back-end consumption)
Claim-based Access Control
o  Comprehensive UI to manage/configure claim dialects
o  Default claim dialects: SCIM, OpenID AX, OpenID
SReg, XML/WSDL, OpenID Connect and WSO2
dialect
o  Write XACML policies based on User Claims
o  Define WS-Trust/ WS- Security policies based on User
Claims
o  Retrieve user claims for authorization over OpenID,
OpenID Connect and SAML
Policy-based Access Control
o  Fine grained access control with XACML 2.0 and 3.0
o  Pluggable and extensible architecture
o  Plug-in various PIP and PEP modules
o  Plug in policy stores
o  Policy Management UI
o  Try-it tool to test policies
o  Caching and Thrift transport support for high
performance
Importing and Publishing
Distributed PDP Management
TryIt
Policy Governance
XACML Integration Points
o  Entitlement Mediator for WSO2 ESB
o  Entitlement Handler for WSO2 API Manager
o  Entitlement Servlet Filter for WSO2 Application Server
o  Third-party agents
o  Java EE Servlet Filter
o  Liferay Agent
o  Microsoft IIS Agent
Deployment Options
WSO2 Platform Deployment Options
o  Stand-alone servers
o  Private clouds:
e.g. Stratos, Kubernetes
o  Public Clouds:
e.g. AWS
o  Hybrid deployments
o  Dedicated hosting of any WSO2-
based solutions
o  WSO2 operations team is
managing the deployment and
keeps it running
o  99.99% uptime SLA
o  Any AWS region of choice
o  Can be VPNed to local network
o  Includes monitoring, backups,
patching, updates
o  Shared public cloud,
o  Currently available for application
and API hosting (hosted API
Manager and App Factory),
o  Preset multitenant deployment in
AWS US East run by WSO2,
o  Month-to-month credit card
payment
Thank	
  You!	
  
Download	
  WSO2	
  Iden/ty	
  Server	
  at:	
  
h6p://wso2.com/products/iden/ty-­‐server/	
  

More Related Content

What's hot

OAuth 2
OAuth 2OAuth 2
OAuth 2
ChrisWood262
 
Intro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID ConnectIntro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID Connect
LiamWadman
 
OAuth2 - Introduction
OAuth2 - IntroductionOAuth2 - Introduction
OAuth2 - Introduction
Knoldus Inc.
 
OAuth - Open API Authentication
OAuth - Open API AuthenticationOAuth - Open API Authentication
OAuth - Open API Authentication
leahculver
 
An introduction to OAuth 2
An introduction to OAuth 2An introduction to OAuth 2
An introduction to OAuth 2
Sanjoy Kumar Roy
 
Building secure applications with keycloak
Building secure applications with keycloak Building secure applications with keycloak
Building secure applications with keycloak
Abhishek Koserwal
 
Secure your app with keycloak
Secure your app with keycloakSecure your app with keycloak
Secure your app with keycloak
Guy Marom
 
OAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep Dive
Nordic APIs
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
Matt McLarty
 
SIngle Sign On with Keycloak
SIngle Sign On with KeycloakSIngle Sign On with Keycloak
SIngle Sign On with Keycloak
Julien Pivotto
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
SSIMeetup
 
“How to Secure Your Applications With a Keycloak?
“How to Secure Your Applications With a Keycloak?“How to Secure Your Applications With a Keycloak?
“How to Secure Your Applications With a Keycloak?
GlobalLogic Ukraine
 
Building an Authorization Solution for Microservices Using Neo4j and OPA
Building an Authorization Solution for Microservices Using Neo4j and OPABuilding an Authorization Solution for Microservices Using Neo4j and OPA
Building an Authorization Solution for Microservices Using Neo4j and OPA
Neo4j
 
Introduction to SAML & OIDC
Introduction to SAML & OIDCIntroduction to SAML & OIDC
Introduction to SAML & OIDC
ForgeRock Identity Tech Talks
 
Demystifying SAML 2.0,Oauth 2.0, OpenID Connect
Demystifying SAML 2.0,Oauth 2.0, OpenID ConnectDemystifying SAML 2.0,Oauth 2.0, OpenID Connect
Demystifying SAML 2.0,Oauth 2.0, OpenID Connect
Vinay Manglani
 
OpenID Connect Explained
OpenID Connect ExplainedOpenID Connect Explained
OpenID Connect Explained
Vladimir Dzhuvinov
 
OAuth 2.0
OAuth 2.0OAuth 2.0
OAuth 2.0
Uwe Friedrichsen
 
OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2
Mike Schwartz
 
An Introduction to OAuth2
An Introduction to OAuth2An Introduction to OAuth2
An Introduction to OAuth2
Aaron Parecki
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect Protocol
Michael Furman
 

What's hot (20)

OAuth 2
OAuth 2OAuth 2
OAuth 2
 
Intro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID ConnectIntro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID Connect
 
OAuth2 - Introduction
OAuth2 - IntroductionOAuth2 - Introduction
OAuth2 - Introduction
 
OAuth - Open API Authentication
OAuth - Open API AuthenticationOAuth - Open API Authentication
OAuth - Open API Authentication
 
An introduction to OAuth 2
An introduction to OAuth 2An introduction to OAuth 2
An introduction to OAuth 2
 
Building secure applications with keycloak
Building secure applications with keycloak Building secure applications with keycloak
Building secure applications with keycloak
 
Secure your app with keycloak
Secure your app with keycloakSecure your app with keycloak
Secure your app with keycloak
 
OAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep Dive
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
SIngle Sign On with Keycloak
SIngle Sign On with KeycloakSIngle Sign On with Keycloak
SIngle Sign On with Keycloak
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
 
“How to Secure Your Applications With a Keycloak?
“How to Secure Your Applications With a Keycloak?“How to Secure Your Applications With a Keycloak?
“How to Secure Your Applications With a Keycloak?
 
Building an Authorization Solution for Microservices Using Neo4j and OPA
Building an Authorization Solution for Microservices Using Neo4j and OPABuilding an Authorization Solution for Microservices Using Neo4j and OPA
Building an Authorization Solution for Microservices Using Neo4j and OPA
 
Introduction to SAML & OIDC
Introduction to SAML & OIDCIntroduction to SAML & OIDC
Introduction to SAML & OIDC
 
Demystifying SAML 2.0,Oauth 2.0, OpenID Connect
Demystifying SAML 2.0,Oauth 2.0, OpenID ConnectDemystifying SAML 2.0,Oauth 2.0, OpenID Connect
Demystifying SAML 2.0,Oauth 2.0, OpenID Connect
 
OpenID Connect Explained
OpenID Connect ExplainedOpenID Connect Explained
OpenID Connect Explained
 
OAuth 2.0
OAuth 2.0OAuth 2.0
OAuth 2.0
 
OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2
 
An Introduction to OAuth2
An Introduction to OAuth2An Introduction to OAuth2
An Introduction to OAuth2
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect Protocol
 

Viewers also liked

CAS Enhancement
CAS EnhancementCAS Enhancement
CAS EnhancementGuo Albert
 
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2
 
"Esup CAS Packaging" : Deploy and customize easily a CAS4 server
"Esup CAS Packaging" : Deploy and customize easily a CAS4 server"Esup CAS Packaging" : Deploy and customize easily a CAS4 server
"Esup CAS Packaging" : Deploy and customize easily a CAS4 server
Ludovic A
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and Shibboleth
Andrew Petro
 
Upgrading to cas 4.0 at oakland university
Upgrading to cas 4.0 at oakland universityUpgrading to cas 4.0 at oakland university
Upgrading to cas 4.0 at oakland university
bpowell29a
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Craig Dickson
 
Enterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOEnterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOOliver Mueller
 

Viewers also liked (8)

CAS Enhancement
CAS EnhancementCAS Enhancement
CAS Enhancement
 
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
 
"Esup CAS Packaging" : Deploy and customize easily a CAS4 server
"Esup CAS Packaging" : Deploy and customize easily a CAS4 server"Esup CAS Packaging" : Deploy and customize easily a CAS4 server
"Esup CAS Packaging" : Deploy and customize easily a CAS4 server
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and Shibboleth
 
Upgrading to cas 4.0 at oakland university
Upgrading to cas 4.0 at oakland universityUpgrading to cas 4.0 at oakland university
Upgrading to cas 4.0 at oakland university
 
Sso walk-through
Sso walk-throughSso walk-through
Sso walk-through
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
 
Enterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOEnterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSO
 

Similar to WSO2 Identity Server - Product Overview

Authenticator and provisioning connector in wso2 is
Authenticator and provisioning connector in wso2 isAuthenticator and provisioning connector in wso2 is
Authenticator and provisioning connector in wso2 is
H Mohammed Rajjaz
 
Authenticator and provisioning connector in wso2 Identity Server
Authenticator and provisioning connector in wso2 Identity ServerAuthenticator and provisioning connector in wso2 Identity Server
Authenticator and provisioning connector in wso2 Identity Server
Rajendram Kathees
 
WSO2 Identity Server 5.3.0 - Product Release Webinar
WSO2 Identity Server 5.3.0 - Product Release WebinarWSO2 Identity Server 5.3.0 - Product Release Webinar
WSO2 Identity Server 5.3.0 - Product Release Webinar
WSO2
 
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and PenroseChakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Roger CARHUATOCTO
 
Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8
Iwantha Lekamge
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CloudIDSummit
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
Adam Lewis
 
Distributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfDistributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdf
Nordic APIs
 
Solving Single-Sign-On
Solving Single-Sign-OnSolving Single-Sign-On
Solving Single-Sign-On
Aaron King
 
WSO2 API Manager - Product Overview
WSO2 API Manager - Product OverviewWSO2 API Manager - Product Overview
WSO2 API Manager - Product Overview
WSO2
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Michael J Geiser
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
CA API Management
 
Enterprise Security Requirements
Enterprise Security RequirementsEnterprise Security Requirements
Enterprise Security Requirements
WSO2
 
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
Profesia Srl, Lynx Group
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
Mark Diodati
 
WSO2 API Manager 2.0 - Overview
WSO2 API Manager 2.0 - Overview WSO2 API Manager 2.0 - Overview
WSO2 API Manager 2.0 - Overview
Edgar Silva
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
VMware Tanzu
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
ForgeRock
 

Similar to WSO2 Identity Server - Product Overview (20)

Authenticator and provisioning connector in wso2 is
Authenticator and provisioning connector in wso2 isAuthenticator and provisioning connector in wso2 is
Authenticator and provisioning connector in wso2 is
 
Authenticator and provisioning connector in wso2 Identity Server
Authenticator and provisioning connector in wso2 Identity ServerAuthenticator and provisioning connector in wso2 Identity Server
Authenticator and provisioning connector in wso2 Identity Server
 
WSO2 Identity Server 5.3.0 - Product Release Webinar
WSO2 Identity Server 5.3.0 - Product Release WebinarWSO2 Identity Server 5.3.0 - Product Release Webinar
WSO2 Identity Server 5.3.0 - Product Release Webinar
 
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and PenroseChakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
 
Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
 
Distributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfDistributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdf
 
Solving Single-Sign-On
Solving Single-Sign-OnSolving Single-Sign-On
Solving Single-Sign-On
 
WSO2 API Manager - Product Overview
WSO2 API Manager - Product OverviewWSO2 API Manager - Product Overview
WSO2 API Manager - Product Overview
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
 
Enterprise Security Requirements
Enterprise Security RequirementsEnterprise Security Requirements
Enterprise Security Requirements
 
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
WSO2 API Manager 2.0 - Overview
WSO2 API Manager 2.0 - Overview WSO2 API Manager 2.0 - Overview
WSO2 API Manager 2.0 - Overview
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 

More from WSO2

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
WSO2
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
WSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
WSO2
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
WSO2
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
WSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
WSO2
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2
 

More from WSO2 (20)

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

WSO2 Identity Server - Product Overview

  • 1. WSO2 Identity Server 5.1.0 Overview
  • 2. Agenda o  Introduction o  Product Overview o  Authentication & SSO o  User Provisioning & Management o  Authorization & Entitlement o  Deployment Options
  • 4. Security Landscape Borders  across  systems  don’t  work  anymore  
  • 5. Why ? o  Bring Your Own Device o  Bring Your Own Identity o  Identity is maintained in one domain, accessed in other domains o  Social network identities (Facebook, LinkedIN, Google) o  Open APIs o  Ecosystems o  Mergers / Acquisitions o  Value Webs (Composable Enterprises)
  • 7. What Does an EIB Do ? Bridges Tokens •  OAuth/2 •  OpenID/OpenID Connect •  SAML2 •  WS-Federation •  Kerberos, etc Claims & Claim Dialects •  Email Addresses •  Phone Numbers •  Names, etc User Stores •  SPML, SCIM, Salesforce, Google, etc •  Just in Time provisioning, inbound, outbound
  • 9. How Does it Work ? o  Bridges multiple web applications across multiple protocols o  Login into Drupal using SAML and get automatically signed on your Web application, which requires Open ID Connect. o  Connect to Facebook and be automatically connected to Salesforce o  Bridges across: OpenID Connect, SAML 2.0, OAuth 2.0, OpenID, WS-Federation (Passive) o  Benefits o  Transparent to the application users o  Extensible
  • 11. How Does it Work ? o  Bridge multiple identity providers o  Identity Server serves a central authentication hub for all applications - Each application continues to use their own IdP of choice (say OpenID Connect) o  Home Realm Discovery - Identity Server uses the request to redirect the user to the correct IdentityProvider o  Benefits: o  Client App only need to trust its own Identity Provider o  Authentication protocol at the client side is decoupled from the Identity Provider o  Trust relationship maintained centrally
  • 13. How Does it Work ? o  Bus serves as central hub to provision identities to multiple IdPs o  Transforms provisioning requests, from SCIM to SPML for example o  Provides just-in-time provisioning o  Benefits o  Supports SCIM (System for Cross-Domain Identity Management) standard o  Supports SPML, JDBC, LDAP, GoogleApps, Salesforce o  Simple extension model
  • 15. How Does it Work ? o  IDP proxy application delivers SSO functionality for native mobile applications o  SDK is used to invoke IdP proxy from the mobile application o  Allows the application to obtain an OAuth access token from an identity o  Benefits - Leverage enterprise identity management system for mobile applications
  • 17. WSO2 Identity Server o  5th Generation Product o  Current version 5.0.0 (released May 2014) o  Why did we build it? o  Federated identity and entitlement is a key part of any distributed architecture o  Internal security threats, Partnerships o  Mergers, De-mergers o  APIs, Cloud systems o  SSO is important but need to federate and bridge across SSOs o  Open Standards for Identity are changing the industry landscape o  Based on WSO2 Carbon platform, which provides support for multi-tenancy, logging, clustering, and other common services
  • 19. Benefits o  Scenario-driven configuration o  Large number of scenarios supported out of the box, through simple configuration o  Single Sign On o  Federated Identity o  User Provisioning and Management o  Authorization and Entitlements o  Extensible & Customizable - Custom Authenticators
  • 21. Authentication o  Extensible user stores integration o  Security for APIs and Web Services o  Web Single Sign On for heterogeneous systems o  Highly configurable and extensible authentication flows o  Federation and Social integration
  • 22. User Stores o  Identity Server supports connecting 1 to N user repositories to a single server o  One primary and multiple secondary o  Configurable through UI o  Supports following o  Built-in LDAP based on Apache DS o  JDBC - Any data store, tested with Oracle, MySQL, DB2 and others o  Active Directory
  • 23. Securing SOAP Services o  Security Token Service (STS) o  Supports WS-Trust 1.4 o  Issues SAML 1.1 and SAML 2.0 Tokens o  HOK and Bearer subject confirmations o  Configurable Security Policies for the STS o  Kerberos token based o  X509 Certificate based o  User Name password based o  Built on Apache Rampart project
  • 24. Securing REST APIs o  Complete OAuth 2.0 and OAuth 1.0a supported Authorization Server o  Supported OAuth 2.0 Grants - Authorization Code, Implicit, Resource Owner Password, Client Credential, SAML Bearer, IWA-NTLM, Refresh Token o  JWT implementation o  Key Manager for the WSO2 API Manager
  • 25. Authenticators o  Local Authenticators o  Basic Authenticator - Username, password o  IWA Authenticator – Zero password login o  FIDO (Fast Identity Online) - Multifactor authentication o  Federated o  SAML 2.0 Web SSO Authenticator o  OAuth2/OpenID Connect Authenticator o  OpenID Authenticator o  WS-Federation (Passive) Authenticator
  • 26. Configurable Authenticator Flow o  Multi-Step : Add any number of authentication steps o  Multi-Option : Add any number of authenticators for a step o  Configuration per service provider (application)
  • 27. Web Single Sign On o  SAML 2.0 Web Browser SSO o  Basic Attribute Profile o  IDP initiated SSO o  OpenID 2.0 o  Simple Registration Extension o  Attribute Exchange o  OpenID Connect o  IDToken o  User Endpoint o  WS-Federation Passive STS o  SAML 1.1 Tokens o  Preferred by Windows Identity Foundation (WIF) based clients (ASP.NET) o  Based on Apache Rampart project
  • 28. SSO for Heterogeneous Systems o  Web Applications can speak in any identity language (e.g. SAML2, OpenID, OpenID Connect) to the Identity Server o  Single Login o  Role transformations o  Claim transformations o  Customizable login screens
  • 29. Federation o  Configure Trusted Identity Providers (IdPs) o  Add Trusted IDPs to application authentication flows to enable Federation o  Configure Provisioning for Identity Providers o  Just-In-Time (JIT) provisioning o  Outbound provisioning o  Role transformations o  Claims Transformations
  • 30. Home Realm Discovery o  Process of identifying correct federated IDP for an authentication request o  A key feature of federation o  Uses the information in the authentication request to identity the IDP o  Logic is pluggable
  • 31. User Provisioning & Management
  • 32. Provisioning and Management o  Just In Time Provisioning o  Highly extensible User Provisioning Framework o  Users and groups management o  Accounts and Policies Management o  Self Service Dashboard o  Logging and Monitoring o  Custom user management workflows – user specific approvals, multi-step approvals, approvals requiring multiple roles
  • 33. Just-in-time Provisioning o  Federated Identities can be provisioned into the WSO2 Identity Server while federating o  Users can be provisioned to any primary or secondary user store o  JIT provisioned users can be provisioned to any other systems instantly
  • 34. Provisioning Framework o  Three inbound provisioning APIs o  System for Cross-Domain Identity Management (SCIM) API – REST/JSON o  UserAdmin – SOAP/XML o  RemoteUserStoreManagerService – SOAP/XML o  Pluggable outbound provisioning connectors o  Out-of-the-box provisioning connectors : SCIM, SPML, Google and SalesForce o  Custom connectors (create and drop in !)
  • 35. SCIM Implementation o  System cross-domain identity management - http://www.simplecloud.info/ o  Adopted by many vendors and SaaS applications (Salesforce for example) o  Supports users (including bulk creation) and groups provisioning, via REST API o  IS supports SCIM 1.1 - SCIM 2.0 work ongoing
  • 36. User and Role Management o  Comprehensive Administrative UI for User and Roles Management o  Add, delete, update user profiles and roles o  Search/list users and roles o  Reset user passwords o  Can manage users / groups in multiple user stores
  • 37. Account and Password Policy Management o  Configure password complexity – E.g. 8 character long, must include numbers and symbols o  Password expiry configuration o  Failed login attempts and account locking o  Captcha verification o  Self registration and user account verification o  Account recovery, forgotten password
  • 39. Auditing o  Privileged operations are saved to log files, including login/logout operations o  Data is saved in XDAS format o  Through extensions, events can be published to our Data Analytics solutions (BAM and CEP)
  • 41. Authorization and Entitlement o  Role Based Access Control o  Attribute Based Access Control o  Policy Based Access Control o  XACML 2.0/3.0 o  Support for OpenAz o  Hierarchical Resource Profile o  Hierarchical Role Profile o  Multiple Decision Profile
  • 42. Role-based Access Control o  Provisioning UI for assigning permissions for Roles and assigning users for roles o  SOAP/XML APIs for authorization o  UserAdmin o  RemoteUserStoreManagerService o  RemoteAuthorizationManagerService
  • 43. Scope-based Access Control o  OAuth is a scope based authorization framework o  WSO2 Identity Server supports OAuth version 1.0a and 2.0 o  Users and Permit/Deny granting authorization for applications o  Access Token is validated over SOAP API - JWT (JSON Web Token) attached to response, contains information about token authorized scopes (for back-end consumption)
  • 44. Claim-based Access Control o  Comprehensive UI to manage/configure claim dialects o  Default claim dialects: SCIM, OpenID AX, OpenID SReg, XML/WSDL, OpenID Connect and WSO2 dialect o  Write XACML policies based on User Claims o  Define WS-Trust/ WS- Security policies based on User Claims o  Retrieve user claims for authorization over OpenID, OpenID Connect and SAML
  • 45. Policy-based Access Control o  Fine grained access control with XACML 2.0 and 3.0 o  Pluggable and extensible architecture o  Plug-in various PIP and PEP modules o  Plug in policy stores o  Policy Management UI o  Try-it tool to test policies o  Caching and Thrift transport support for high performance
  • 48. TryIt
  • 50. XACML Integration Points o  Entitlement Mediator for WSO2 ESB o  Entitlement Handler for WSO2 API Manager o  Entitlement Servlet Filter for WSO2 Application Server o  Third-party agents o  Java EE Servlet Filter o  Liferay Agent o  Microsoft IIS Agent
  • 52. WSO2 Platform Deployment Options o  Stand-alone servers o  Private clouds: e.g. Stratos, Kubernetes o  Public Clouds: e.g. AWS o  Hybrid deployments o  Dedicated hosting of any WSO2- based solutions o  WSO2 operations team is managing the deployment and keeps it running o  99.99% uptime SLA o  Any AWS region of choice o  Can be VPNed to local network o  Includes monitoring, backups, patching, updates o  Shared public cloud, o  Currently available for application and API hosting (hosted API Manager and App Factory), o  Preset multitenant deployment in AWS US East run by WSO2, o  Month-to-month credit card payment
  • 53. Thank  You!   Download  WSO2  Iden/ty  Server  at:   h6p://wso2.com/products/iden/ty-­‐server/