Sadil ChamishkaThe future of CIAM with B2C, B2B & B2B2C business models.Customer Identity and Access Management (CIAM) is an emerging area that combines the security aspects of identity and access management…8 min read·Jan 15, 2023--1--1
Sadil ChamishkaClaim Management with WSO2 Identity ServerWhat are Claims ?3 min read·Oct 12, 2022----
Sadil ChamishkaMicroservices Caching PatternsThe caching is a technique used in computer systems to boost the performance. The limitation of latency for the I/O bound tasks reduce the…4 min read·Oct 12, 2022----
Sadil ChamishkaApplication Level Proof of Possession for Access TokensThe OAuth 2.0 framework introduced a mechanism to delegate resource access for a third party on behalf of the resource owner. This paradigm…6 min read·Oct 10, 2022----
Sadil ChamishkaWSO2 Identity Server Cluster SetupHi folks, In this blog I am going to setup WSO2 Identity Server as a clustered deployment. WSO2 Identity Server (WSO2 IS) is an API-driven…6 min read·May 11, 2022--2--2
Sadil ChamishkaFirst Step for Logging with Log4J2Hi folks, this is the beginning of logging with log4J2 blog series which I hope to share my experience on logging in Java with different…4 min read·May 2, 2022----
Sadil ChamishkaVulnerability Scanning with TrivyHi Folks, here I am going to share my experiences on vulnerability scanning using Trivy. Trivy is an open-source vulnerability scanner used…4 min read·Apr 13, 2022----
Sadil ChamishkaWhich OAuth Grant Type should we ChooseThe OAuth 2.0 is an industry standard protocol for access delegation. This well known authorization framework is widely used over variety…3 min read·Jan 29, 2022----
Sadil ChamishkaNGINX as a Reverse ProxyNginx is a web server and also can be used as a reverse proxy.2 min read·Dec 4, 2019----
Sadil ChamishkaLet’s Play with Kubernetes.Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and management. There are few…7 min read·Nov 16, 2019----