Open in app

Sign In

Write

Sign In

Sadil Chamishka
Sadil Chamishka

30 Followers

Home

About

Jan 15

The future of CIAM with B2C, B2B & B2B2C business models.

Customer Identity and Access Management (CIAM) is an emerging area that combines the security aspects of identity and access management with digital customer experiences. Nowadays the businesses are moving on rapid digital transformation with the technology advancements. The inter relation between businesses to formulate more complex business models while providing…

B2B

8 min read

The future of CIAM with B2C, B2B & B2B2C business models.
The future of CIAM with B2C, B2B & B2B2C business models.
B2B

8 min read


Oct 12, 2022

Claim Management with WSO2 Identity Server

What are Claims ? A claim is a piece of information about a particular subject. It can be anything that the subject is owned by or associated with, such as name, group, preferences, etc. Claim-based identity is a common way for any application to acquire identity information. …

Wso2 Identity Server

3 min read

Claim Management with WSO2 Identity Server
Claim Management with WSO2 Identity Server
Wso2 Identity Server

3 min read


Oct 12, 2022

Microservices Caching Patterns

The caching is a technique used in computer systems to boost the performance. The limitation of latency for the I/O bound tasks reduce the performance of the systems and caching is introduced to keep the more frequent data close to the application. There are several caching patterns which can be…

Cache

4 min read

Microservices Caching Patterns
Microservices Caching Patterns
Cache

4 min read


Oct 10, 2022

Application Level Proof of Possession for Access Tokens

The OAuth 2.0 framework introduced a mechanism to delegate resource access for a third party on behalf of the resource owner. This paradigm revolutionised the authorization flows in the software applications and yet it is the de facto standard for access delegation. The traditional approach of sharing resource owner’s credentials…

Dpop

6 min read

Application Level Proof of Possession for Access Tokens
Application Level Proof of Possession for Access Tokens
Dpop

6 min read


May 11, 2022

WSO2 Identity Server Cluster Setup

Hi folks, In this blog I am going to setup WSO2 Identity Server as a clustered deployment. WSO2 Identity Server (WSO2 IS) is an API-driven open source Identity and Access Management (IAM) product designed to help developers build effective CIAM solutions in a short stretch of time. In the modern…

6 min read

WSO2 Identity Server Cluster Setup
WSO2 Identity Server Cluster Setup

6 min read


May 2, 2022

First Step for Logging with Log4J2

Hi folks, this is the beginning of logging with log4J2 blog series which I hope to share my experience on logging in Java with different frameworks and best practices. In day today life, we do log normally to make it useful when we need work on investigation on certain things…

Log4j2

4 min read

First Step for Logging with Log4J2
First Step for Logging with Log4J2
Log4j2

4 min read


Apr 13, 2022

Vulnerability Scanning with Trivy

Hi Folks, here I am going to share my experiences on vulnerability scanning using Trivy. Trivy is an open-source vulnerability scanner used for scanning container images, file systems, and git repositories. First and for most, What is Vulnerability? As per Wikipedia, “In computer security, a vulnerability is a weakness which…

Trivy

4 min read

Vulnerability Scanning with Trivy
Vulnerability Scanning with Trivy
Trivy

4 min read


Jan 29, 2022

Which OAuth Grant Type should we Choose

The OAuth 2.0 is an industry standard protocol for access delegation. This well known authorization framework is widely used over variety of applications. The OAuth grant types play a major role to accomplish that by adhering to the required security aspects with respect to the variety of applications. …

3 min read

Which OAuth Grant Type should we Choose
Which OAuth Grant Type should we Choose

3 min read


Dec 4, 2019

NGINX as a Reverse Proxy

Nginx is a web server and also can be used as a reverse proxy. apt install nginx First, we can disable the default virtual host that is pre-configured when Nginx is installed. unlink /etc/nginx/sites-enabled/default We can edit nginx.conf …

Nginx

2 min read

NGINX as a Reverse Proxy
NGINX as a Reverse Proxy
Nginx

2 min read


Nov 16, 2019

Let’s Play with Kubernetes.

Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and management. There are few more container-orchestration systems, but Kubernetes has become the leading service. Let’s assume a Python web application is deployed over 2 virtual machines including 2 containers. HAProxy is set up as a load balancer. …

Docker

7 min read

Let’s Play with Kubernetes.
Let’s Play with Kubernetes.
Docker

7 min read

Sadil Chamishka

Sadil Chamishka

30 Followers
Following
  • Dmytro Iakubovskyi

    Dmytro Iakubovskyi

  • Kasun Rajapakse

    Kasun Rajapakse

  • Sushrut Ashtikar

    Sushrut Ashtikar

  • Thananchseyan

    Thananchseyan

  • Michael Hannecke

    Michael Hannecke

See all (23)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech