As the word is coming more and more to its nature, distributed ones, the ability to implement most common design patter is more then expected and needed. Design patterns are trying to fulfill such motivation and enable understanding of the application behavior design.
This is the first part of the series giveng an overview of what is an Identity and Access manager and what are its features. Any application or tools claiming to be a identity provider has to fullfil these bases functionalities.
This article is the third in a series on Apache Camel and how I used it to replace IBM Message Broker for a client.
One of the main reasons behind this is that each API represents a specific optimization that requires a fairly different data structure. Common to all of the various techniques however is that they were written under the assumption that disk is a bottleneck
In this article I explained how spring built-in transformers works for while transforming object message to Map Message. Sometimes the messages need to be transformed before they can be consumed to achieve a business purpose.
They've released the API as part of a longer plan to modernize the markup and frontend of Hacker News to create a more reliable source of real-time data for readers that scrape the site for content and information. They plan to convert to a new Arc-powered engine in the next three weeks.
WSO2 Governance Registry is basically a metadata repository which basically helps to store and manage metadata. In this article I am trying to explain, how to mount a remote repository to WSO2 ESB via JDBC-based configuration.
Company employees are allowed to access these APIs via web apps while they’re behind the company firewall. All data is stored in a Microsoft Active Directory, and all the web applications are connected to a Security Assertion Markup Language (SAML) 2.0 identity provider to authenticate users.
This is Part IV of the "Microservices and PaaS" blog series covering the rapidly evolving use of microservices in modern cloud software projects. Parts I and II introduced microservices concepts and discussed patterns and practices being spearheaded by microservices pioneers.
Hi all, Recently I came across with the $subject and I was unable to find a comprehensive tutorial. So In this post I've decided to show how to install and configure apache subversion server and configure the server to access via http in ubuntu.
In this tutorial, we show you how to develop a simple REST web application with Jersey framework and visualize API's using Cuubez API Visualizer.
There are many descriptions of what constitutes a micro service, and many specifications that could be described as following the pattern.
Only a few years everyone relied on SQL exclusively to tackle Big Data needs, but as the demand for speed and space increases, so have our options. Now there are a number of data systems that are mostly based around NoSQL, with each of them having been developed to best serve specific areas.
The WSO2 Identity Server 5.0.0 takes the identity management into a new direction. No more there will be federation silos or spaghetti identity anti-patterns. The authentication framework we introduced in IS 5.0.0 powers this all.
WSO2 technology is solving the biggest challenges retail companies face in scaling their transaction volumes (billions per day), lowering security risk, enhancing customer experience, and enabling new digital commerce channels.
How should we override the default table names to match the existing data model?
At RESTFest, in addition to voluntary extended talks, each attendee has a #FiveInFive slot (5 slides in 5 minutes). That means you get to hear from all the voices in the room, not just the most familiar voices in the API world.
Make sure you didn't miss anything with this list of the Best of the Week in the Enterprise Integration Zone (Sept 26 to Oct 2). This week's topics include RabbitMQ and Spring Framework, REST services with Spring Security, developing Apache Camel services, and Spring services.
At Data Geekery, we’re using Java 8 for our jOOQ integration tests, as using the new Streams API with lambda expressions makes generating ad-hoc test data so much easier.
In my view, any identity management system to qualify to support BYOID - should simply go beyond standard support for Identity Federation protocols.That era is over. Time to think - time to rethink - how would you mediate, transform identity tokens between different standards or protocols.
When compiling code in Gradle that targets older JVM’s, you need to be very careful your code doesn’t use any of the classes in the newer JDK.
Checking method/constructor parameters for null values is a common problem in Java.
Sometimes one would want to handle strings which contain characters not included in UTF-8 or the default encoding (set in mule-deploy.properties). In these scenarios a different encoding which is capable of handling these characters (such as UTF-16 or UTF-32) can be used.
The reason I go to JavaOne is to hear the definitive view on GlassFish and JavaEE futures from the people that make the decisions. There's no other conference you can say that about.
This article is the second in a series on Apache Camel and how I used it to replace IBM Message Broker for a client.