In my previous blog post, we understood how to deploy in WSO2IS with proxy server or load balancer. But it is about a basic deployment. When it comes to the real production. Lets try to understand the most common deployment pattern. Followings are the important points to consider when it comes to the production deployment. […]
Category: Patterns
Authentication, Authorization, Federation and Security Patterns
Today I am going to talk about brokered authentication. Before going to topic, I guess you are familiar with the direct authentication that there is an direct relationship between the two parties, those are client and server. But in brokered authentication, there is an authentication broker that both parties trust independently. And authentication broker issues […]