Welcome!

Linux Containers Authors: Miska Kaipiainen, Elizabeth White, Automic Blog, Liz McMillan, Pat Romanski

News Feed Item

WSO2 Introduces Industry’s First Enterprise Identity Bus With the Launch of WSO2 Identity Server 5.0

The dream of enterprise security based on one unifying identity has faded. It has been displaced by the reality of multiple identities in the era of the connected business where the cloud, mobile computing, and APIs are helping to extend processes to customers, partners, and other groups within the organization. Now, just as organizations have turned to the enterprise service bus (ESB) to connect their disparate systems, businesses are realizing the need for an enterprise identity bus (EIB) to connect and manage their various identities based on multiple standards. Today, WSO2 addresses this demand with the launch of WSO2 Identity Server 5.0, the industry’s first enterprise identity bus.

The latest release of the award-winning WSO2 Identity Server adds significant new capabilities for managing the many security standards now in use across enterprises, including:

  • Identity token transformation and mediation for seamless integration between internal applications and cloud apps, such as Salesforce, Google Apps, and Microsoft Office 365.
  • New user and group provisioning capabilities, which enable WSO2 Identity Server to translate and broker provisioning requests across a range of security, Web and cloud standards.
  • Multi-option and multi-step authentication to provide flexibility in selecting authentication options and enable robust multi-factor authentication.

“Through the cloud, mobile, APIs, social media, and Internet of Things, enterprises are creating new connections across employees, customers and partners—and introducing a dizzying array of standards for identifying these users,” said Paul Fremantle, WSO2 co-founder and CTO. “The release of our WSO2 Identity Server 5.0, the industry’s first enterprise identity bus, embraces this diversity by providing a central backbone for managing user identities, regardless of the standards on which they are based.”

Robust Identity Management On-premises and in the Cloud

Version 5.0 builds on the proven performance of WSO2 Identity Server 4.5, the enterprise-ready, 100% open source, lean, component-based software, which has been in production in Global 1000 enterprises since 2009.

WSO2 Identity Server enables enterprise architects and developers to improve the user’s experience by reducing identity provisioning time, guaranteeing secure online interactions, and delivering a reduced single sign-on (SSO) environment. It also decreases the burden of identity management and entitlement management by including role-based access control, attribute-based access control, fine-grain policy-based access control, and SSO bridging. Featuring full native multi-tenancy, WSO2 Identity Server can run on servers, in a private cloud, public cloud or hybrid cloud environment—all from the same software.

Support for System for Cross-domain Identity Management (SCIM) for identity provisioning facilitates user management operations across software as a service (SaaS) applications. Additionally, federated identity provider (IdP) functionality allows different organizations to make shared services available—for example different universities sharing certain resources with each other’s faculty or students—while enabling single sign-on simplicity for end users. Such federated IdP is particularly important for facilitating authentication across extremely large deployments associated with the cloud and platform as a service (PaaS).

“We have had great success implementing WSO2 Identity Server for user authentication as part of the solutions we’re delivering based on the WSO2 Carbon middleware platform and WSO2 Private PaaS,” said Kambiz Darabi, managing director at m-creations, a German IT consultancy dedicated to mobile IT. “We are excited about the new capabilities being launched with version 5.0, which address the challenges of linking together heterogeneous systems and the growing demand to integrate internal and cloud applications.”

“The SSO environment implemented with WSO2 Identity Server has fully met our expectations and is enabling us to realize the goals we set out for simplifying our user identity administration,” said Abdullah Al Tahhan, a senior project manager at ELM, a trusted provider of secure electronic services in Saudi Arabia. “We are quite pleased with WSO2’s technology, but more than anything, when we think of future engagements, we are going to think of WSO2 because of the great support.”

Introducing Enterprise Identity Bus Capabilities

WSO2 Identity Server 5.0 adds significant new functionality to facilitate identity management across multiple identity standards, devices, domains and applications—on-premises and in the cloud.

Identity token transformation and mediation – With version 5.0, WSO2 Identity Server is capable of performing transformation and mediation between any identity token, including Security Assertion Markup Language (SAML) 2.0, OAuth 1.0/2.0, OpenID, OpenID Connect, and WS-Federation (passive).

Identity token transformation and mediation enables seamless integration between an enterprise’s internal applications running on servers or in a private PaaS and cloud applications, such as Salesforce, Google Apps, and Microsoft Office 365. Additionally, users can bring their own IDs to connect to enterprise systems. For example, Salesforce requires a SAML token for authentication, but a user may want to connect using OpenID. WSO2 Identity Server directs the user to any OpenID provider and translates the token to the correct SAML format for SalesForce to consume. SalesForce only needs to trust WSO2 Identity Server, which acts as a federation bus across all applications.

New user and group provisioning capabilities – WSO2 Identity Server 5.0 can be used to automatically provision users and groups of users onto various platforms. This provisioning can be explicit by pushing the user/group definition to the target system or just-in-time as the user logs in. Integrated with a federated identity provider, just-in-time provisioning enables a corresponding subject to be provisioned to its internal user store and any other provisioning system.

Through the provisioning bridge, WSO2 Identity Server 5.0 also can transform SCIM and SOAP-based provisioning requests into provisioning requests to other formats, such as Service Provisioning Markup Language (SPML) 2.0, Salesforce, Google Apps, Lightweight Directory Access Protocol (LDAP), Active Directory, and Java Database Connectivity (JDBC). In addition to these predefined connectors, which are available out of the box, the WSO2 Identity Server 5.0 runtime can work with custom provisioning connectors.

Multi-option and multi-step authentication – With WSO2 Identity Server 5.0, a service provider, irrespective of the protocol it supports, can select one or more login options that it wants to present to users, such as user name and password, Facebook, SAML or OpenID Connect. Additionally, the service provider can enforce multi-factor authentication by choosing multiple steps that align the right authenticators with the right step.

Additional New Features – WSO2 Identity Server 5.0 includes other new features to provide greater ease of use and facilitate user provisioning and management. With this latest release:

  • A Web-based dashboard for end users provides an intuitive, friendly alternative to the administration console for user management tasks, such as updating the user profile, associating social logins to the profile, changing the security challenge questions, resetting the password, managing an OpenID profile, and viewing identity providers.
  • Remote user store management makes it possible to manage heterogeneous user stores distributed across different data centers from a single WSO2 Identity Server node.

WSO2 Identity Server Builds on WSO2 Carbon Platform

WSO2 Identity Server is part of the modular, fully componentized OSGi-compliant WSO2 Carbon enterprise middleware platform. Like all WSO2 middleware products in the award-winning WSO2 Carbon platform, it is inherently cloud-enabled and uses proven core framework components that provide a consistent set of enterprise-class management, security, clustering, logging, statistics, tracing, and other capabilities. Additionally, it offers a graphical management console, which is integrated with other WSO2 middleware products, for configuration, management and monitoring. As a result, enterprises have unprecedented flexibility to enrich WSO2 Identity Server by adding any of the features in the WSO2 Carbon central repository, which are based on 175-plus components.

Availability and Support

WSO2 Identity Server 5.0 is available today as a software download that can run directly on servers or on top of WSO2 Private PaaS, and as a WSO2 Cloud Virtual Machine running on the Amazon Elastic Computing Cloud (EC2), Linux Kernel Virtual Machine (KVM), and VMware ESX. Additionally, customers can choose to have WSO2 host WSO2 Identity Server through the WSO2 Managed Cloud service. As a fully open source solution released under the Apache License 2.0, it does not carry any licensing fees.

WSO2 Identity Server is backed by a world-class technical team in which the experts that helped create the software provide support, leading to direct and immediate access to the people with in-depth knowledge of the middleware. WSO2 service and support options include evaluation support, a special QuickStartSM consulting program, development support, and production support.

About WSO2

WSO2 delivers on the promise of the connected business with the only completely integrated enterprise platform that enables businesses to build, integrate and manage their APIs, applications, and Web services on-premises, in the cloud, and on mobile devices. Leading enterprise customers worldwide rely on WSO2’s award-winning 100% open source platform and its robust governance and DevOps functionality for their mission-critical applications. Today, these businesses represent nearly every sector: health, financial, retail, logistics, manufacturing, travel, technology, telecom and more. Visit http://wso2.com to learn more, or check out the WSO2 community on the WSO2 Blog, Twitter, LinkedIn, and Facebook.

Trademarks and registered trademarks are the properties of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...