Open in app

Sign In

Write

Sign In

Hasintha Indrajee
Hasintha Indrajee

71 Followers

Home

About

Dec 1, 2019

CICD your APIS with WSO2 APIM using Jenkins

An organization can have multiple environments with heterogeneous deployments patterns and configurations. These environments can have different APIs. WSO2 API Manager supports creating fully automated CI/CD pipelines for APIs and maintaining the lifecycle of API, changing environment-specific configurations throughout the CI/CD process. In simple terms one of the main objectives…

Jenkins

4 min read

CICD your APIS with WSO2 APIM using Jenkins
CICD your APIS with WSO2 APIM using Jenkins
Jenkins

4 min read


Published in wso2-cellery

·Oct 29, 2019

How Cellery Leverages OPA

Open Policy Agent (OPA) is a general-purpose policy engine gives you the ability to define fine-grained policy control at all levels of the stack, and more importantly, decouple the definition of policy from the enforcement of it. …

Kubernetes

5 min read

How Cellery Leverages OPA
How Cellery Leverages OPA
Kubernetes

5 min read


Published in wso2-cellery

·Aug 13, 2019

Secure Components with Cellery

Cellery is a novel code first approach for building, integrating, running and managing composite applications on Kubernetes. While using your existing container images, you can achieve many more things on top of them with minimum effort. Refer Cellery official website for more information about Cellery Cellery provides a mechanism of…

Kubernetes

5 min read

Kubernetes

5 min read


Aug 7, 2019

Browser SSO for CLI Applications

Command Line Applications are programs that you interact with entirely through your terminal and shell. They have no graphics or visual interface beyond what you see in your terminal after you run the program. Well how you can use browser based Single Sign On for such an application ? …

Oauth

4 min read

Browser SSO for CLI Applications
Browser SSO for CLI Applications
Oauth

4 min read


Aug 7, 2019

Authenticate to Docker Registry through OAuth Provider

Have you ever worried about the authentication mechanism which docker registry uses ? If not, probably you might have never used/hosted a private docker registry for your organization. If you have had one, you should have came across what the docker authentication mechanism is. …

Docker

3 min read

Authenticate to Docker Registry through OAuth Provider
Authenticate to Docker Registry through OAuth Provider
Docker

3 min read


Mar 25, 2019

Lightweight Application Gateway for Envoy

Also known as application proxy or application-level proxy, an application gateway is an application program that runs between two networks. When a client program establishes a connection to a destination service, it connects to an application gateway, or proxy. The client then negotiates with the proxy in order to communicate…

Envoy

4 min read

Lightweight Application Gateway for Envoy
Lightweight Application Gateway for Envoy
Envoy

4 min read


Jan 19, 2019

Authenticate to Kubernetes API Server with an external Identity Provider

With this post I will be going through how you can authenticate to your kubernetes API server through WSO2 Identity Server. Well, with this method you don’t need to have separate users in your kubernetes cluster. You can manage users through your cooperate Identity Provider itself. (Any IDP which supports…

Wso2

4 min read

Authenticate to Kubernetes API Server with an external Identity Provider
Authenticate to Kubernetes API Server with an external Identity Provider
Wso2

4 min read


Nov 1, 2018

Handling “Error when submitting credentials after staying too long in login page”

This is a rare case which might occur under certain circumstances. One of them is if you are not using temporary session data persistence. …

JavaScript

2 min read

Handling “Error when submitting credentials after staying too long in login page”
Handling “Error when submitting credentials after staying too long in login page”
JavaScript

2 min read


Mar 15, 2018

Private Key JWT Client Authentication for OIDC

Private Key JWT Client Authentication is an authentication method that can be used by clients to authenticate to the authorization server when using the token endpoint. In this authentication mechanism, only the clients that have registered a public key, signed a JWT using that key, can authenticate. The JWT must…

Jwt

3 min read

Private Key JWT Client Authentication for OIDC
Private Key JWT Client Authentication for OIDC
Jwt

3 min read


Mar 4, 2018

Valves, Filters and Interceptors

Recently I had the requirement to authenticate incoming requests to a CXF webapp. …

Java

3 min read

Java

3 min read

Hasintha Indrajee

Hasintha Indrajee

71 Followers

Technical Lead — WSO2, Focused on IAM

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech