Cloud Blog

Latest Posts

iOS Device Policies in WSO2 Device Cloud Part 1: Enforcing Restrictions

Today, many organizations allow employees to bring their devices to work, which introduces new risks to corporate data as people typically use their devices for work purposes. To minimize the risk of exposing c...

Read More

How API Gateway constructs URLs and translates them to backend calls

The URLs that your APIs have when hosted in API gateway and exposed to the world are different from the URLs of the backend services. Today we will explain how API gateway translates the calls that it gets into...

Read More

Authenticate End-Users for APIs: LDAP, AD, SAML, Database, Web-Service

APIs are often the backbone of the functionality used by mobile and web-applications. These applications in their turn often need to "know" end-user identity to provide personalized service: end-user-specific...

Read More