Convert an X509v3 Binary Security Token to PEM Format
This tutorial describes how to convert a Binary Security Token extracted from a SOAP message into a valid PEM format[…]
Read moreThe Intersection of Identity, Integration, API Management, and Application Security.
This tutorial describes how to convert a Binary Security Token extracted from a SOAP message into a valid PEM format[…]
Read moreIn the last post, we looked at the steps involved in generating a digital signature using the XML Digital Signature[…]
Read moreThe XML DSig specification is used to provide digital signature functionality to XML Documents. It is is used by numerous[…]
Read moreI’ve talked about authentication many times on ThinkMiddleware.com. It recently occurred to me that I have never devoted a blog[…]
Read moreA few months ago I switched from using Cisco’s QuickVPN software to the ShrewSoft VPN Client for Windows. I’m not[…]
Read moreWhile working with DataPower and Active Directory (acting as the User Repository) I have often run into situation where AD[…]
Read moreAnother use-case that I touched on during my JBoss World 2012 presentation was using the PicketLink WS-Trust Client implementation to[…]
Read moreI’ve been at a couple of different client sites where there was a heavy IBM product presence, the use of[…]
Read moreIt’s been a few weeks since I have posted any updates. I started a new project at the beginning of[…]
Read moreI was recently involved in a conversation where someone asked the question what is FGA (Fine Grained Authorization) versus Coarse[…]
Read more