Onegini Blog


Ever struggled to provide end-to-end security from your backend API's to your mobile apps? How to make them OAuth 2.0 compliant? Maybe you use an API Gateway like CA API Gateway or Apigee’s API Gateway or Akana. You may have noticed their primary focus isn't mobile. Maybe you don't have an API Gateway, but you have REST API’s that you partially want to open up to your customers. Your backend developers would like to reuse existing security protocols like basic auth while your app developers just want to focus on the functionality in the app.

I’ll explain in this blog how Onegini helps you solve this issue, so you can start opening up your backend to mobile users in weeks. And now with the Security Proxy 2.0 release, it will even go faster, because your API architecture can remain as is. But first, let's take a step back and see how the Security Proxy 1.0 worked.

Security Proxy 1.0, an introduction
feel free to skip if you are already familiar with our solution

The Onegini MSP takes care of OAuth 2.0 token management between mobile device and server through native mobile SDK's. The solution manages authentication through biometrics or PIN after which an backend API can be requested. A high level picture of this process is shown below (see our docs for a full component overview). 

Read More

CIOReview is a technology magazine that talks about the enterprise solutions that can redefine the business goals of enterprises tomorrow. It is the leading source that shares innovative enterprise solutions developed by established solution providers, upcoming hot enterprises and is a neutral source for technology decision makers.

Read More

Apigee a Google Cloud Platform company and Onegini will cover the security on API level and on mobile level to help you understand what to look for when opening up your data to the outside world and achieve real end-to-end security. 

Read More

In this blog I would like to explain that an enterprise mobility solution (EMM) does not work for consumers apps. Consumer apps are different because you cannot control the device. Instead of focusing on the device security, you need to focus on App security. You do not have any control over the device, so the security needs the be more advanced, layered, end-2-end, to protect your data.

Read More

Donderdag 4 februari 12:00 - 16:00 | Down Under | Ravensewetering 1 | Nieuwegein | Utrecht 

De transformatie naar een digitale samenleving is niets minder dan revolutionair en dwingt bedrijven om een digitale business strategie te definiëren. Een digitale business strategie of digital transformation is meer dan alleen het hebben van een website en het leveren van klantgerichte mobiele apps. Bedrijven moeten digitale technologieën en vaardigheden doorvoeren binnen de gehele onderneming om fundamentele veranderingen aan te brengen in de manier waarop ze waarde toevoegen aan klanten, partners en medewerkers.

Read More
White paper: Digital Transformation Insurance Companies

Stay up to date

Sign up for newsletter