Skip to main content

GSoC 2015 - In a nutshell

GSoC 2015 - In a nutshell

I got the opportunity this summer(well it summer all year in Sri Lanka) to take part in Google Summer of Code. My project was to implement the User Managed Access 1.0 specification for WSO2 Identity Server. Though I wanted to blog about the project as the project went along, I did really make it a reality. They say it's never too late to share some experience.

First of all I need to thank my mentors Johann Nallathamby and Prabath Siriwardena for their absolute support to make this project a reality. Johann in particular has been helpful all the way bearing my late night calls and chats to clarify and provide feedback. The overall experience of participating in GSoC was simply "awesome".

Its my first considerable contribution to an open source project. And the experience gathered during the past three months have been priceless. There were sleepless nights where i could not get things to work missing out on trivial things, other days where i notched up hard things in no time. I learned to steer a project through all these phases effectively. Most importantly i learnt to improve myself each day.

Feedback is the key to doing something right. I was sincere in troubling my mentors for feedback and luckily for me they enjoyed it too. I was an intern at WSO2, therefore i did setting up and rolling on with the project. It took me sometime to get started with the final year starting to heat up at the uni. But once it kick started it really took off.

The most highlighting part of this whole thing was that i got to meet lot of people, offline... of course. But it was amazing to see how helpful people were(I know that feel bro...). I mean it was fun to discuss things with people who shared similar interests as you and of course with completely opposite views as well. Anyways I would say it was one of those awesome things you do without you actually realizing it.

As for the details of my project and it implementation, I hope to write some posts very soon(hopefully). Sorry for the typos - I really typed this up in a hurry to savour the moment.  

Comments

Post a Comment

Popular posts from this blog

OAuth - Playing Ping Pong for Authorization

You probably would have heard the word OAuth more than a few times. Ever wondered what that is? do we use that at all?. Guess what we make use of OAuth almost everyday.I got the opportunity to learn about OAuth during my time at WSO2 Identity Server team. Here's the first step of conquering OAuth :) What Exactly is OAuth? Let me start with OAuth,  OAuth solves the problem of allowing third party entities( eg: applications) to access a resource owner's protected resources without actually giving away your valuable credentials like passwords.  Let's think of it this way. You have a facebook account(Assuming you have one :P) which is your protected resource and you are the resource owner . Now you get a little high and decide to try out one of these fancy Facebook apps that finds your soul mate. The app now becomes the third party application which requires access to read out your friend list from your profile which is the protected resource. Suppose you don't ...

Configuring WSO2 Identity Server to return Attribute Profile claims in SAML SSO Response

Configuring SAML SSO for an external Service Provider with WSO2 Identity Server is probably one of the most common use cases I heard from my day 1 at WSO2. Setting up is quite easy, Just follow the docs here . Now let me start from there, what if someone wants to retrieve certain claims of a user in the SAML Response. How easy is it to configure that? Well, Let me show you :) Step 1 Assuming that you have setup a Service Provider in Identity Server by following the docs, you should have a configuration like the one below, The most important part of this config is the " Enable Attribute Profile " tick, that allows you to get a set of pre-configured claims in the SAML response. Be sure to have it ticked. Step 2 Now your are done with Step 1, In Step 2 you simply configure the claims that you want to be returned in the SAML response. To do this, Go to the " Claim Configuration " section of the service provider, Now click on " Add Claim ...