Integration of Stir/Shaken into Asterisk

As deadlines for Stir/Shaken are just around the corner even other countries are considering to introduce Stir/Shaken or similar methods. As we offer a broad range of Fraud Mitigation and Stir/Shaken APIs you can find below an example macro for Asterisk to integrate CodeB’s Stir/Shaken API. Note: Please do not forget to replace the string … Read more

Enhancing Legacy Applications with Single Sign-On (SSO) and Multi-Factor Authentication (MFA)

There existed a period where the amalgamation of usernames and passwords was deemed sufficient to safeguard software applications against unauthorized access. However, it is evident that the realm of security is in a state of perpetual evolution, compelling enterprises to stay abreast with avant-garde solutions. For businesses utilizing antiquated systems, the risks are significantly more … Read more

CodeB CommandLine Interface (CLI)

For testing purposes we created an easy to use CommandLine Interface (CLI) to interact with the CodeB WebSocket API. Contact us in case you are interested to try it out! The CodeB CLI support verbs (such as ping, add and check) with various options and parameters. It displays help messages if you call it with … Read more

STIR/SHAKEN and CLI Spoofing Mitigation

STIR/SHAKEN is a framework of interconnected standards. STIR/SHAKEN are acronyms for the Secure Telephone Identity Revisited (STIR) and Signature-based Handling of Asserted Information Using toKENs (SHAKEN) standards. This means that calls traveling through interconnected phone networks would have their caller ID “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. … Read more

Use CodeB SSI as OIDC Identity Provider for NextCloud

The Self-Sovereign Identity System of CodeB does not only support W3C DID’s but comes also with an inbuilt OpenID Connect (OIDC) Identity Provider. OpenID Connect meets distributed Self-Sovereign Identities. Integration of the Identity Provider into existing systems is extremely easy. In this article we use NextCloud as an example. To configure WordPress is explained HERE. … Read more

OpenID Connect meets distributed Self-Sovereign Identities

Self-Sovereign Identity (SSI) emerged with the rise of blockchain technology. This paradigm focuses on user-centricity and strives to place the user in full control of the digital identity. It is a concept in the digital movement that only the user should own their identity data fully without intervention from outside administration. By using a Self-Sovereign … Read more

Principal Account

To be able to carry out blockchain transactions you need a public-/private keypair. The hash of the public key is the address and also called principal account. Mnemonic Phrase A mnemonic phrase aids information retention or retrieval (remembering) in the human memory. In connection with a principal account the Mnemonic Phrase is a list of … Read more

Bearer Token Generation

A Bearer Token (RFC 6750) is a cryptic string, usually generated by the server in response to a login request. It contains a subject claim (sub) which references an authorized entity (i.e., the User, Application or Organization). The authorized entity uses a signed bearer authorization token to access one or more resources for which the … Read more

Capabilities Matrix

The Capabilities Matrix is made of Verifiable Claims with a special syntax for the “ClaimType“. When using a dot notation for the ClaimType number (like OIDs) a claim becomes an entry in the Capabilities Matrix. For example number 1.1, 1.4.5, 2.1343.1, etc. The Capabilities Matrix can also be used for Commercial Attributes. Up to 7 … Read more