AES, DES, Blowfish with digest or salt, md5 … sometimes these terms can drive you crazy when you must encrypt your data. In this post I’d like to make a few order to help you make the right choice in the right direction.
Continue reading “Data encryption and decryption – make the right choice”
Connect an OAuth Client to a server using Spring OAuth2 library is a lightweight way to get information from third part where this protocol is available.
In this post I’ll show you how to make it using few configurations and code files.
Continue reading “Spring boot Oauth2 – Client”
In this article I’m going to illustrate the implementation of Spring boot security Oauth2 from both the server and the client side. The example uses NoSQL Db as MongoDB, a choice that I think it’s optimal for this solution.
Continue reading “Spring boot Oauth2 with MongoDb e custom authentication”
Have you ever thought of using your voice instead of plain text string to get authenticated?
It’s not science fiction, it’s called biometric authentication and, some company as Google, are going to moving on in the next years.
In this article, I’m going to illustrate it using an open source library and a little example.
Continue reading “Sample of Voice Authentication”
A short summer article about the asymmetric key pairs in order to guarantee an encrypted communication between two endpoints.
I’ll show the main steps to achieve this aim using jdk tool (keytool) and a short java example.
Continue reading “5 minutes with – Asymmetric Key”
In this article I’ll show how to develop a solution that uses OAuth2 as authentication protocol with Authorization code during the flow process.
Spring Framework has been used as backbone of the solution and the user’s token generated have been persisted in a MySQL Database.
Continue reading “Spring Oauth2 with Authorization Code”
Continuing from my previous post, I’ll show the client integration to a CAS Authentication service using a little example. It will show how calling the authentication and how verify user credentials once authenticated.
Continue reading “Cas and Spring Security – Client”