In this article I’m going to illustrate the implementation of Spring boot security Oauth2 from both the server and the client side. The example uses NoSQL Db as MongoDB, a choice that I think it’s optimal for this solution.
Have you ever thought of using your voice instead of plain text string to get authenticated?
It’s not science fiction, it’s called biometric authentication and, some company as Google, are going to moving on in the next years.
In this article, I’m going to illustrate it using an open source library and a little example.
A short summer article about the asymmetric key pairs in order to guarantee an encrypted communication between two endpoints.
I’ll show the main steps to achieve this aim using jdk tool (keytool) and a short java example.
In this article I’ll show how to develop a solution that uses OAuth2 as authentication protocol with Authorization code during the flow process.
Spring Framework has been used as backbone of the solution and the user’s token generated have been persisted in a MySQL Database.
Spring Security supports a lot of different authentication systems. One of that is the central authentication service (CAS) which allows the users to authenticate in a Web Application (or different Web Applications) using a unique central service.
In this article, I’ll show the integration of the CAS with Spring security framework. As usual, by using an example.
What can you use when you’ve to let the access of protected resources by a third part application? The Open Authentication standard (briefly OAuth) is useful in order to authenticate and authorize user credentials from an external application and grant the access of your resources.