Effective OAuth2 with Spring Security 5 and Spring Boot
Securing your application with OAuth2, OIDC and JWT in your application can seem like a daunting task. In this course you will learn how to leverage Spring Security with Spring Boot to quickly and effectively do all the heavy lifting for you.
Securing your application with OAuth2, OIDC and JWT doesn’t have to be difficult. In this course, Effective OAuth2 with Spring Security 5 and Spring Boot, you will gain the ability to effectively leverage the framework to quickly and effectively do the heavy lifting for you. First, you will learn the essentials of OAuth2, OpenID Connect and JSON Web Token standards so you can correctly leverage Spring Security to add social sing-in to you existing application. Next, you will discover options on how to implement an Authorization Server so that you can completely decouple user authentication from you application code. Finally, you will explore more advanced topics on how to tailor the framework to your unique security requirements and the various patterns you can leverage to secure distributed systems such as microservices. When you are finished with this course, you will have the skills and knowledge of OAuth2 support in Spring Security needed to leverage OAuth2, OIDC and JWT in modern distributed applications.
Author Name: Wojciech Lesniak
Author Description:
Wojciech is a Technical Lead and Scrum Master. He has over 15 years’ experience in software development working in a variety of industries from financial services and online gaming. He has extensive experience with anything Java, Spring framework, Microservices and has a passion for developing secure and scalable applications.
Table of Contents
- Course Overview
1min - Spring Security OAuth2: The New Direction
33mins - Server-side Applications: Single Sign-in with OAuth2
40mins - Delegating Authentication to an Authorization Server
30mins - OAuth2 in a Client-side Single Page Application
19mins - OAuth2 for Machine-to-machine Authorization
31mins - Enhancing with Customizations, Validation, and Exception Handling
12mins - Layering Scoped-based Authorization
22mins
There are no reviews yet.