Tag: OAuth
-
Authenticating with Amazon Cognito Using Spring Security
1. Introduction In this tutorial, we will look at how we can use Spring Security‘s OAuth 2.0 support to authenticate with Amazon Cognito. …
-
A Bootiful Podcast: Interview With Sree Tummidi, Senior Product Manager for Security at Pivotal
Hi, Spring fans! This week, I’m excited to welcome Sree Tummidi, a senior product manager working at the intersection of application …
-
Handle Security in Zuul, with OAuth2 and JWT
1. Introduction Simply put, a microservice architecture allows us to break up our system and our API into a set of self-contained services, …
-
JSON Web Encryption (JWE) in .NET Core
A signed JSON Web Token (JWT) is one of the most useful and common constructs you’ll see floating around modern security systems. These …
-
Guide to Integrating OKTA OAuth 2.0 OIDC With Mulesoft API Anypoint Platform
What Is OAuth 2.0 OIDC? OIDC (Open ID Connect) is an identity layer on the top of the OAuth 2.0 protocol. It allows clients to verify the identity of the End User on the authentication performed …
-
Countering threats: Steps to take when developing APIs
High profile data breaches resulting from faulty APIs continue to make headlines. In the last few months alone, T-Mobile’s data breach …
-
Secure Spring REST API Using OAuth2
Let’s secure our Spring REST API with OAuth2 + PostgreSQL. We will store user credentials in the PostgreSQL database and client …
-
How to Configure an OAuth2 Authentication With Spring Security (Part 1)
As you might have noticed in my previous blog posts, I am a big fan of Spring + Java and Spring + Kotlin. Consequently, whenever I need to …
●●●