Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Spring Boot 3.0

You're reading from   Mastering Spring Boot 3.0 A comprehensive guide to building scalable and efficient backend systems with Java and Spring

Arrow left icon
Product type Paperback
Published in Jun 2024
Publisher Packt
ISBN-13 9781803230788
Length 256 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Ahmet Meric Ahmet Meric
Author Profile Icon Ahmet Meric
Ahmet Meric
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Part 1: Architectural Foundations
2. Chapter 1: Introduction to Advanced Spring Boot Concepts FREE CHAPTER 3. Part 2: Architectural Patterns and Reactive Programming
4. Chapter 2: Key Architectural Patterns in Microservices – DDD, CQRS, and Event Sourcing 5. Chapter 3: Reactive REST Development and Asynchronous Systems 6. Part 3: Data Management, Testing, and Security
7. Chapter 4: Spring Data: SQL, NoSQL, Cache Abstraction, and Batch Processing 8. Chapter 5: Securing Your Spring Boot Applications 9. Chapter 6: Advanced Testing Strategies 10. Part 4: Deployment, Scalability, and Productivity
11. Chapter 7: Spring Boot 3.0 Features for Containerization and Orchestration 12. Chapter 8: Exploring Event-Driven Systems with Kafka 13. Chapter 9: Enhancing Productivity and Development Simplification 14. Index 15. Other Books You May Enjoy

Implementing OAuth2 and JWT

Moving on with the topic of application security, we will now discuss some of the more advanced mechanisms that cater to a changing environment. This brings us to two important technologies: OAuth2 and JWT. Both of them are critical players in improving security configurations for modern applications; however, both have different roles and complement each other to achieve the overall bigger picture of secure authentication and authorization.

In subsequent sections, we provide details of how to set up OAuth2 for Keycloak. We detail the configuration of OAuth2 for Keycloak, followed by the required code snippets. We will use Keycloak, an open source platform with full support for OAuth2 off-the-shelf protocols and extensive abilities to be customized, to provide Identity and Access Management (IAM).

Configuring OAuth2 with Keycloak

Going a step further into the realm of advanced security, one of the key steps in increasing the security of your application...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image