Skip to content

rishighai97/spring-security-by-code-examples

Repository files navigation

spring-security-by-code-examples

Code examples following spring security playlist by Laurentiu Spilca

Index

Chapter Category Topic
1 Authentication Implementing UserDetailsService and PasswordEncoder
2 Authentication Implementing our own UserDetailsService getting user from MySQL
3 Authentication Configuring JdbcUserDetailsManager and BCrypt Password Encoder with an endpoint to add user to database
4 Authentication Implementing our Custom Authentication Provider that does UsernamePasswordAuthentication provided by HttpBasic Authentication Filter
5 Authentication Custom authentication filter implementation
6 Authentication Multiple Authentication Providers Part 1
7 Authentication Multiple Authentication Providers Part 2
8 Authentication Security Context and it's 3 modes
9 Authentication CSRF: Cross-Site Request Forgery Vulnerability
10 Authentication CORS (Cross Origin Resource Sharing)
11 OAuth2 Authentication OAuth2: Create a custom authorization server
12 OAuth2 Authentication OAuth2: Deeply understanding the grant types
13 OAuth2 Authentication Validating opaque tokens on resource server (3 scenarios)
14 OAuth2 Authentication Validating opaque tokens via Token Introspection
15 OAuth2 Authentication Validating opaque tokens via blackboarding database
16 OAuth2 Authentication Using non-opaque tokens in Spring Security using JWT
17 OAuth2 Authentication Using symmetric/synchronous keys with JWT (password/authorization grant type)
18 OAuth2 Authentication Using asymmetric/asynchronous key pairs with JWT (password/authorization grant type)
19 OAuth2 Authentication Configuring the authorization server to expose the public key
20 OAuth2 Authentication Using Keycloak as an authorization server
21 OAuth2 Authentication Using DSL (new) method to implement the resource server
22 OAuth2 Authentication Implementing Single Sign On (SSO) using github as authorization server
23 Authorization Configuring endpoint authorization
24 Authorization Authorities, Roles and Matcher methods
25 Authorization MVC matchers and ANT matchers
26 Authorization Endpoint authorization rules for an OAuth 2 resource server
27 Authorization Method authorization configurations
28 Authorization Preauthorization, postauthorization, prefiltering and postfiltering
29 Authorization Using Permissions
30 Authorization @Secured and @RolesAllowed
31 Reactive Securing reactive apps
32 Reactive Building an oauth2 reactive resource server
33 Testing Integration testing for Spring Security implementations - Part 1
34 Testing Integration testing for Spring Security implementations - Part 2

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published