Spring Security in Action

Spring Security in Action

May 18, 2021 0 By Allitebook

Book Name: Spring Security in Action
Author: Laurentiu Spilca
ISBN-10: 1617297739
Year: 2020
Pages: 560
Language: English
File size: 21.2 MB
File format: PDF

Spring Security in Action Book Description:

Spring Safety in Action shows you how you can stop cross-site scripting and request forgery attacks before they do harm. You will begin with the basics, mimicking password updates and adding numerous types of authorization. As your skills increase, you accommodate Spring Security to new architectures and create innovative OAuth2 configurations. By the time you’re finished, you’ll have a customized Spring Security configuration that protects against threats both ordinary and extraordinary.

Summary

While creating secure applications is critically important, it can also be tiresome and time consuming to sew together the required set of tools. For Java developers, the strong Spring Security framework makes it easy for you to bake security into your software from the very beginning. Filled with code samples and functional examples, Spring Security in Action teaches you how you can secure your programs from the most frequent threats, ranging from injection strikes to lackluster observation. In it, you’ll find out how to manage system users, configure secure endpoints, and use OAuth2 and OpenID Join for authentication and authorization.

Buy of the print book contains a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

Concerning the technology

Security is non-negotiable. You rely on Spring applications to transmit data, verify credentials, and avoid attacks.

About the book

You will start with the basics, simulating password upgrades and adding numerous kinds of authorization. As your skills grow, you’ll accommodate Spring Security to new architectures and create innovative OAuth2 configurations. By the time you’re finished, you’ll have an customized Spring Security configuration that protects against threats both common and extraordinary

What’s inside

  • Encoding passwords and authenticating users
  • Securing endpoints
  • Automating security testing
  • Setting up a standalone authorization server

About the reader

For experienced Java and Spring developers.

About the author

Laurentiu Spilca is a dedicated development lead and trainer at Endava, with over ten years of Java experience.

Table of Contents

PART 1 – FIRST STEPS

1 Security Today

2 Hello Spring Security

PART 2 – IMPLEMENTATION

3 Managing users

4 Dealing with passwords

5 Implementing authentication

6 Hands-on: A small secured web application

7 Configuring authorization: Restricting access

8 Configuring authorization: Applying restrictions

9 Implementing filters

10 Applying CSRF protection and CORS

11 Hands-on: A separation of responsibilities

12 How does OAuth 2 work?

13 OAuth 2: Implementing the authorization server

14 OAuth 2: Implementing the resource server

15 OAuth 2: Using JWT and cryptographic signatures

16 Global method security: Pre- and postauthorizations

17 Global method security: Pre- and postfiltering

18 Hands-on: An OAuth 2 application

19 Spring Security for reactive apps

20 Spring Security testing

Download PDF    Buy Hardcopy