InfoQ Homepage Presentations Securing OAuth 2.0 Resources in Spring Security 5
Securing OAuth 2.0 Resources in Spring Security 5
Summary
Josh Cummings and Joe Grandja take a look at two insecure applications--one a web application and the other a REST API--and integrate them both with an OAuth 2.0 Authorization Server.
Bio
Josh Cummings is Principal Software Engineer, Pivotal. Joe Grandja is Staff Software Engineer, Pivotal.
About the conference
Pivotal Training offers a series of hands-on, technical courses prior to SpringOne Platform. Classes are scheduled two full days before the conference and provide you and your team an opportunity to receive in-depth, lab-based training across some of the latest Pivotal technologies.
This content is in the Java topic
Related Topics:
Sponsored Content
-
Related Editorial
-
Related Sponsors
-
Popular across InfoQ
-
AWS Introduces ECS Managed Instances for Containerized Applications
-
GitHub Introduces New Embedding Model to Improve Code Search and Context
-
Google DeepMind Introduces CodeMender, an AI Agent for Automated Code Repair
-
Building Distributed Event-Driven Architectures across Multi-Cloud Boundaries
-
OpenAI Adds Full MCP Support to ChatGPT Developer Mode
-
Mental Models in Architecture and Societal Views of Technology: A Conversation with Nimisha Asthagiri
-