Spring Security - Badr Nasslahsen

Spring Security

Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures

(Autor)

Buch | Softcover
623 Seiten
2024 | 4th Revised edition
Packt Publishing Limited (Verlag)
978-1-83546-050-4 (ISBN)
47,35 inkl. MwSt
Leverage the power of Spring Security 6 to protect your modern Java applications from hackers

Key Features

Architect solutions that leverage Spring Security while remaining loosely coupled
Implement authentication and authorization with SAML2, OAuth 2, hashing, and encryption algorithms
Integrate Spring Security with technologies such as microservices, Kubernetes, the cloud, and GraalVM native images
Purchase of the print or Kindle book includes a free PDF eBook

Book DescriptionKnowing that experienced hackers are constantly on the prowl to attack your apps can make security one of the most challenging concerns of creating an app. The complexity of properly securing an app is compounded when you must also integrate this factor with legacy code, new technologies, and other frameworks. This book will help you easily secure your Java apps with Spring Security, a trusted and highly customizable authentication and access control framework.
The book starts by showing you how to implement a variety of authentication mechanisms before demonstrating how to properly restrict access to your app. You’ll then cover tips for integrating Spring Security with some popular web frameworks. The book also features an example of how Spring Security defends against session fixation, moves into concurrency control, and how you can use session management for administrative functions. This fourth edition aligns with Java 17/21 and Spring Security 6, covering advanced security scenarios for RESTful web services and microservices. This ensures you gain a complete understanding of the issues surrounding stateless authentication and discover a concise approach to solving those issues.
By the end of this book, you’ll be able to integrate Spring Security 6 with GraalVM native images in a seamless manner, from start to finish.What you will learn

Understand common security vulnerabilities and how to resolve them
Implement authentication and authorization and learn how to map users to roles
Integrate Spring Security with LDAP, Kerberos, SAML 2, OpenID, and OAuth
Get to grips with the security challenges of RESTful web services and microservices
Configure Spring Security to use Spring Data for authentication
Integrate Spring Security with Spring Boot, Spring Data, and SPA applications
Discover how to easily build GraalVM native images

Who this book is forIf you’re a Java web developer or an architect with fundamental knowledge of Java 17/21, web services, and the Spring Framework, this book is for you. No previous experience with Spring Security is needed to get started with this book.

Badr Nass Lahsen is a lead security and cloud architect with over 17 years of experience. He holds an executive master's degree from Ecole Centrale Paris and an engineering degree from Telecom SudParis. He is an Oracle Certified Java SE 11 Professional, CISSP, TOGAF, CKA, and Scrum master. Badr has extensive experience in public cloud providers: AWS, Azure, GCP, Oracle, and IBM. He is also the author of the springdoc-openapi project.

Table of Contents

Anatomy of an Unsafe Application
Getting Started with Spring Security
Custom Authentication
JDBC-based Authentication
Authentication with Spring Data
LDAP Directory Services
Remember-me Services
Client Certificate Authentication with TLS
Opening up to OAuth 2
SAML 2 Support
Fine-Grained Access Control
Access Control Lists
Custom Authorization
Session Management
Additional Spring Security Features
Migration to Spring Security 6
Microservice Security with OAuth 2 and JSON Web Tokens
Single Sign-On with the Central Authentication Service
Build GraalVM Native Images
Appendix – Additional Reference Material

Erscheinungsdatum
Verlagsort Birmingham
Sprache englisch
Maße 191 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Programmiersprachen / -werkzeuge
Informatik Software Entwicklung SOA / Web Services
Mathematik / Informatik Informatik Web / Internet
ISBN-10 1-83546-050-X / 183546050X
ISBN-13 978-1-83546-050-4 / 9781835460504
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95