![]() Depending on the configuration, each layer can help to create the authentication object for web request with basic authentication, digest authentication, form authentication or any custom method of authentication. The first step was done in a multi-layer Security Filter. In overall, Spring Security authentication includes 2 steps, creating an authentication object for each request and applying authorization check depending on authentication. Spring Security OAuth 2 is an implementation of OAuth 2 that built on top of Spring Security, which itself is a very extensible authentication framework. We focus on OAuth 2 and JWT because they are the most popular authentication framework and protocol in the market. In general, OAuth 2 is useful when you need to allow other people to build front end app for you services. We will not go to detail when you may want to use OAuth 2 and JWT. However, we will focus on understanding the principal of the OAuth 2 request. This sample was developed partly based on the official sample of Spring Security OAuth 2. In this example, we will JSON Web Token (JWT) as the format of the OAuth 2 token. Today, let explore another popular use case of setting up OAuth 2 authentication for a Spring Boot application. Sometimes ago, we published one article sharing a custom approach to implementing stateless session in the cloud environment. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |