
About Course
Spring Security Fundamentals Are you a Spring Boot developer interested in learning spring security in detail then this course is for you. Are you an experienced spring developer who wants to use OAuth, JWT, and more to secure your web and REST microservices then this course is for you as well?
Security is a very important aspect of every application. Looking at any java/spring developer job posting you will see OAuth, JWT, and more. This course is designed for experienced as well as complete beginners to learn and use spring security.
You will start this course by learning what and why we should Spring Security. You will
- Master the fundamentals of Security
- Learn what and why we should use Spring Security
- Learn the Architectural Component of Spring Security flow
- Understand the Authentication and Authorisation flow
- Secure a Web Application using inbuilt components
- Secure the Web Application using custom components
- Learn the concepts of OAuth
- See OAuth in Action
- Create OAuth Client Applications
- Configure JSON Web Tokens JWT
- CORS CSRF and more in easy steps
Who this Spring Security Fundamentals course is for:
- Students who want to master spring security fundamentals
- Students with knowledge of spring boot
- Students who have taken my spring boot or full-stack courses
Course Content
Spring Security Fundamentals
-
Lesson 1 – The basic contracts in Spring Security architecture
00:00 -
Lesson 19 – Configuring the authorization server to expose the public key
00:00 -
Lesson 20 – Using Keycloak as an authorization server
00:00 -
Lesson 21 – Using the Spring Security DSL method to create the Resource Server
00:00 -
Lesson 22 – Implementing Single Sign On (SSO)
00:00 -
Lesson 23 – Configuring endpoint authorization
00:00 -
Lesson 24 – Authorities, Roles and Matcher methods
00:00 -
Lesson 25 – MVC matchers and ANT matchers
00:00 -
Lesson 26 – Endpoint authorization rules for an OAuth 2 resource server
00:00 -
Lesson 27 – Method authorization configurations
00:00 -
Lesson 28 – Preauthorization, postauthorization, prefiltering and postfiltering
00:00 -
Lesson 29 – Using permissions
00:00 -
Lesson 30 – @Secured and @RolesAllowed
00:00 -
Lesson 31 – Securing reactive apps
00:00 -
Lesson 32 – Building an OAuth 2 reactive resource server
00:00 -
Lesson 18 – Using asymmetric key pairs with JWT
00:00 -
Lesson 17 – Using symmetric keys with JWT
00:00 -
Lesson 16 – Using non-opaque tokens in Spring Security with JWT
00:00 -
Lesson 2 – Implementing the UserDetailsService
00:00 -
Lesson 3 – UserDetailsManager and PasswordEncoder
00:00 -
Lesson 4 – The AuthenticationProvider
00:00 -
Lesson 5 – The filter chain
00:00 -
Lesson 6 – Multiple Authentication Providers Part 1
00:00 -
Lesson 7 – Multiple Authentication Providers Part 2
00:00 -
Lesson 8 – The Security Context
00:00 -
Lesson 9 – (Cross-Site Request Forgery) CSRF
00:00 -
Lesson 10 – (Cross-Origin Resource Sharing) CORS
00:00 -
Lesson 11 – OAuth 2 and Spring Security
00:00 -
Lesson 12 – Deeply understanding the grant types
00:00 -
Lesson 13 – Token implementations in OAuth 2 systems
00:00 -
Lesson 14 – Using Opaque Tokens – Introspection
00:00 -
Lesson 15 – Using Opaque Tokens – Blackboarding
00:00 -
Lesson 33 – Integration testing for Spring Security implementations
00:00
Student Ratings & Reviews
No Review Yet