Category Archives: Security

Authentication using Actions in Play Framework


Actions plays an important role in Play Framework, the requests received by a Play application are handled by an Action. Action composition is an incredibly powerful way to enhance or restrict controller behaviour. In Play Framework controllers consist of methods that create Action objects … Continue reading

Posted in knoldus, Play Framework, sbt, Scala, Security, Web, web application | Leave a comment

SQL made easy and secure with Slick


Slick stands for Scala Language-Integrated Connection Kit. It is Functional Relational Mapping (FRM) library for Scala that makes it easy to work with relational databases. Slick can be considered as a replacement of writing SQL queries as Strings with a … Continue reading

Posted in database, Scala, Security, Slick, sql, Tutorial | Tagged , , , , , | Leave a comment

Configuring SSH Key Authentication on Linux


Now Days it is very convenient to use Remote Desktop Protocol(RDP) for accessing remote system over Internet, specially server systems(either client to server or server to server), although it is very convenient and easy way to access remote systems but … Continue reading

Posted in AWS, AWS Services, Security, Security Controls, Security Guidelines | Tagged , , , , , , | Leave a comment

Knolx – Intoduction to AWS IAM


Hi all, Knoldus has organized a 30 min session on 3rd March 2017 at 4:50 PM. The topic was Introduction to AWS IAM. Many people have joined and enjoyed the session. I am going to share the slides here. Please let … Continue reading

Posted in Amazon, AWS, Cloud, Scala, Security, Security Controls | 1 Comment

Handling HTTPS requests with Akka-HTTPS Server


Hi guys, In my last blogs I explained how one can create a self-signed certificate and KeyStore in PKCS12. You can go through the previous blog, as we’ll be needing certificate and keystore  for handling HTTPS requests. https://blog.knoldus.com/2016/10/18/create-a-self-signed-ssl-certificate-using-openssl/ https://blog.knoldus.com/2016/10/26/how-to-create-a-keystore-in-pkcs12-format/ Akka-HTTP provides both Server-Side and … Continue reading

Posted in Akka, akka-http, Scala, Security, Security Audit, Security Checklist, Security Controls, Security Guidelines | Tagged , , , , , , , , , , , , , , , , , , , | 4 Comments

How to create a KeyStore in PKCS12 Format.


In my last blog I explained how to create a self-signed SSL certificate. You can go through the previous blog and generate the certificate and private key as we’ll be needing it for creating a KeyStore. Create a self-signed SSL … Continue reading

Posted in Scala, Security, Security Controls | Tagged , , , , , , , , , , , , , , | 7 Comments

Create a self-signed SSL Certificate using OpenSSL.


In this blog I’ll be giving a little bit of insight on SSL certificates and then how to create a self-signed certificate using OpenSSL. Let’s start with  “What is an SSL Certificate?“ SSL stands for Secure Socket Layer. SSL is a … Continue reading

Posted in Scala, Security | Tagged , , , , , , , , , , , , | 7 Comments

Integrate JWT with Akka HTTP


In this article we will discuss about , how to implement  authentication or authorization in Akka HTTP routes using JWT . As we know Akka HTTP is full implementation of  server  and client side HTTP stack on top Akka actor and … Continue reading

Posted in Akka, akka-http, integration, Integration testing in play framework, JWT, sbt, Scala, scalatest, Security | 3 Comments

How to build secure Web Application


We all use web applications everyday whether we consciously know it or not. That is, all of us who browse the web. Now a days we have seen a significant surge in the amount of web application specific vulnerabilities that are disclosed to … Continue reading

Posted in Scala, Security, Security Audit, Security Checklist, Security Controls, Security Guidelines, web application | Leave a comment

Vulnerability scanning with metasploit


Hola!! As you all aware of that vulnerabilities can cost you much more and as a developer you don’t need your website to have vulnerabilities (at least I am 😛 ). And for testing for loopholes in your application can be painful, … Continue reading

Posted in Scala, Security, Vulnerability Scanning | Tagged , , , , , , | 3 Comments