Spring Security

young business people working with digital tablet while discussing together in conference room

Spring Boot Rest Authentication with JWT

Reading Time: 6 minutes In this tutorial, we will create a simple Spring boot application that uses the JWT authentication to protect a REST API. For this, we use Spring security and web configuration for the token generation. In this, we create an example that uses the REST POST/GET API to generate the JWT token, and the user who has the valid token they only have able to access Continue Reading

JWT

Reading Time: 3 minutes JWT stands for JSON Web Token. It is basically used to transform some information between two parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with HMAC algorithm) or a public/private key pair using RSA. JWT is very compact in size, we can send it through the HTTP header, Post parameter, etc. It’s Continue Reading

Spring Security: How it works internally

Reading Time: 5 minutes Definition Spring Security is a framework provided by Spring that helps to customize an access and authentication process. It plays a very crucial role in terms of securing the applications. Spring Security, mainly focuses on authentication and authorization to provide all benefits to java applications. It is very helpful and provides an easy approach to apply in real projects. And, permits to do custom modifications Continue Reading