This course covers authentication and authorization within web applications in Java Enterprise security. Security is a vast concept with many aspects. In particular, we'll focus on the security of applications and the data they contain, an area that is known as information security.
We will start by identifying our end users and dive deep into the differences between encoding, encryption, and hashing techniques. After that, we will learn to propagate information with microservices architecture.
By the end of this course, you'll have hands-on experience with the integration and configuration of OAuth2 and OpenID Connect into the Java application.
This course covers authentication and authorization within web applications in Java Enterprise security. Security is a vast conc...Show More
WHAT YOU'LL LEARN
An understanding of encoding, encryption, and hashing
The ability to propagate permission information within a microservice architecture
A working knowledge of OAuth2 and OpenID Connect
Hands-on practice with integrating OAuth2 and OpenID Connect
An understanding of encoding, encryption, and hashing
Show more
TAKEAWAY SKILLS
Content
1.
Before We Begin
1 Lessons
Get familiar with Java enterprise security concepts, practices, and standards using Java, Maven, and Payara Micro.
2.
Introduction
2 Lessons
Look at key concepts of Java Enterprise security and software requirements for Payara Micro.
3.
Concepts
3 Lessons
Explore key security concepts: authentication, authorization, encoding, encryption, and hashing.
4.
Window Shopping
7 Lessons
Enhance your skills in implementing and integrating Basic authentication and encoding techniques in Jakarta EE.
5.
Authentication Methods
8 Lessons
Take a closer look at implementing various authentication methods in JakartaEE, including OAuth2 and OpenID Connect integration.
6.
Standards
4 Lessons
Investigate Java EE standards, IdentityStore, authentication mechanisms, roles, and permissions in security.
7.
Authentication Data Stores
6 Lessons
Master the steps to configure secure authentication mechanisms using LDAP, databases, and form-based methods.
8.
Secure Data Transfer
8 Lessons
Step through implementing JWT for secure data transfer, authentication, and endpoint calls.
Certificate of Completion
Showcase your accomplishment by sharing your certificate of completion.
Course Author:
Developed by MAANG Engineers
Trusted by 2.8 million developers working at companies
"These are high-quality courses. Trust me. I own around 10 and the price is worth it for the content quality. EducativeInc came at the right time in my career. I'm understanding topics better than with any book or online video tutorial I've done. Truly made for developers. Thanks"
Anthony Walker
@_webarchitect_
"Just finished my first full #ML course: Machine learning for Software Engineers from Educative, Inc. ... Highly recommend!"
Evan Dunbar
ML Engineer
"You guys are the gold standard of crash-courses... Narrow enough that it doesn't need years of study or a full blown book to get the gist, but broad enough that an afternoon of Googling doesn't cut it."
Software Developer
Carlos Matias La Borde
"I spend my days and nights on Educative. It is indispensable. It is such a unique and reader-friendly site"
Souvik Kundu
Front-end Developer
"Your courses are simply awesome, the depth they go into and the breadth of coverage is so good that I don't have to refer to 10 different websites looking for interview topics and content."
Vinay Krishnaiah
Software Developer
Hands-on Learning Powered by AI
See how Educative uses AI to make your learning more immersive than ever before.
AI Prompt
Code Feedback
Explain with AI
AI Code Mentor
Free Resources