You will need to understand the basic concepts of Spring Security, as covered in Module 1. We use REST extensively, although you only need a basic familiarity with it.
Having problems? check the errata for this course.
1 |
Introduction |
Preview
21m 18s |
|
In this course we will be using the CRM system from the Spring Remoting course. You don't need experience of REST, this chapter will explain how to set the system up. | |||
2 |
Securing a REST Webservice |
Watch
44m 17s |
|
Adding security to REST is really a case of applying standard Spring Security. We'll use Basic Authentication in this chapter. | |||
3 |
An Overview of OAuth |
Watch
41m 52s |
|
OAuth is not the easiest to understand - in this chapter a very basic (and simplified) overview of OAuth 2. | |||
4 |
The Authorization Code Grant Type - Leg 1 |
Watch
32m 40s |
|
We will implement a full OAuth 2 process - this is the first section where the user (resource owner) authenticates and authorizes. | |||
5 |
The Authorization Code Grant Type - Leg 2 |
Watch
32m 15s |
|
In Leg 2, we need to authenticate the client | |||
6 |
The Authorization Code Grant Type - Leg 3 |
Watch
37m 26s |
|
And in Leg 3, we finally grant access to the resources | |||
7 |
The OAuthRestTemplate |
Watch
22m 2s |
|
This template improves the client's code dramatically! | |||
8 |
Additional Scopes |
Watch
35m 53s |
|
A feature of OAuth is that you can define fine grained scopes - in this chapter we will add a "write" scope. | |||
9 |
Other Grant Types |
Watch
41m 5s |
|
There are other, less secure grant types available in OAuth. When should you use them? We also implement one of the grant types in our project. | |||
10 |
HTTPs (TLS/SSL) |
Watch
55m 17s |
|
How to encrypt the traffic using HTTPs. This is hard work but an essential step. | |||
11 |
Module Summary |
Watch
4m 11s |
|
A preview of what is coming up in Module 3 of this series. | |||
12 |
Bonus Chapter - JavaConfig for Security |
Watch
66m 15s |
|
This bonus chapter has been borrowed from our JavaConfig module - it shows how to use JavaConfig to configure the security aspects of your application, including OAuth. |