OAuth2

HttpInvoker over OAuth2 with Spring Boot 2.2

Ok, so HttpInvoker may not be the what the hipsters are using (it’s been around since 2003 or so) but there are still plenty of Java desktop applications out there communicating over RMI or EJB that could use a security boost by using OAuth2.

Back to Top ↑

OpenID Connect

Back to Top ↑

Tutorial

Back to Top ↑

Keycloak

Back to Top ↑

Reactive

Back to Top ↑

Webflux

Back to Top ↑

React

Back to Top ↑

TypeScript

Back to Top ↑

Spring Boot

Back to Top ↑

R2DBC

Back to Top ↑

Microservices

Back to Top ↑

Hooks

Back to Top ↑

Spring Security

HttpInvoker over OAuth2 with Spring Boot 2.2

Ok, so HttpInvoker may not be the what the hipsters are using (it’s been around since 2003 or so) but there are still plenty of Java desktop applications out there communicating over RMI or EJB that could use a security boost by using OAuth2.

Back to Top ↑

Create React App

Back to Top ↑

JHipster

Back to Top ↑

Spring Framework

HttpInvoker over OAuth2 with Spring Boot 2.2

Ok, so HttpInvoker may not be the what the hipsters are using (it’s been around since 2003 or so) but there are still plenty of Java desktop applications out there communicating over RMI or EJB that could use a security boost by using OAuth2.

Back to Top ↑

RMI

HttpInvoker over OAuth2 with Spring Boot 2.2

Ok, so HttpInvoker may not be the what the hipsters are using (it’s been around since 2003 or so) but there are still plenty of Java desktop applications out there communicating over RMI or EJB that could use a security boost by using OAuth2.

Back to Top ↑

Swing

HttpInvoker over OAuth2 with Spring Boot 2.2

Ok, so HttpInvoker may not be the what the hipsters are using (it’s been around since 2003 or so) but there are still plenty of Java desktop applications out there communicating over RMI or EJB that could use a security boost by using OAuth2.

Back to Top ↑

Spring Cloud Gateway

Back to Top ↑

Jenkins X

Back to Top ↑

Kubernetes

Back to Top ↑

DevOps

Back to Top ↑

JWT

Back to Top ↑

Authorization

Back to Top ↑

Permissions

Back to Top ↑

Roles

Back to Top ↑

Identity

Back to Top ↑

Authentication

Back to Top ↑

MongoDB

Back to Top ↑

NestJS

Back to Top ↑