[go: up one dir, main page]

Nardone et al., 2023 - Google Patents

Configuring Alternative Authentication Providers

Nardone et al., 2023

Document ID
7350210325628993700
Author
Nardone M
Scarioni C
Publication year
Publication venue
Pro Spring Security: Securing Spring Framework 6 and Boot 3-based Java Applications

External Links

Snippet

Abstract One of Spring Security's strongest points is that you can plug different authentication mechanisms into the framework. Spring Security was built to create, as much as possible, a pluggable architecture model where different things can be plugged into the …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
US10484385B2 (en) Accessing an application through application clients and web browsers
US7886352B2 (en) Interstitial pages
Nardone et al. Configuring Alternative Authentication Providers
Nardone et al. JSON Web Token (JWT) Authentication
Scarioni et al. Configuring Alternative Authentication Providers
Tijms et al. Jakarta EE Implementations
Lopez Authentication and Authorization
Katamreddy et al. Securing Web Applications
Lamouchi Adding Anti-Disaster Layers
Nardone Spring Data JDBC and H2 Database
Himschoot Securing Blazor WebAssembly
Modi Terraform Best Practices
Keil Security Frameworks
Gutierrez Security with Spring Boot
Nardone et al. Web Security
Deinum et al. Spring Security
Scarioni et al. Customizing and Extending Spring Security
Soni Securing Your RESTful API Using Spring Security
Freeman Applying ASP. NET Core Identity
Mayank et al. User-Based Authentication for Web Apps
Nardone Securing OAuth2 Authentication Flow
Scarioni et al. Spring Security Architecture and Design
Nardone et al. Open Authorization 2.0 (OAuth 2.0) and Spring Security
Rahim Conception of Authentication and Authorization of Users and Microservices in an Angular, Spring Boot Application Using Keycloak and OAuth2. 0
Scarioni et al. Web Security