Nardone et al., 2023 - Google Patents
Configuring Alternative Authentication ProvidersNardone et al., 2023
- Document ID
- 7350210325628993700
- Author
- Nardone M
- Scarioni C
- Publication year
- Publication venue
- Pro Spring Security: Securing Spring Framework 6 and Boot 3-based Java Applications
External Links
Snippet
Abstract One of Spring Security's strongest points is that you can plug different authentication mechanisms into the framework. Spring Security was built to create, as much as possible, a pluggable architecture model where different things can be plugged into the …
- 230000007246 mechanism 0 abstract description 8
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10484385B2 (en) | Accessing an application through application clients and web browsers | |
| US7886352B2 (en) | Interstitial pages | |
| Nardone et al. | Configuring Alternative Authentication Providers | |
| Nardone et al. | JSON Web Token (JWT) Authentication | |
| Scarioni et al. | Configuring Alternative Authentication Providers | |
| Tijms et al. | Jakarta EE Implementations | |
| Lopez | Authentication and Authorization | |
| Katamreddy et al. | Securing Web Applications | |
| Lamouchi | Adding Anti-Disaster Layers | |
| Nardone | Spring Data JDBC and H2 Database | |
| Himschoot | Securing Blazor WebAssembly | |
| Modi | Terraform Best Practices | |
| Keil | Security Frameworks | |
| Gutierrez | Security with Spring Boot | |
| Nardone et al. | Web Security | |
| Deinum et al. | Spring Security | |
| Scarioni et al. | Customizing and Extending Spring Security | |
| Soni | Securing Your RESTful API Using Spring Security | |
| Freeman | Applying ASP. NET Core Identity | |
| Mayank et al. | User-Based Authentication for Web Apps | |
| Nardone | Securing OAuth2 Authentication Flow | |
| Scarioni et al. | Spring Security Architecture and Design | |
| Nardone et al. | Open Authorization 2.0 (OAuth 2.0) and Spring Security | |
| Rahim | Conception of Authentication and Authorization of Users and Microservices in an Angular, Spring Boot Application Using Keycloak and OAuth2. 0 | |
| Scarioni et al. | Web Security |