[go: up one dir, main page]

0% found this document useful (0 votes)
26 views1 page

Securing Microservices Course Content

The document provides a comprehensive overview of securing microservices using Spring Security 6.X. It covers various topics including authentication, authorization, password management, OAuth2, OIDC, and security vulnerabilities. Additionally, it discusses the architecture, internal flow, and customization of Spring Security, along with practical implementations for both backend and frontend security.

Uploaded by

V Sai Yashwanth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views1 page

Securing Microservices Course Content

The document provides a comprehensive overview of securing microservices using Spring Security 6.X. It covers various topics including authentication, authorization, password management, OAuth2, OIDC, and security vulnerabilities. Additionally, it discusses the architecture, internal flow, and customization of Spring Security, along with practical implementations for both backend and frontend security.

Uploaded by

V Sai Yashwanth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Securing Microservices-Spring Security 6.

Content

1) Spring Security Introduction


2) Understanding Security Components
3) Architecture & Internal Flow
4) Spring Security Defaults and Customization
5) Authentication Providers
6) UserManagement
7) Password Management
 Encoding
 Encryption
 Hashing and Salting
 Secrets Store-Spring Vault
8) Spring Security Internal Filters and Custom Filters
9) Exception Handling
10) Authorization, RBAC and ABAC
11) MFA
 2nd Factot Authentication
 Multifactor Authentication
 Stepup Authentication

12) Oauth2.x
 Oauth2 Components
 Public Clients Vs Confidential Clients
 Grant Types and Workflows
 Opeque Tokens Vs JWT tokens
 Access Tokens, Refresh Tokens
 Spring Cloud Gateway as Resource Server
13) OIDC With PCKCE
 Understanding OIDC Specification
 OIDC Components
 ID Token and Claims
 Provider Discovery
 Dynamic Client Registration
 Social Authentications
 SSO
14) KeyCloak IDP
15) Security Backend-Microservices
16) Security Vulnerabilities, Audit Report and Spring Security Solutions
17) Securing Front End-React JS

www.techhubvault.com

You might also like