Companies Home Search Profile

NEW: Spring Boot 3 Securing Your Application with JWT Token

Focused View

BOUALI Ali

1:58:37

181 View
  • 1 - How JWT based security works.mp4
    05:32
  • 2 - Source code.html
  • 3 - Create a new Spring boot 30 project.mp4
    01:54
  • 4 - Add a new datasource.mp4
    03:01
  • 5 - Establish connection to the database.mp4
    04:43
  • 6 - Create a new User java class.mp4
    02:52
  • 7 - Transform the user to an Entity.mp4
    05:17
  • 8 - Extend the user and make it a UserDetails object.mp4
    08:05
  • 9 - Create the User repository.mp4
    02:16
  • 10 - Create the JWT authentication filter.mp4
    05:08
  • 11 - Checking the JWT token.mp4
    03:28
  • 12 - Create the JWT Service.mp4
    03:24
  • 13 - Add the JJWT dependencies.mp4
    02:03
  • 14 - What is a JWT toekn.mp4
    03:06
  • 15 - Extract claims from the JWT.mp4
    02:11
  • 16 - Implement the SignIn key method.mp4
    04:44
  • 17 - Extract a single claim from JWT.mp4
    01:44
  • 18 - Extract the username from the token.mp4
    01:00
  • 19 - Generate the JWT token.mp4
    05:22
  • 20 - Check if the token is valid.mp4
    03:05
  • 21 - Check the user existence in the database JwtAuthFilter.mp4
    03:46
  • 22 - Implement the user details service.mp4
    04:24
  • 23 - Update the SecuritContextHolder and finalise the filter.mp4
    04:14
  • 24 - Add the security configuration.mp4
    08:53
  • 25 - Create the authentication provider bean.mp4
    03:50
  • 26 - Create the authentication manager bean.mp4
    01:33
  • 27 - Create the authentication controller.mp4
    02:40
  • 28 - Create the authentication response.mp4
    00:52
  • 29 - Create the register request object.mp4
    01:03
  • 30 - Create the authentication request object.mp4
    00:31
  • 31 - Create the authentication service.mp4
    02:15
  • 32 - Implement the register method.mp4
    03:45
  • 33 - Implement the authenticate method.mp4
    02:45
  • 34 - Update the security configuration whitelist.mp4
    01:12
  • 35 - Create a demo controller.mp4
    01:15
  • 36 - Test the application.mp4
    06:44
  • Description


    Spring Boot 3 + Spring Security 6 - JWT Authentication and Authorisation [NEW] [2023]

    What You'll Learn?


    • Implement user authentication and authorization using Spring Security
    • Encrypt user passwords using BCrypt
    • Implement role-based authorization with Spring Security
    • Use JSON Web Tokens (JWT) to provide a secure, stateless method of authentication
    • ntegrate JWT into a Spring Boot application

    Who is this for?


  • Students
  • Beginners
  • Mid level
  • More details


    Description

    Are you looking to secure your Spring Boot applications and keep them safe from unauthorized access? Look no further! Our course, "Spring Security with JWT: Protect Your Applications from Unauthorized Access," is the perfect solution for you.

    In this course, you'll learn everything you need to know about using Spring Security and JSON Web Tokens (JWT) to secure your applications. We'll start by teaching you the basics of Spring Security and how it can be used to authenticate and authorize users in your application. From there, you'll learn how to implement JWT to provide a secure, stateless method of authentication.

    With our step-by-step instructions and hands-on exercises, you'll gain the knowledge and skills you need to confidently secure your Spring Boot applications. Plus, with lifetime access to the course materials, you can revisit the lessons anytime you need a refresher.

    Don't let unauthorized access threaten the security of your applications. Enroll in "Spring Security with JWT: Protect Your Applications from Unauthorized Access" today and take the first step towards safeguarding your valuable assets.


    A JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is digitally signed using JSON Web Signature (JWS).

    A JWT consists of three parts: a header, a payload, and a signature.

    1. The header typically consists of two parts: the type of the token, which is JWT, and the signing algorithm being used, such as HMAC SHA256 or RSA.

    2. The second part of the token is the payload, which contains the claims. Claims are statements about an entity (typically, the user) and additional data. There are three types of claims: registered, public, and private claims. Registered claims are a set of predefined claims which are not mandatory but recommended, to provide a set of useful, interoperable claims. Some of the registered claims are:

    • iss (issuer) claim identifies the principal that issued the JWT.

    • sub (subject) claim identifies the subject of the JWT.

    • aud (audience) claim identifies the recipients that the JWT is intended for.

    • exp (expiration time) claim identifies the expiration time on or after which the JWT MUST NOT be accepted for processing.

    Public claims are claims that are defined in the IANA JSON Web Token Registry or are public by nature. Private claims are custom claims created to share information between parties that agree on using them.

    1. The third part of the token is the signature, which is used to verify that the sender of the JWT is who it claims to be and to ensure that the message wasn't changed along the way.

    To create the signature part you have to take the encoded header, the encoded payload, a secret, the algorithm specified in the header, and sign that. For example if you want to use the HMAC SHA256 algorithm, the signature will be created in the following way:

    HMACSHA256( base64UrlEncode(header) + "." + base64UrlEncode(payload), secret)

    The final JWT will be three base64-URL strings separated by dots, which can be easily passed in HTML and HTTP environments, while being more compact when compared to XML-based standards such as SAML.

    Who this course is for:

    • Students
    • Beginners
    • Mid level

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    More than 10 years professional experience as Java/JEE developer and FullStack Technical LeaderPassionate about development and learning new technologiesOnline instructor on Udemy, Tutorials point and SkillshareIf you want to learn technologies, you are in the right profileTo be update and receive all the news and the new courses, you can follow me on Instagram: java.coders.official
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 35
    • duration 1:58:37
    • Release Date 2023/03/02