Companies Home Search Profile

Spring Security Zero to Master along with JWT,OAUTH2

Focused View

Eazy Bytes

10:49:32

762 View
  • 1 - Course Introduction.mp4
    05:21
  • 2 - Course content.html
  • 3 - What is Security & Why it is important.mp4
    05:36
  • 4 - Creating a simple Spring security project.mp4
    12:50
  • 5 - Understanding on how multiple requests work with out credentials.mp4
    05:23
  • 6 - Other Courses from EazyBytes.html
  • 7 - Spring Security Internal flow and Architecture.mp4
    06:22
  • 8 - Summary of the Section.html
  • springsecuritybasic.zip
  • 1 - Understanding about UI part of the project.mp4
    03:55
  • 2 - Creating backend services needed for the application.mp4
    06:01
  • 3 - Testing the backend services with default configurations.mp4
    02:57
  • 4 - Checking the default configuration inside the spring security library.mp4
    05:45
  • 5 - Modifying the code as per our custom requirements.mp4
    05:17
  • 6 - Denying all the requests.mp4
    03:59
  • 7 - Permit all the requests.mp4
    02:11
  • 8 - Summary of the Section.mp4
    02:07
  • springsecsection2.zip
  • 1 - Configuring users using inMemoryAuthentication.mp4
    07:09
  • 2 - Configuring users using InMemoryUserDetailsManager.mp4
    06:01
  • 3 - Understanding User Management interfaces and Classes.mp4
    07:23
  • 4 - Deep Dive of UserDetails Interface.mp4
    06:41
  • 5 - Deep Dive of UserDetailsService Interface.mp4
    04:41
  • 6 - Deep Dive of UserDetailsManager Interface.mp4
    04:04
  • 7 - Deep Dive of UserDetailsManager Implementations.mp4
    12:10
  • 8 - Creating MySQL Database in AWS.mp4
    08:07
  • 9 - Creating Users inside the DB as per JdbcUserDetailsManager class.mp4
    04:16
  • 10 - Using JdbcUserDetailsManager to perform authentication.mp4
    08:52
  • 11 - Creating our own custom implementation of UserDetailsService.mp4
    17:18
  • 12 - Summary of the section.mp4
    03:09
  • springsecsection3.zip
  • 1 - How our passwords validated in Spring Security by default.mp4
    03:55
  • 2 - Encoding Vs Encryption Vs Hashing.mp4
    12:51
  • 3 - How Our passwords will be validated with hashing by Spring Security.mp4
    02:39
  • 4 - Definition of the PasswordEncoder.mp4
    05:21
  • 5 - Deepdive into NoOpPasswordEncoder.mp4
    04:14
  • 6 - Deepdive into StandardPasswordEncoder.mp4
    04:25
  • 7 - Deepdive into Pbkdf2PasswordEncoder.mp4
    04:38
  • 8 - Deepdive into Bcrypt and Scrypt PasswordEncoders.mp4
    05:38
  • 9 - Implementing and enhancing our application to use Bcrypt password encoder.mp4
    07:30
  • 10 - Details about Spring Security Crypto package.mp4
    01:54
  • 11 - Summary of the section.mp4
    01:57
  • springsecsection4.zip
  • 1 - Role of AuthenticationProvider in the Spring Security flow.mp4
    03:16
  • 2 - Scenarios where we need to implement Authentucation Provider.mp4
    03:16
  • 3 - Understanding Authentication Provider definition.mp4
    07:31
  • 4 - Understanding Authentication & Principal Interfaces.mp4
    06:56
  • 5 - Implementing and Customizing the Authentication Provider inside our application.mp4
    07:49
  • 6 - Summary of the Section.mp4
    02:06
  • springsecsection5.zip
  • 1 - Angular-Project-Setup.pdf
  • 1 - Setting up the EazyBank UI project.mp4
    04:51
  • 2 - Understanding the UI project and walkthrough of the Angular code.mp4
    09:42
  • 3 - Understanding the backend project and walkthrough of the latest code.mp4
    02:55
  • 4 - Testing the EazyBank application with both UI and Backend applications up.mp4
    01:52
  • 5 - Deep dive into CORS (CROSS-ORIGIN RESOURCE SHARING).mp4
    06:11
  • 6 - Making code changes to resolve CORS issue.mp4
    05:55
  • 6 - Understanding CORs & CSRF.zip
  • 7 - Deep dive into CSRF (CROSS-SITE REQUEST FORGERY).mp4
    05:17
  • 8 - Resolving CSRF error by disabling it in Spring Security.mp4
    03:05
  • 9 - Resolving CFRF error by generating a CSRF token.mp4
    07:05
  • 10 - Making Spring Security changes to make CSRF not applicable for Contact page.mp4
    03:28
  • 11 - Summary of the Section.mp4
    03:07
  • 1 - Authentication Vs Authorization.mp4
    04:11
  • 2 - Spring Security Internal flow for AUTHN & AUTHZ.mp4
    03:12
  • 3 - How Authorities stored in Spring Security.mp4
    04:48
  • 4 - Configuring Authorities in Spring Security.mp4
    09:59
  • 5 - Authority Vs Role.mp4
    02:42
  • 6 - Configuring Roles in Spring Security.mp4
    05:26
  • 7 - Deep dive of Ant, MVC, Regex matchers for applying restrictions on the paths.mp4
    07:40
  • 8 - Summary of the Section.mp4
    01:41
  • springsecsection7.zip
  • 1 - Introduction to Filters in Spring Security and the sample use cases.mp4
    03:26
  • 2 - Inbuilt Filters provided by Spring Security and validating them inside our app.mp4
    07:40
  • 3 - Implementing our own custom filter in Spring Security.mp4
    01:56
  • 4 - Adding a custom filter using addFilterBefore() method.mp4
    06:59
  • 5 - Adding a custom filter using addFilterAfter() method.mp4
    04:20
  • 6 - Adding a custom filter using addFilterAt() method.mp4
    04:30
  • 7 - Details about GenericFilterBean and OncePerRequestFilter.mp4
    05:21
  • 8 - Summary of the Section.mp4
    01:36
  • springsecsection8.zip
  • 1 - Introduction to Tokens in Authentication flow.mp4
    03:20
  • 2 - Advantages of Token based Authentication.mp4
    05:15
  • 3 - Exploring the JSESSIONID & CSRF Tokens inside our application.mp4
    04:09
  • 4 - Deep dive about JWT Tokens.mp4
    10:16
  • 5 - Making project configuration to use JWT tokens.mp4
    05:00
  • 6 - Configuring filters to generate and validate JWT tokens.mp4
    08:41
  • 7 - Making changes on the client side for JWT token based authentication.mp4
    02:24
  • 8 - Validating the JWT changes made by running the applications.mp4
    02:30
  • 9 - Token based Authentication using JSON Web Token (JWT).zip
  • 9 - Validating the JWT token expiration scenario.mp4
    02:18
  • 10 - Summary of the Section.mp4
    01:27
  • 1 - Introduction to method level security in Spring Security.mp4
    05:06
  • 2 - Details about method invocation authorization in method level security.mp4
    04:58
  • 3 - Implementing method level security using preauthorize and postauthorize.mp4
    07:38
  • 4 - Details about filtering authorization in method level security.mp4
    03:21
  • 5 - Implementing method level security using prefilter and postfilter.mp4
    06:09
  • 6 - Summary of the section.mp4
    02:07
  • springsecsection10.zip
  • 1 - Problems that OAUTH2 framework trying to solve.mp4
    05:17
  • 2 - Introduction to OAUTH2.mp4
    05:48
  • 3 - Different Components involved in OAUTH2 flow.mp4
    08:35
  • 4 - Authorization code grant type flow in OAUTH2.mp4
    10:14
  • 5 - Implicit grant type flow in OAUTH2.mp4
    05:50
  • 6 - Resource owner credentials grant type flow in OAUTH2.mp4
    05:42
  • 7 - Client credentials grant type flow in OAUTH2.mp4
    03:52
  • 8 - Refresh token grant type flow in OAUTH2.mp4
    07:29
  • 9 - How resource server validates the tokens issued by Auth server.mp4
    04:30
  • 10 - Summary of the Section.mp4
    01:28
  • 1 - Registering the client details with the GitHub to use it's OAUTH2 Auth server.mp4
    04:22
  • 2 - Building a sample spring application that uses GitHub Auth server during OAUTH2.mp4
    11:04
  • 3 - Running and verifying the sample application using GitHub OAUTH2.mp4
    05:23
  • SpringSecOAUTHGitHub.zip
  • 1 - Introduction to OAUTH2 flow inside EazyBank web App.mp4
    08:11
  • 2 - Introduction to OpenID Connect.mp4
    06:28
  • 3 - Introduction to KeyCloak Auth Server.mp4
    05:15
  • 4 - Installation of KeyCloak server & setup admin account.mp4
    02:53
  • 5 - Setup a Realm inside KeyCloak Server for EazyBank App.mp4
    03:35
  • 6 - Creating Client Credentials inside KeyCloak for API-API secured invocations.mp4
    07:01
  • 7 - Setup EazyBank Resource Server.mp4
    15:00
  • 8 - Getting Access token from KeyCloak using client credentials grant type.mp4
    03:55
  • 9 - Passing Access token to Resource server for response through Postman.mp4
    09:18
  • 10 - Understanding Authorization code grant type for EazyBank App.mp4
    04:16
  • 11 - Creating Client and User details inside KeyCloak for Auth code grant flow.mp4
    04:52
  • 12 - Testing Authorization code grant type using Postman App.mp4
    07:37
  • 13 -file.zip
  • 13 - Deep dive on Authorization code grant type with PKCE.mp4
    05:35
  • 14 - Creating public facing client details inside KeyCloak server.mp4
    03:13
  • 15 - Angular-Project-Setup.pdf
  • 15 - Understanding PKCE Authorization code grant type inside Angular UI App.mp4
    15:54
  • 16 - Important features of KeyCloak.mp4
    08:37
  • 17 - Social Login integration with the help of KeyCloak Server.mp4
    06:41
  • 18 - Summary of the Section.mp4
    02:58
  • 1 - Other Courses from EazyBytes.html
  • 2 - Thank You and Congratulations.mp4
    01:34
  • Description


    Spring Security, SpringBoot Security, CORs, CSRF, JWT, OAUTH2, OpenID Connect, KeyCloak

    What You'll Learn?


    • Spring Security framework details and it features.
    • How to adapt security for a Java web application using Spring Security
    • What is CSRF, CORS, JWT, OAUTH2
    • Applying authorization rules using roles, authorities inside a web application using Spring Security
    • Method level security in web/non-web applications

    Who is this for?


  • Beginner students who are learning Spring framework and interested in security as well
  • Developers who already know developing web applications using Spring framework
  • Java Architects
  • What You Need to Know?


  • Java
  • Basics of Spring framework
  • More details


    Description

    'Spring Security Zero to Master' course will help in understanding the Spring Security Architecture, important packages, interfaces, classes inside it which handles authentication and authorization requests in the web applications. It also covers most common security related topics like CORs, CSRF, JWT, OAUTH2, password management, method level security, user, roles & authorities management inside web applications.

    Below are the important topics that this course covers,

    1. Spring Security framework details and it features

    2. How to adapt security for a Java web application using Spring Security

    3. Password Management in Spring Security with PasswordEncoders

    4. Deep dive about encoding, encryption and hashing

    5. What is CSRF, CORS and how to address them

    6. What is Authentication and Authorization. How they are different from each other.

    7. Securing endpoint URLs inside web applications using Ant, MVC & Regex Matchers

    8. Filters in Spring Security and how to write own custom filters

    9. Deep dive about JWT (JSON Web Tokens) and the role of them inside Authentication & Authorization

    10. Deep dive about OAUTH2 and various grant type flows inside OAUTH2.

    11. Deep dive about OpenID Connect & how it is related to OAUTH2

    12. Applying authorization rules using roles, authorities inside a web application using Spring Security

    13. Method level security in web/non-web applications

    14. Social Login integrations into web applications

    15. Set up of Authorization Server using KeyCloak


    The pre-requisite for the course is basic knowledge of Java, Spring and interest to learn.

    Who this course is for:

    • Beginner students who are learning Spring framework and interested in security as well
    • Developers who already know developing web applications using Spring framework
    • Java Architects

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    The target of the Eazy Bytes is to educate Students, Developers and Architects on designing and implementing web applications focusing modularity, scalability, security and performance by using Java, Angular, Spring, JPA, Hibernate, Microservices, SpringBoot and Cloud. As the name indicates the knowledge sharing will be in byte sized which can be easily understand by anyone who spends quality time during the trainings.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 117
    • duration 10:49:32
    • English subtitles has
    • Release Date 2022/11/22