BT
rss
01:30:45

Security for Microservices with Spring and OAuth2

Posted by Dave Syer  on  Nov 26, 2014

David Syer explores the new features in Spring OAuth2, providing guidance on what to use and when, and showing how easy they are to enable quickly.

01:18:13

Have You Seen Spring Lately?

Posted by Josh Long  on  Aug 31, 2014 1

Josh Long introduces some of the latest Spring features supporting HATEOAS-compliant and OAuth-secured REST services, NoSQL and Big Data, Websockets, OAuth, open-web security and mobile.

Hook-up to the Social Networks with OAuth 2.0

Posted by John Davies  on  Aug 31, 2012 1

John Davies discusses passwords, the need for multiple passwords and password managers, and how OAuth is providing SSO for multiple sites, including an OAuth demo app for the iPhone.

OAuth - Everything You Want to Know (Hopefully)

Posted by Pratap Chilukuri  on  Aug 17, 2012 1

Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.

Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security

Posted by Robert Winch  on  Aug 03, 2012 3

Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.

Accessing Real-World APIs from Clojure

Posted by Pat Patterson  on  Jul 23, 2012

Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.

Who are You? Who am I? Who is Anybody?

Posted by Paul Downey  on  Mar 01, 2012 3

Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.

Spring Social: For the New Web of APIs

Posted by Craig Walls  on  Feb 27, 2012

Craig Walls discusses the need for adding social features to applications, how to secure such applications and how Spring Social can help.

The Rise of OAuth

Posted by Craig Walls  on  Jan 26, 2012 1

Craig Walls talks about securing the modern web and how OAuth can help with that, showing how to secure and consume resources with OAuth.

Failure: An Illustrated Guide

Posted by Avi Bryant  on  Dec 02, 2009

Avi Bryant explains the iterative process that led to the concept, implementation, and UI of Trendly (http://trendly.com/ ), using Smalltalk, Javascript, Ruby and Java in the process.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT