Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.
David Syer discusses identity management, SSO, security standards –SAML, OpenID, OAuth, SCIM, JWT-, how Spring Security can fit in, and demoing IdM as a service.
John Davies examines Visa’s architecture and shows how major enterprises have architected very complex integrations incorporating Hadoop, memcached, Ruby on Rails, and many others to deliver innovative technology solutions. John explains how the platform architecture and technologies -- integrated and invented -- must be reliable and able to massively scale.
Craig Walls talks about securing the modern web and how OAuth can help with that, showing how to secure and consume resources with OAuth.
Rob Winch demoes some of the new features in Spring Security 3.1: multiple http elements, stateless authentication mode for RESTful services, Debug Filter, CAS support for proxy tickets, JAAS, etc.
Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.
In this presentation from SpringOne/2GX 2010, Rod Johnson and Stefan Schmidt introduce Spring Roo, how to build a sample application with Spring Roo and SpringSource Tool Suite, unit and integration tests, AspectJ utilization by Spring Roo, automatic query generation, configuring entities, dependency injection, controller/view generation, GWT integration and domain generation from an existing DB.