4 minutes
Implementing Zero Trust Security with Jakarta EE: A Practical Guide
Zero Trust security has moved from buzzword to necessity. The principle is simple: never trust, always verify. But implementing […]
Securing your application is a very important aspect of development. You not only need to make sure that the application has the intended functionality but also that this functionality can only be executed by the appropriate people. It is critical to ensure that updates to data are restricted to the correct people, and that end users only see data they are allowed to see. And in case of sensitive data, this is even more important.
The definition and configuration of these processes have become easier with the introduction of the Security API in Java EE 8 which is available in Payara Platform 5.
This guide describes concepts such as:
Payara Platform has a multitude of possibilities to secure your application. We will introduce the concepts of the Security API and show detailed examples on how you can use it to secure the application using a hashed password stored in the database and using the Google OpenIdConnect functionality.
We will also discuss the option to define multiple IdentityStores to retrieves authorization information from multiple sources and using multiple stores for authentication which include creating a custom Identity Store handler for the veto concept.
And finally, we will describe how you can combine the Payara Realms with the Security API to
have even more possibilities.
{{cta(‘1e4c6b99-f75d-431c-827a-3e939e6af8e6’)}}
Share:
4 minutes
Zero Trust security has moved from buzzword to necessity. The principle is simple: never trust, always verify. But implementing […]
7 minutes
Modernizing enterprise applications is a strategic imperative for organizations that want to remain competitive and resilient. According to our […]
4 minutes
Keeping an application server running smoothly isn’t so much about new features, but more about predictability and consistency. Software […]