Authentication and Authorization Stores in Payara Platform

Security

Securing your application is a very important aspect of development. You not only need to make sure that the application has the intended functionality but also that this functionality can only be executed by the appropriate people. It is critical to ensure that updates to data are restricted to the correct people, and that end users only see data they are allowed to see. And in case of sensitive data, this is even more important.

The definition and configuration of these processes have become easier with the introduction of the Security API in Java EE 8 which is available in Payara Platform 5. 

This guide describes concepts such as:

  • HTTP Authentication Mechanism and Identity Store
  • Groups vs. Role
  • OAuth2 and OpenIdConnect
  • Combining the Payara Realms with the Security API
  • Detailed examples for how to use in the Payara Platform

Payara Platform has a multitude of possibilities to secure your application. We will introduce the concepts of the Security API and show detailed examples on how you can use it to secure the application using a hashed password stored in the database and using the Google OpenIdConnect functionality.

We will also discuss the option to define multiple IdentityStores to retrieves authorization information from multiple sources and using multiple stores for authentication which include creating a custom Identity Store handler for the veto concept.

And finally, we will describe how you can combine the Payara Realms with the Security API to
have even more possibilities.

{{cta(‘1e4c6b99-f75d-431c-827a-3e939e6af8e6’)}}

 

Comments (0)

Post a comment

Your email address will not be published. Required fields are marked *

Payara needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Legal & Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Posts

Stacked copies of the Payara developer guide “Zero Trust Architecture with Jakarta EE and MicroProfile” on an orange background, showing the dark blue cover design with the Payara logo and a laptop illustration featuring a shield and padlock icon. 4 minutes
Jakarta EE

Implementing Zero Trust Security with Jakarta EE: A Practical Guide

Zero Trust security has moved from buzzword to necessity. The principle is simple: never trust, always verify. But implementing […]

Application Modernization 7 minutes
Thought Leadership

8 Key Benefits of Application Modernization for Business Growth

Modernizing enterprise applications is a strategic imperative for organizations that want to remain competitive and resilient. According to our […]

Timeline showing Payara Platform Enterprise 4, 5, and 6 support phases (Full, Extended, Lifetime) from 2023–2033, along with JDK 8, 11, 17, and 21 support periods and end-of-life markers. 4 minutes
Thought Leadership

Understanding the Payara Platform Enterprise Software Lifecycle: How We Support Long-Term Stability 

Keeping an application server running smoothly isn’t so much about new features, but more about predictability and consistency. Software […]