OAuth 2.0 in Spring Boot Applications
OAuth 2.0 in Spring Boot Applications, available at $84.99, has an average rating of 4.59, with 199 lectures, based on 3357 reviews, and has 25884 subscribers.
You will learn about OAuth 2.0 OAuth 2 Authorization Flows The New OAuth 2.0 stack in Spring Security 5 Use OAuth 2.0 in Spring Boot Applications Configure OAuth 2.0 Resource Server Keycloak Identity and Access Management Solution Resource Servers behind API Gateway New Spring Authorization Server OAuth 2.0 in MVC Web App OAuth 2 – Social Login OAuth2 + PKCE in JavaScript Application Register Resource Servers with Eureka Service Registry This course is ideal for individuals who are Beginner Java developer interested to learn OAuth 2.0 It is particularly useful for Beginner Java developer interested to learn OAuth 2.0.
Enroll now: OAuth 2.0 in Spring Boot Applications
Summary
Title: OAuth 2.0 in Spring Boot Applications
Price: $84.99
Average Rating: 4.59
Number of Lectures: 199
Number of Published Lectures: 188
Number of Curriculum Items: 199
Number of Published Curriculum Objects: 188
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- OAuth 2.0
- OAuth 2 Authorization Flows
- The New OAuth 2.0 stack in Spring Security 5
- Use OAuth 2.0 in Spring Boot Applications
- Configure OAuth 2.0 Resource Server
- Keycloak Identity and Access Management Solution
- Resource Servers behind API Gateway
- New Spring Authorization Server
- OAuth 2.0 in MVC Web App
- OAuth 2 – Social Login
- OAuth2 + PKCE in JavaScript Application
- Register Resource Servers with Eureka Service Registry
Who Should Attend
- Beginner Java developer interested to learn OAuth 2.0
Target Audiences
- Beginner Java developer interested to learn OAuth 2.0
This video course is for beginner Java developers who are interested in learning how to secure OAuth 2.0 Resources in Spring Security 5.
The course covers only the new OAuth 2.0 stack in Spring Security 5.
You will learn how to:
-
Perform each OAuth 2 authorization flow,
-
Authorization Code,
-
PKCE-enhanced authorization code,
-
Client credentials,
-
Password credentials.
-
-
Startup and configure the Keycloak server,
-
Configure OAuth 2 Resource Server,
-
Startup multiple Resource Servers on random port numbers,
-
Configure Spring Cloud API Gateway,
-
Configure and use Eureka Registry and Discovery Service,
-
Build a simple Spring MVC Web Application that fetches data from a protected Resource Server running behind Spring Cloud API Gateway.
-
Implement a simple JavaScript application that uses PKCE-Enhanced authorization code to acquire JWT access tokens and communicate with protected Resource Server,
-
Learn how to refresh an expired JWT Access token,
-
Learn to implement Scope-base access control,
-
Learn how to implement Role-based access control,
-
OAuth social login with Facebook, Google, and Okta accounts,
-
Implement Keycloak Remote User Authentication(User Storage SPI)
-
New Spring Authorization Serverversion 0.2.2
This is a step-by-step video course that explains how to use OAuth 2 from the very beginning. If you do not have experience with OAuth and would like to learn how to use it in Spring Boot Web Applications, then this video course is for you.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Source Code
Lecture 2: Presentation files
Lecture 3: Introduction
Lecture 4: Introduction to OAuth 2
Lecture 5: OAuth 2.0 Roles
Lecture 6: Current State of OAuth 2.0 in Spring Security 5
Lecture 7: OAuth 2.0 Client Types
Lecture 8: OAuth Access Token
Lecture 9: OAuth2 and OpenID Connect (OIDC)
Chapter 2: OAuth 2 Grant Types and Authorization Flows
Lecture 1: Introduction
Lecture 2: Authorization Code. Introduction.
Lecture 3: Authorization Code Demo. Initial Request.
Lecture 4: Important note
Lecture 5: Authorization Code Demo. Exchange code for Access token.
Lecture 6: PKCE-enhanced Authorization Code
Lecture 7: Generating PKCE Code Verifier
Lecture 8: Generating PKCE Code Challenge
Lecture 9: PKCE Demo. Requesting Authorization Code
Lecture 10: PKCE Demo. Exchanging Code for Access Token
Lecture 11: Client Credentials
Lecture 12: Client Credentials Grant Type Demo
Lecture 13: The Password Credentials Flow
Lecture 14: The Password Credentials Flow: Demo
Chapter 3: Refreshing Access Token
Lecture 1: Introduction
Lecture 2: Requesting Refresh Token that never expires
Lecture 3: Refreshing Access Token. Demonstration.
Chapter 4: Keycloak. The Standalone Authorization Server.
Lecture 1: Introduction
Lecture 2: [Updated] Downloading Standalone Authorization Server Keycloak
Lecture 3: [Updated] Starting and Stopping Keycloak server
Lecture 4: [Updated] Creating an Admin user
Lecture 5: [Updated] Creating a new Realm
Lecture 6: [Updated] Creating a new user
Lecture 7: [Updated] Creating a new OAuth Client
Lecture 8: [Updated] Configuring Client Application Secrets
Lecture 9: [Updated] Requesting Access Token and Refresh Token
Lecture 10: [Updated] Enable/Disable OAuth 2.0 Authorization Flow
Lecture 11: [Updated] OAuth 2.0 Client Scopes
Chapter 5: OAuth Resource Server
Lecture 1: Introduction
Lecture 2: Creating a new project
Lecture 3: Import project into Spring Tool Suite IDE
Lecture 4: Creating a Rest Controller Class
Lecture 5: Starting Resource Server on different port number
Lecture 6: Access Token Validation URIs
Lecture 7: Accessing endpoints with an Access Token
Lecture 8: Accessing Principal and JWT Claims
Lecture 9: Demo – Accessing JWT Claims
Chapter 6: Resource Server – Scope Based Access Control
Lecture 1: Introduction
Lecture 2: [Updated] Create WebSecurity class and enable WebSecurity
Lecture 3: [Updated] Configure basic HttpSecurity in Resource Server
Lecture 4: [Updated] Resource Server OAuth Scope-based Access Control
Lecture 5: Demo – Access Resource Server without using proper Scope
Lecture 6: Demo – Access Resource Server using proper Scope
Lecture 7: Creating OAuth 2 Scope in Keycloak
Chapter 7: Role Based Access Control with Keycloak
Lecture 1: Introduction
Lecture 2: Source code
Lecture 3: [Updated] Creating User Role
Lecture 4: Securing Endpoints to a Specific Role
Lecture 5: Creating Role Converter class
Lecture 6: Decoding JWT to find user roles
Lecture 7: Converting Roles into GrantedAuthority objects
Lecture 8: Register JwtAuthenticationConverter with HttpSecurity
Lecture 9: Trying how it works
Chapter 8: Resource Server: Method Level Security
Lecture 1: Introduction
Lecture 2: Source code
Lecture 3: Enable Method Level Security
Lecture 4: @Secured annotation example
Lecture 5: @PreAuthorized annotation
Lecture 6: Reading UserId from JWT Access Token
Lecture 7: Trying how the @PreAuthorized annotation works
Lecture 8: Creating getUser() to be used with @PostAuthorize
Lecture 9: @PostAuthorized annotation
Lecture 10: Trying how to the @PostAuthorized annotation works
Chapter 9: Resource Server Behind API Gateway
Lecture 1: Introduction
Lecture 2: Creating API Gateway Project
Lecture 3: Import API Gateway to Spring Tool Suite
Lecture 4: Configuring API Gateway Routes
Lecture 5: Trying how it works
Lecture 6: Albums & Photos Resource Servers
Lecture 7: Routing to multiple Resource Servers
Lecture 8: Trying how it works
Chapter 10: Eureka Discovery Service
Lecture 1: Introduction
Lecture 2: Creating Eureka Discovery Service Project
Lecture 3: Configuring Eureka project
Chapter 11: Configure Resource Server as Eureka Client
Lecture 1: Eureka Client Dependency
Lecture 2: @EnableDiscoveryClient and configuration properties
Lecture 3: Trying how it works
Lecture 4: Exercise
Lecture 5: Source Code
Lecture 6: Solution overview
Instructors
-
Sergey Kargopolov
Software developer
Rating Distribution
- 1 stars: 21 votes
- 2 stars: 34 votes
- 3 stars: 246 votes
- 4 stars: 1044 votes
- 5 stars: 2011 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024