JSON Web Token (JWT) with Spring Security And Angular
Offered By: Udemy
Course Description
Overview
What you'll learn:
- JSON Web Token (JWT)
- Authentication
- Authorization
- Stateless Session Policy
- Manage User Security Roles
- Manage User Security Permissions
- Mitigation of Brute Force Attack
- Secure API Endpoints
- Password Encryption
- Role-based Access Control
Java Spring Framework (Spring Framework) is a popular, open source, enterprise-level framework for creating standalone, production-grade applications that run on the Java Virtual Machine (JVM). Java Spring Boot (Spring Boot) is a tool that makes developing web application and micro-services with Spring Framework faster and easier through three core capabilities, mainly its auto-configuration An opinionated approach to configuration.
Spring Boot is an open source Java-based framework used to create a micro Services. It is developed by Pivotal Team and is used to build stand-alone and production ready spring applications. This course will give you an introduction to Spring Boot and familiarize you with its basic concepts. For practice, we will build a Spring Boot REST API that manages employees.
The ability to create standalone applications These features work together to provide you with a tool that allows you to set up a Spring-based application with minimal configuration and setup. Spring security provides authentication and authorization to applications using servlet filters - a security filter chain.
Web applications are susceptible to security threats and attacks, as they are accessible by anyone uses the internet. In this course, we will build a REST API that will expose endpoints having restricted access to specific only authenticated users, for to manage the employees, for creating, updating , editing existing, and deleting employees. We can use spring security to secure URLs. Spring Security is a security framework that secures J2EE-based enterprise applications, by providing powerful, customizable security features like authentication and authorization . It is the de facto standard for securing Spring-based applications.
Taught by
Get Arrays
Related Courses
Microsoft Exchange Server 2016 - 1: InfrastructureMicrosoft via edX Access Controls
(ISC)² via Coursera Cloud Volumes ONTAP Deployment and Management for Azure
NetApp via edX Architecting with Google Kubernetes Engine
Google Cloud via Coursera Architecting with Google Kubernetes Engine 日本語版
Google Cloud via Coursera