Book Image

Building Web Apps with Spring 5 and Angular

By : Ajitesh Kumar Shukla
Book Image

Building Web Apps with Spring 5 and Angular

By: Ajitesh Kumar Shukla

Overview of this book

Spring is the most popular application development framework being adopted by millions of developers around the world to create high performing, easily testable, reusable code. Its lightweight nature and extensibility helps you write robust and highly-scalable server-side web applications. Coupled with the power and efficiency of Angular, creating web applications has never been easier. If you want build end-to-end modern web application using Spring and Angular, then this book is for you. The book directly heads to show you how to create the backend with Spring, showing you how to configure the Spring MVC and handle Web requests. It will take you through the key aspects such as building REST API endpoints, using Hibernate, working with Junit 5 etc. Once you have secured and tested the backend, we will go ahead and start working on the front end with Angular. You will learn about fundamentals of Angular and Typescript and create an SPA using components, routing etc. Finally, you will see how to integrate both the applications with REST protocol and deploy the application using tools such as Jenkins and Docker.
Table of Contents (18 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

CSRF protection for API requests


In this section, you will learn about different aspects of cross-site request forgery (CSRF or XSRF) attack protection, which need to be taken care in both the Angular app and Spring app. Before getting into details, lets quickly understand what CSRF is.

CSRF is an attack in which attackers lure authenticated users to unknowingly perform undesired action on the website. For example, an attacker can log in as the user, and without the user's knowledge, transfer money from his account to the attacker's account. The following is a typical use-case scenario of a CSRF attack:

  1. The user logs into the actual website which will later be compromised using the CSRF attack. Once logged in, the website sends token information assigned to a cookie as part of the response.
  2. While the user is logged in, the attacker lures the user to visit attacker's web page from where the CSRF attack would take place. One such example is the attacker luring the user to click on a link in...