Book Image

Developing Middleware in Java EE 8

Book Image

Developing Middleware in Java EE 8

Overview of this book

Middleware is the infrastructure in software based applications that enables businesses to solve problems, operate more efficiently, and make money. As the use of middleware extends beyond a single application, the importance of having it written by experts increases substantially. This book will help you become an expert in developing middleware for a variety of applications. The book starts off by exploring the latest Java EE 8 APIs with newer features and managing dependencies with CDI 2.0. You will learn to implement object-to-relational mapping using JPA 2.1 and validate data using bean validation. You will also work with different types of EJB to develop business logic, and with design RESTful APIs by utilizing different HTTP methods and activating JAX-RS features in enterprise applications. You will learn to secure your middleware with Java Security 1.0 and implement various authentication techniques, such as OAuth authentication. In the concluding chapters, you will use various test technologies, such as JUnit and Mockito, to test applications, and Docker to deploy your enterprise applications. By the end of the book, you will be proficient in developing robust, effective, and distributed middleware for your business.
Table of Contents (18 chapters)
Title Page
Copyright and Credits
Dedication
Packt Upsell
Contributors
Preface
Index

Terminology


In this section, we're going to list and explain the different concepts and terminology required to understand how the new security API works, and we'll get ready for moving on with the code of this new API.

Authentication mechanism

An authentication mechanism is a way used to obtain a username and password from the user, to be processed later by the Java Security API.

Different authentication mechanisms may be used, including the following:

  • HTTP Basic Authentication: The built-in browser authentication methodology, where the browser displays an internal login dialog for the user upon trying to request access on some protected resource in our application
  • Form-Based Authentication: The most popular way of authenticating users in web applications, where we use a custom- created HTML form to input claimed user credentials from our user

Caller

The user that's making a request to our application. This caller is our candidate for authentication and authorization, before accessing our protected...