Book Image

Java EE 8 Design Patterns and Best Practices

By : Rhuan Rocha, Joao Carlos Purificação
Book Image

Java EE 8 Design Patterns and Best Practices

By: Rhuan Rocha, Joao Carlos Purificação

Overview of this book

Patterns are essential design tools for Java developers. Java EE Design Patterns and Best Practices helps developers attain better code quality and progress to higher levels of architectural creativity by examining the purpose of each available pattern and demonstrating its implementation with various code examples. This book will take you through a number of patterns and their Java EE-specific implementations. In the beginning, you will learn the foundation for, and importance of, design patterns in Java EE, and then will move on to implement various patterns on the presentation tier, business tier, and integration tier. Further, you will explore the patterns involved in Aspect-Oriented Programming (AOP) and take a closer look at reactive patterns. Moving on, you will be introduced to modern architectural patterns involved in composing microservices and cloud-native applications. You will get acquainted with security patterns and operational patterns involved in scaling and monitoring, along with some patterns involved in deployment. By the end of the book, you will be able to efficiently address common problems faced when developing applications and will be comfortable working on scalable and maintainable projects of any size.
Table of Contents (20 chapters)
Title Page
Copyright and Credits
Dedication
Packt Upsell
Contributors
Preface
5
Aspect-Oriented Programming and Design Patterns
Index

Implementing the authentication interceptor


In our final example of implementing the authentication interceptor,we will create an application with resources that receives a user request and returns hello world messages to the user, but this resource is protected and the user needs to be authenticated in order to access the resource.However, this protection is achieved by authenticating the interceptor implemented using the CDI interceptor, which captures a call to a resource and validates the user access. Further, we will use the basic authentication mechanism to do an authentication validation; the source of the user data will not be managed by the application server and Java EE, but by a custom data source. In this example, the following classes are used:

  • DataSource: This is the data source that contains security user information.
  • Auth: This is the interface used to define a method to validate authentication and authorization.
  • AuthImpl: This is the class that implements the Auth interface...