Book Image

Java EE 8 Design Patterns and Best Practices

By : Rhuan Rocha, Joao Carlos Purificação
Book Image

Java EE 8 Design Patterns and Best Practices

By: Rhuan Rocha, Joao Carlos Purificação

Overview of this book

Patterns are essential design tools for Java developers. Java EE Design Patterns and Best Practices helps developers attain better code quality and progress to higher levels of architectural creativity by examining the purpose of each available pattern and demonstrating its implementation with various code examples. This book will take you through a number of patterns and their Java EE-specific implementations. In the beginning, you will learn the foundation for, and importance of, design patterns in Java EE, and then will move on to implement various patterns on the presentation tier, business tier, and integration tier. Further, you will explore the patterns involved in Aspect-Oriented Programming (AOP) and take a closer look at reactive patterns. Moving on, you will be introduced to modern architectural patterns involved in composing microservices and cloud-native applications. You will get acquainted with security patterns and operational patterns involved in scaling and monitoring, along with some patterns involved in deployment. By the end of the book, you will be able to efficiently address common problems faced when developing applications and will be comfortable working on scalable and maintainable projects of any size.
Table of Contents (20 chapters)
Title Page
Copyright and Credits
Dedication
Packt Upsell
Contributors
Preface
5
Aspect-Oriented Programming and Design Patterns
Index

Implementing the authentication mechanism


In our example of implementing an authentication mechanism, we will create an application with resources that receive a request and return hello world messages to the user. However, this resource is protected and the user needs to be authenticated in order to access this resource. Further, we will set up some security policies and associations through the deployment descriptor file, some security policies to some resources using annotation, and some security policies to some resources using the programmatic configuration. We will also use basic authentication. To configure the security policies using the deployment descriptor file and programmatic configuration, we will use a JAX-RS resource. To configure the security policies using annotation, we will use a servlet. All of the examples used here are secure in a web application, but Java EE 8 permits the use of authentication mechanisms on the enterprise application. In this example, the following...