Book Image

Modern Java Web Applications with Spring Boot 2.x [Video]

By : Sherwin John C.Tragura
Book Image

Modern Java Web Applications with Spring Boot 2.x [Video]

By: Sherwin John C.Tragura

Overview of this book

Building web application has been a challenge for many Java developers because of the complexities of their software requirements, leading to a bloated and unmanaged framework library repository and configurations. Spring Boot 2.x, a feature-rich platform built from the Spring 5.x framework, is created by to help developers solve their complex problems with fewer configurations but with strong dependency management features. In this course, you will learn how to create various modules in a Human Resources Information System (HRIS) such as employee timesheets, leave management, and profiling. You will use Spring Boot 2.x to create your HRIS app while integrating Spring Web MVC, Spring WebFlux, Spring Data, RESTful web services, and clients. Above all, you'll use the latest version of Spring Security—5.0—to secure your apps and OAuth 2.x to implement an OpenID connection. You'll apply reactive programming with its Spring Web Flux and Project Reactor features. Finally, you will deploy your apps and services using some popular cloud and container platforms such as Spring Cloud Foundry, Docker, and AWS. By the end of the course, you will be confident in implementing the core features of Spring Boot 2.x to create scalable, optimal, and robust enterprise web applications. All the related code files are placed on GitHub repository at: https://github.com/PacktPublishing/Modern-Java-Web-Applications-with-Spring-Boot-2.x
Table of Contents (7 chapters)
Chapter 4
Securing the Application and Its Services
Content Locked
Section 5
Enhancing the Security Model
Problem: What if the redirect-Login-Page and success-logout-page depends on the user role? What if a RememberMe authentication feature is needed to be applied? How can we control user sessions? Solution: Spring Security 5.2 is extensible enough to allow customization of its core components, handlers, providers, and filters in order to cater create a more desirable security solution.