Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning Spring Boot 3.0

You're reading from   Learning Spring Boot 3.0 Simplify the development of production-grade applications using Java and Spring

Arrow left icon
Product type Paperback
Published in Dec 2022
Publisher Packt
ISBN-13 9781803233307
Length 270 pages
Edition 3rd Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Greg L. Turnquist Greg L. Turnquist
Author Profile Icon Greg L. Turnquist
Greg L. Turnquist
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1: The Basics of Spring Boot
2. Chapter 1: Core Features of Spring Boot FREE CHAPTER 3. Part 2: Creating an Application with Spring Boot
4. Chapter 2: Creating a Web Application with Spring Boot 5. Chapter 3: Querying for Data with Spring Boot 6. Chapter 4: Securing an Application with Spring Boot 7. Chapter 5: Testing with Spring Boot 8. Part 3: Releasing an Application with Spring Boot
9. Chapter 6: Configuring an Application with Spring Boot 10. Chapter 7: Releasing an Application with Spring Boot 11. Chapter 8: Going Native with Spring Boot 12. Part 4: Scaling an Application with Spring Boot
13. Chapter 9: Writing Reactive Web Controllers 14. Chapter 10: Working with Data Reactively 15. Index 16. Other Books You May Enjoy

Leveraging Google to authenticate users

Do you dread the thought of managing users and their passwords? Many security teams buy large products to deal with all this. Teams even invest in tools to simply push password resets directly to users, to reduce call volume.

Long story short, user management is a major effort not to be taken lightly; hence, many teams turn to OAuth. Described as “an open standard for access delegation” (https://en.wikipedia.org/wiki/OAuth), OAuth provides a way to outsource user management almost entirely.

OAuth arose as social media applications emerged. A user of a third-party Twitter app used to store their password directly in the app. Not only was this inconvenient when users wanted to change their password, but it was a major security risk!

OAuth lets the application move away from this by instead reaching out to the social media site directly. The user logs in with the social media site, and the site hands back a special token to...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image