Chapter 4. RESTEasy Skeleton Key
Welcome to the fourth chapter! We hope you are enjoying the book, and even more important, learning and understanding what we are transmitting and teaching you. It is time to move forward and immerse yourself in a new chapter.
Once you read this chapter, you will have the knowledge to design, implement, and aggregate additional security levels to your RESTEasy applications, all of this using OAuth and RESTEasy Skeleton Key and some other specific requirements of these technologies, such as setting up an OAuth server. You will learn through practical and descriptive examples of applications, just as we did in previous chapters; we won't get stuck in theory only, and we'll implement applications and explain specific methods and classes to implement OAuth.
In this chapter, you will learn about the following topics:
- OAuth and RESTEasy
- SSO configuration for security management
- Access tokens
- Custom filters
- Web services clients for test
As you have...