Nowadays we have scenarios which demand that applications interact with a large number of services and also provide services by themselves distributed as APIs throughout the network. Despite this, it's common to allow users of our applications to grant permissions to third-party applications, where OAuth 2.0 has proven to be a good option.
In this chapter, you will learn how to create, configure, and distribute an OAuth 2.0 Provider covering distinct scenarios using all the grant types described by the OAuth 2.0 specification, as well as how to use different access token management strategies through relational databases and Redis (a NoSQL database). All the recipes in this chapter will be implemented using Spring Security OAuth2, which at the time of writing this book, was at the 2.2.0.RELEASE version (check the official documentation for Spring Security OAuth2...