Tag: Java
-
OAuth2 and OpenID Connect

In this article, I will compare the OAuth2 and OpenID Connect authentication protocols. I will implement the OpenID Connect with the Spring Security Authorization Server.
-
Spring Cloud Sleuth & Zipkin

In this article I will show how to trace requests between microservices using Spring Cloud Sleuth and Zipkin. Spring Cloud Sleuth will help me identify the logs from a single request between all the microservices. And Zipkin will show me the elapsed times at the microservices.
-
Spring Security and Roles Authorization

In this article I will explain the difference between Authentication and Authorization. I will also explain how to implement the Authorization pattern with Spring Security. For that, I will use the @PreAuthorize annotation.
-
Spring Batch

In this article I will show how to create a complete Spring Batch project. I will show how to configure a Job and the Steps. I will implement a Step with a reader, processor and Writer. I will implement another Step with a Tasklet.
-
The CSRF Protection with Spring Security

In this article I will explain the CSRF attack, the Cross-Site Request Forgery attack. I will show how Spring Security can protect against this attack, in both a server side rendering server and with a separated frontend and the Cookie repository.
-
MongoDB with Spring Data

In this article I show how connect a Spring Boot application with MongoDB. I will show how to configure a Spring Boot application to be connected to a single noSQL database as MongoDB. And I will show how to use Spring Data to request a MongoDB database.
-
Circuit Breaker: Hystrix vs Resilience4J

In this post I’ll show how to use the Circuit Breaker pattern with Hystrix and with Resilience4J.
-
Message Queuing with Apache Kafka and Spring Cloud

In this article I will show how to configure Spring Cloud to publish and read messages from Apache Kafka for the Message Queuing pattern. I will show how to configure Spring Cloud for both the raw Apache Kafka dependency and for the Stream dependency.
-
Log4Shell Vulnerability

In this article I show how the Log4Shell vulnerability can impact. I show how the JNDI commands are intercepted with an LDAP server, and how to protect against this vulnerability.
-
Slf4j, Lockback and Log4J2

In this article I show how to write logs in a Spring Boot application. I also show how to configure the Logback and Log4J2 loggers.
