Chapter 4. RESTEasy Skeleton Key

Welcome to the fourth chapter! We hope you are enjoying the book, and even more important, learning and understanding what we are transmitting and teaching you. It is time to move forward and immerse yourself in a new chapter.

Once you read this chapter, you will have the knowledge to design, implement, and aggregate additional security levels to your RESTEasy applications, all of this using OAuth and RESTEasy Skeleton Key and some other specific requirements of these technologies, such as setting up an OAuth server. You will learn through practical and descriptive examples of applications, just as we did in previous chapters; we won't get stuck in theory only, and we'll implement applications and explain specific ...

Get RESTful Java Web Services Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.