Summary

In this chapter, we studied and implemented one of the most useful and necessary techniques with the purpose of sharing and protecting our information. Nowadays, applications have dramatically increased their interaction with each other because they want to meet and satisfy the requirements of clients, users, and so on, compromising neither the security nor the integrity of the data while doing this.

In this chapter, we studied several technologies to secure, limit, and authorize the use of our resources to a third-party application, starting with brief but descriptive concepts about OAuth 2.0 authentication, Single Sign-On, filters, and tokens.

Through a practical example and real code, you witnessed how you can grant permission over specific ...

Get RESTful Java Web Services Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.