CHAPTER 8

image

Security

In this chapter we will discuss:

  • Strategies for securing REST services
  • OAuth 2.0
  • Basics of the Spring Security framework
  • Implementing QuickPoll Security

Traditional Web applications requiring security typically use username/passwords for identification purposes. REST services pose interesting security problems as they can be consumed by a variety of clients such as browsers and mobile devices. They can also be consumed by other services and this machine-to-machine communication might not have any human interaction. It is also not uncommon for clients to consume REST services on behalf of a user. In this chapter, we will explore ...

Get Spring REST now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.