This tutorial will teach you how to migrate from the depricated WebSecurityConfigurerAdapter towards the content-based security configuration. Spring Security allowed customizing HTTP security by extending a WebSecurityConfigurerAdapter class. This customization included user authorization, user authentication, etc. But in Spring Security 5.7.0-M2 the WebSecurityConfigurerAdapter is deprecated. This is because Spring Framework developers encourage users to move…
Read More Migrate from Deprecated WebSecurityConfigurerAdapter (Solved!)
In this article, we will cover the basics of Aspect-Oriented Programming (AOP). You will learn how to use AspectJ to provide different AOP advices to Spring Boot applications to support cross-cutting issues like logging, profiling, caching, and transaction management and finally we will do a practical implementation to record user operations using Spring Boot AOP.…
Read More A guide to Spring Boot AOP to Record User Operations
In this tutorial, you will learn how to create and configure the new Spring OAuth Authorization Server. Video Demonstration To demonstrate how to configure and use the new Spring Authorization Server, I have created a series of step-by-step video lessons. You can access these video lessons by enrolling in my video course called “OAuth 2.0…
Read More Spring Authorization Server Tutorial
Spring Web MVC – Overview for Beginners (Includes video tutorial) Configure JSP Support (Includes video tutorial) Configure Thymeleaf Support (Includes video tutorial) The Model Object (Includes video tutorial) The ModelMap Object (Includes video tutorial) The ModelAndView Object (Includes video tutorial) Reading URI Path Variables (Includes video tutorial) Reading URL Query String Parameters (Includes video tutorial) Read Form Data in Spring Web MVC…
Read More Spring Web MVC Tutorials
In this tutorial, we are going to see how to insert records into a DynamoDB table using an AWS Lambda function written using Spring Boot Java. We are also going to add an AWS API Gateway trigger to the Lambda function and see how it works. To follow this tutorial, make sure that you have…
Read More Writing into DynamoDB in a Spring Boot App using AWS Lambda
In the previous blog post, we have covered how to grant access to certain endpoints based on the Role configured through code. As we know, Keycloak is the Identity and Access Management solution that provides out-of-the-box authentication and authorization services. One of the services includes a Fine-Grained Authorization Service. Fine-Grained Authorization Service provides businesses with…
Read More Fine-grained Authorization Services in Keycloak with Spring Boot
In this tutorial, you will learn about Spring Boot Actuator. You will also see how it helps to monitor and manage your application seamlessly. Overview The actuator is a monitoring function provided by the Spring Boot framework. The actuator works by exposing endpoints that can be used to monitor the internal conditions of the Spring…
Read More Spring Boot Actuator Tutorial
In the previous tutorial, we learned that how we can do User Authentication with Amazon Cognito in Spring Boot Application. In this tutorial, we will take our previous learnings and continue with the following. Create Rest Controller to handle /login HTTP POST requests. Read username and password from the request body to authenticate with Amazon Cognito…
Read More Amazon Cognito User Authentication in Spring Boot REST
This tutorial will teach you how to use Keycloak to secure your Spring Boot Application. To find other tutorials, check the Keycloak tutorials page. What is Keycloak? According to Keycloak’s official website, It is an open-source Identity and Access Management solution aimed at modern applications and services. It makes it easy to secure applications and…
Read More A Guide to use Keycloak with Spring Boot
In this tutorial, you will learn how to call stored procedures in a Spring Boot RESTful API project that uses Spring Data JPA. Using a stored procedure to execute parts of the application logic in the database is a widely used approach in huge, data-heavy applications. A stored procedure is a group of predefined SQL…
Read More Calling a Stored Procedure in Spring Boot REST with JPA
In this short tutorial, you will learn how to read an ID Token in your Spring Boot Web Application @Controller class. The ID Token is a security token that is issued by the Identity Provider Server and it contains information about the currently authenticated user. For example, from the ID token, you can get the…
Read More Reading OAuth2 ID Token in Spring MVC
In this tutorial, I will share how to generate a self-signed certificate and enable HTTPS/SSL support in a Spring Boot application. You will also learn how to configure the RestTemplate HTTP client to use the same self-signed certificate to communicate with your Web Service over HTTPS. Let’s start by generating a self-signed certificate. Generate Self-Signed…
Read More Enable HTTPs/SSL in Spring Boot App
Below is the list of tutorials that should help you learn how to create a basic configuration and start with different Spring Cloud services. For step-by-step video lessons that teach from the very beginning how to create RESTful Microservices and make them work with Spring Cloud services, please check this page Spring Boot Microservices and…
Read More Microservices and Spring Cloud. Tutorials for Beginners.
In this tutorial, you will learn to create a Docker image for your Spring Cloud Config Server, which uses Symmetric or Asymmetric encryption to protect sensitive information. To learn how to create Spring Cloud Config that uses Symmetric encryption, read Spring Cloud Config – Symmetric Encryption and Decryption(Includes Video tutorial). And to learn how to create Spring…
Read More Docker Image for Spring Cloud Config Server
In this tutorial, you will learn how to use Asymmetric Encryption(RSA key pair) to encrypt sensitive information in configuration properties served by Spring Cloud Config Server. Asymmetric Encryption is a stronger encryption type than symmetric encryption(shared key), but it requires a little bit more effort to set up because we need to generate an encryption key. We…
Read More Spring Cloud Config – Asymmetric Encryption and Decryption