November 2017
Intermediate to advanced
420 pages
10h 29m
English
We started off this chapter by discussing how an application authenticates a user who is trying to access a secured resource. When a client accesses a secured resource, the server identifies and validates the requester, and on successful authentication, the requester is allowed to get inside the application. During this process, the underlying security framework generates a javax.ws.rs.core.SecurityContext object, which holds security-related information pertaining to the requester. The JAX-RS framework allows you to access the SecurityContext object in the code in order to retrieve security-related information pertaining to the current request.
Some of the frequently used methods exposed by