O'Reilly logo

Spring REST by Sudha Belida, Balaji Varanasi

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 8

image

Security

In this chapter we will discuss:

  • Strategies for securing REST services
  • OAuth 2.0
  • Basics of the Spring Security framework
  • Implementing QuickPoll Security

Traditional Web applications requiring security typically use username/passwords for identification purposes. REST services pose interesting security problems as they can be consumed by a variety of clients such as browsers and mobile devices. They can also be consumed by other services and this machine-to-machine communication might not have any human interaction. It is also not uncommon for clients to consume REST services on behalf of a user. In this chapter, we will explore ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required