CHAPTER 8

image

Security

In this chapter we will discuss:

  • Strategies for securing REST services
  • OAuth 2.0
  • Basics of the Spring Security framework
  • Implementing QuickPoll Security

Traditional Web applications requiring security typically use username/passwords for identification purposes. REST services pose interesting security problems as they can be consumed by a variety of clients such as browsers and mobile devices. They can also be consumed by other services and this machine-to-machine communication might not have any human interaction. It is also not uncommon for clients to consume REST services on behalf of a user. In this chapter, we will explore ...

Get Spring REST now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.