O'Reilly logo

Spring Security 3.x Cookbook by Anjana Mankale

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Spring Security with OAuth

OAuth authentication has been used widely by many applications. OAuth is a protocol through which applications can share the data in a secured manner. For example, consider a simple scenario in which one photo-sharing application allows the user to upload photos and the second application integrates with all photo-storing applications such as Flickr, Dropbox, and similar sites. When a second application wants to access the first application to print the photos that are uploaded, it uses the OAuth authentication to get confirmation from the user to access the photos. Ideally, it does exchange some security tokens between the applications, that is, the private key of the consumer and the public key of the server should ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required