This chapter describes the history of security in Jakarta EE, starting from its early conception and ending where we are today at the moment of writing. We’ll take a look at how the security APIs themselves evolved, how various frameworks were created in response to restrictions and shortcomings in Jakarta EE security APIs, and who some of the people were that were involved in this. Note that we’ll be mostly using the term ...
1. Security History
Get The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.