© Arjan Tijms, Teo Bais, and Werner Keil 2022
A. Tijms et al.The Definitive Guide to Security in Jakarta EEhttps://doi.org/10.1007/978-1-4842-7945-8_3

3. Jakarta Authentication

Arjan Tijms1  , Teo Bais2 and Werner Keil3
(1)
AMSTERDAM, Noord-Holland, The Netherlands
(2)
Utrecht, Utrecht, The Netherlands
(3)
Bad Homburg vdH, Hessen, Germany
 

In this chapter, we’ll be looking at the Jakarta Authentication API/SPI, which obviously has “authentication” as its central topic. In the previous chapter, we learned authentication is about proving that you are who you say you are. Jakarta Authentication is a lower-level API and as such the underpinning of higher-level APIs in the Jakarta security model. Knowledge of Jakarta Authentication helps one to deepen the understanding ...

Get The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.