Magnetic link has been copied to the cutting board

Name [ TutGator.com ] PluralSight - Securing REST Services Using Spring Security 5

File Type video

Size 701.21MB

UpdateDate 2024-6-29

hash *****FB8236970A17E5135804C15A6314C6B348

Hot 2

Files Get Bonus Downloads Here.url | 178B ~Get Your Files Here !/02/manually-securing-a-cli-application-slides.pdf | 6.62MB ~Get Your Files Here !/03/adding-authentication-to-a-restful-api-with-spring-security-and-spring-boot-slides.pdf | 4.68MB ~Get Your Files Here !/04/creating-and-maintaining-a-user-base-for-your-restful-api-slides.pdf | 3.53MB ~Get Your Files Here !/05/implementing-oidc-authentication-with-keycloak-slides.pdf | 7.81MB ~Get Your Files Here !/06/adding-authorization-to-the-restful-api-endpoints-slides.pdf | 938.51KB ~Get Your Files Here !/07/adding-authorization-to-the-business-logic-services-slides.pdf | 1.63MB ~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.mp4 | 33.86MB ~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.vtt | 2.98KB ~Get Your Files Here !/08. Auditing Access to the Application/02. Auditing User Access to a Spring Application.mp4 | 4.52MB ~Get Your Files Here !/08. Auditing Access to the Application/02. Auditing User Access to a Spring Application.vtt | 4.29KB ~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.mp4 | 12.75MB ~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.vtt | 4.92KB ~Get Your Files Here !/08. Auditing Access to the Application/04. Auditing Access to Data in a Spring Application.mp4 | 4.16MB ~Get Your Files Here !/08. Auditing Access to the Application/04. Auditing Access to Data in a Spring Application.vtt | 4.28KB ~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.mp4 | 12.17MB ~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.vtt | 4.30KB ~Get Your Files Here !/08. Auditing Access to the Application/06. Auditing Changes to Data and Storing Historical Data with Hibernate Envers.mp4 | 2.72MB ~Get Your Files Here !/08. Auditing Access to the Application/06. Auditing Changes to Data and Storing Historical Data with Hibernate Envers.vtt | 2.70KB ~Get Your Files Here !/08. Auditing Access to the Application/07. Demo - Integrating Hibernate Envers to NekoShlink.mp4 | 8.11MB ~Get Your Files Here !/08. Auditing Access to the Application/07. Demo - Integrating Hibernate Envers to NekoShlink.vtt | 2.59KB ~Get Your Files Here !/08. Auditing Access to the Application/08. Auditing Changes to Data and Storing Historical Data with JaVers.mp4 | 1.73MB ~Get Your Files Here !/08. Auditing Access to the Application/08. Auditing Changes to Data and Storing Historical Data with JaVers.vtt | 2.03KB ~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.mp4 | 11.20MB ~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.vtt | 3.66KB ~Get Your Files Here !/08. Auditing Access to the Application/10. Summary.mp4 | 872.79KB ~Get Your Files Here !/08. Auditing Access to the Application/10. Summary.vtt | 783B ~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.mp4 | 38.76MB ~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.vtt | 3.51KB ~Get Your Files Here !/08/auditing-access-to-the-application-slides.pdf | 1.56MB ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 | 4.19MB ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt | 2.55KB ~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.mp4 | 49.12MB ~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.vtt | 5.08KB ~Get Your Files Here !/2. Manually Securing a CLI Application/2. An Overview of the Sample Application - NekoShlink.mp4 | 9.25MB ~Get Your Files Here !/2. Manually Securing a CLI Application/2. An Overview of the Sample Application - NekoShlink.vtt | 7.44KB ~Get Your Files Here !/2. Manually Securing a CLI Application/3. Demo - Getting Familiar with NekoShlink.mp4 | 6.88MB ~Get Your Files Here !/2. Manually Securing a CLI Application/3. Demo - Getting Familiar with NekoShlink.vtt | 3.38KB ~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.mp4 | 11.44MB ~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.vtt | 10.24KB ~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.mp4 | 23.01MB ~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.vtt | 9.29KB ~Get Your Files Here !/2. Manually Securing a CLI Application/6. Summary.mp4 | 749.66KB ~Get Your Files Here !/2. Manually Securing a CLI Application/6. Summary.vtt | 756B ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.mp4 | 39.44MB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.vtt | 5.01KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/2. The NekoShlink REST Project.mp4 | 3.42MB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/2. The NekoShlink REST Project.vtt | 3.67KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/3. Demo - Getting Familiar with the NekoShlink REST .mp4 | 7.57MB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/3. Demo - Getting Familiar with the NekoShlink REST .vtt | 3.22KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.mp4 | 18.74MB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.vtt | 8.38KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/5. Transport Layer Security (TLS) and Server X.509 C.mp4 | 4.08MB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/5. Transport Layer Security (TLS) and Server X.509 C.vtt | 3.93KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.mp4 | 12.89MB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.vtt | 7.10KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/7. Mutual Transport Layer Security (mTLS) and Client.mp4 | 1.90MB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/7. Mutual Transport Layer Security (mTLS) and Client.vtt | 1.76KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.mp4 | 14.40MB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.vtt | 6.83KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/9. Summary.mp4 | 903.07KB ~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/9. Summary.vtt | 866B ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.mp4 | 38.01MB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.vtt | 3.27KB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/2. User Repositories in Spring Security.mp4 | 8.37MB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/2. User Repositories in Spring Security.vtt | 7.03KB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.mp4 | 21.04MB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.vtt | 7.25KB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/4. Spring Security Login Options.mp4 | 8.94MB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/4. Spring Security Login Options.vtt | 8.06KB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/5. Demo - Basic and Form-based Challanges in NekoShlink.mp4 | 10.22MB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/5. Demo - Basic and Form-based Challanges in NekoShlink.vtt | 4.87KB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/6. Summary.mp4 | 1.51MB ~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/6. Summary.vtt | 1.78KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.mp4 | 44.61MB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.vtt | 3.96KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/2. OAuth2 Overview.mp4 | 6.02MB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/2. OAuth2 Overview.vtt | 5.49KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/3. OpenID Connect (OIDC) Overview.mp4 | 3.34MB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/3. OpenID Connect (OIDC) Overview.vtt | 3.55KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/4. OAuth2 (and OIDC) Servers.mp4 | 3.05MB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/4. OAuth2 (and OIDC) Servers.vtt | 2.56KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.mp4 | 16.08MB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.vtt | 6.50KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/6. OAuth2 Flows.mp4 | 3.31MB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/6. OAuth2 Flows.vtt | 3.23KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.mp4 | 10.61MB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.vtt | 4.49KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.mp4 | 16.36MB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.vtt | 9.02KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/9. Summary.mp4 | 811.38KB ~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/9. Summary.vtt | 851B ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.mp4 | 34.71MB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.vtt | 3.24KB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/2. Authorizing HTTP Endpoints.mp4 | 7.88MB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/2. Authorizing HTTP Endpoints.vtt | 6.77KB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/3. Demo - Role-based Authorization for NekoShlinks REST Endpoints.mp4 | 9.30MB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/3. Demo - Role-based Authorization for NekoShlinks REST Endpoints.vtt | 3.71KB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/4. Role Hierarchies.mp4 | 2.93MB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/4. Role Hierarchies.vtt | 2.95KB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/5. Demo - Using Role Hierarchies with NekoShlink Roles.mp4 | 7.89MB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/5. Demo - Using Role Hierarchies with NekoShlink Roles.vtt | 2.67KB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/6. Summary.mp4 | 903.89KB ~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/6. Summary.vtt | 983B ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.mp4 | 51.13MB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.vtt | 4.70KB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/2. Applying Method-level Security to Web Endpoints.mp4 | 8.31MB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/2. Applying Method-level Security to Web Endpoints.vtt | 6.51KB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/3. Applying Method-level Security to Service Beans.mp4 | 4.72MB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/3. Applying Method-level Security to Service Beans.vtt | 2.33KB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/4. Declaring and Using Custom Security Annotations.mp4 | 3.42MB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/4. Declaring and Using Custom Security Annotations.vtt | 1.93KB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/5. The Need for RunAs Delegation.mp4 | 3.36MB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/5. The Need for RunAs Delegation.vtt | 2.40KB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/6. Demo - Using RunAs Delegation in NekoShlink.mp4 | 7.13MB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/6. Demo - Using RunAs Delegation in NekoShlink.vtt | 2.51KB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/7. Summary.mp4 | 1.58MB ~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/7. Summary.vtt | 1.75KB ~Get Your Files Here !/Bonus Resources.txt | 386B

Recommend

Magnetic link has been copied to the cutting board