keepgrowing.in Open in urlscan Pro
185.255.40.34  Public Scan

Submitted URL: http://keepgrowing.in/
Effective URL: https://keepgrowing.in/
Submission: On March 28 via api from GB — Scanned from GB

Form analysis 1 forms found in the DOM

GET https://keepgrowing.in/

<form role="search" method="get" class="search-form" action="https://keepgrowing.in/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Text Content

 * 
 * 
 * 
 * 
 * 
 * 

Skip to content
 * Java
   * Spring Boot
 * Tools
 * Taking care
 * Angular
 * About
 * 
 * 
 * 
 * Search for:




SIMPLIFY THE MANAGEMENT OF USER ROLES IN SPRING BOOT

25th March 202225th March 2022 little_pineconeSpring Boot


Spring Security allows us to use role-based control to restrict access to API
resources. However, inserting role names as simple strings can quickly become
cumbersome and increase development cost. Fortunately, we can enclose role
details in an Enum and use custom annotations to simplify management of user
roles in a Spring Boot application. While it still doesn’t provide type-safe
roles, most IDEs will be able to support changes in the code and maintenance.

Read more


CREATE A CUSTOM ANNOTATION TO CONFIGURE SPRING BOOT TESTS

6th March 20226th March 2022 little_pineconeSpring Boot


A custom annotation in Spring Boot tests is an easy and flexible way to provide
the required configuration. We can use it to efficiently group all the
annotations and configuration classes that we would otherwise apply to each test
class separately.

Read more


KEYCLOAK WITH SPRING BOOT #4 – SIMPLE GUIDE FOR ROLES AND AUTHORITIES

27th February 202225th March 2022 little_pineconeSpring Boot


Delegating user management to Keycloak allows us to better focus on meeting the
business needs of an application. However, we still need to provide the
appropriate configuration to translate user roles and privileges between
Keycloak and Spring Boot. Additionally, we’re going to need some handy
techniques for debugging how roles are converted between the two services.

Read more


KEYCLOAK WITH SPRING BOOT #3 – HOW TO AUTHORIZE REQUESTS IN SWAGGER UI

24th February 202223rd March 2022 little_pineconeSpring Boot


Swagger offers various methods to authorize requests to our Keycloak secured
API. I’ll show you how to implement the recommended grant types and why certain
flows are advised against in the OAuth 2.0 specification.

Read more


KEYCLOAK WITH SPRING BOOT #2 – SPRING SECURITY INSTEAD OF KEYCLOAK IN TESTS

24th February 202224th February 2022 little_pineconeSpring Boot


Configuring our Spring Boot API to use Keycloak as an authentication and
authorization server can greatly simplify our codebase. However, it adds another
external dependency that will complicate the integration testing. As a remedy,
we can switch to native Spring Security when executing tests to verify only the
business rules for access control instead of cluttering the code with Keycloak
dependencies.

Read more


KEYCLOAK WITH SPRING BOOT #1 – CONFIGURE SPRING SECURITY WITH KEYCLOAK

24th February 202224th February 2022 little_pineconeSpring Boot


Keycloak provides simple integration with Spring applications. As a result, we
can easily configure our Spring Boot API security to delegate authentication and
authorization to a Keycloak server.

Read more


KECLOAK IN DOCKER #7 – HOW TO AUTHORIZE REQUESTS VIA POSTMAN

8th February 202220th February 2022 little_pineconeTools


Postman comes with a wide variety of OAuth 2.0 compliant configuration options
that allow us to authorize requests against a Keycloak protected API. The
current standard recommendation is to use Authorization Code Flow with PKCE
extension.

Read more


HOW TO ADD X-XSRF-TOKEN HEADER TO POSTMAN REQUESTS

5th February 20226th February 2022 little_pineconeTools


When an API is secured against CSRF attacks, we must ensure that our clients’
requests are adjusted to the security requirements. Learn how to successfully
call an API that uses the Cookie-to-header token approach by adding the
X-XSRF-TOKEN header to Postman requests.

Read more


KEYCLOAK IN DOCKER #6 – HOW TO IMPORT REALMS FROM A DIRECTORY

3rd February 202216th February 2022 little_pineconeTools


If we want to import multiple Keycloak realms, or realm resources are split into
multiple files, we need to execute a directory import at boot time. Fortunately,
running a Keycloak service with Docker makes this task easy.

Read more


KEYCLOAK IN DOCKER #5 – HOW TO EXPORT A REALM WITH USERS AND SECRETS

2nd February 202216th February 2022 little_pineconeTools


Running a Keycloak service in a Docker container allows us to share its
configuration across multiple environments. However, we can also export an
entire Keycloak realm in case we need any backups or data transfer between
servers.

Read more


POSTS NAVIGATION

Older posts
Created by Marta Szymek
 * Privacy Policy

Powered by WordPress | Theme: Astrid by aThemes.
Accept Cookies

This website uses cookies to improve user experience. By using our website you
consent to all cookies in accordance with our Privacy Policy.