• Complain

Arjan Tijms - The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More

Here you can read online Arjan Tijms - The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Arjan Tijms The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
  • Book:
    The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2022
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Refer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta Authentication & Authorization as its underlying official foundation. Jakarta EE Security implementations are discussed, such as Soteria and Open Liberty, along with the build-in modules and Jakarta EE Security third-party modules, such as Payara Yubikey & OIDC, and OmniFaces JWT-Auth.
The book discusses Jakarta EE Security in relation to SE underpinnings and provides a detailed explanation of how client-cert authentication over HTTPS takes place, how certifications work, and how LDAP-like names are mapped to caller/user names. General (web) security best practices are presented, such as not storing passwords in plaintext, using HTTPS, sanitizing inputs to DB queries, encoding output, and explanations of various (web) attacks and common vulnerabilities are included.
Practical examples of securing applications discuss common needs such as letting users explicitly log in, sign up, verify email safely, explicitly log in to access protected pages, and go direct to the log in page. Common issues are covered such as abandoning an authentication dialog halfway and later accessing protected pages again.
What You Will Learn
  • Know what Jakarta/Java EE security includes and how to get started learning and using this technology for todays and tomorrows enterprise Java applications
  • Secure applications: traditional server-side web apps built with JSF (Faces) as well as applications based on client-side frameworks (such as Angular) and JAX-RS
  • Work with the daunting number of security APIs in Jakarta EE
  • Understand how EE security evolved

Who This Book Is For
Java developers using Jakarta EE and writing applications that need to be secured (every application). Basic knowledge of Servlets and CDI is assumed. Library writers and component providers who wish to provide additional authentication mechanisms for Jakarta EE also will find the book useful.

Arjan Tijms: author's other books


Who wrote The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More? Find out the surname, the name of the author of the book and a list of all author's works by series.

The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of The Definitive Guide to Security in Jakarta EE Arjan Tijms - photo 1
Book cover of The Definitive Guide to Security in Jakarta EE
Arjan Tijms , Teo Bais and Werner Keil
The Definitive Guide to Security in Jakarta EE
Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
Logo of the publisher Arjan Tijms AMSTERDAM Noord-Holland The - photo 2
Logo of the publisher
Arjan Tijms
AMSTERDAM, Noord-Holland, The Netherlands
Teo Bais
Utrecht, Utrecht, The Netherlands
Werner Keil
Bad Homburg vdH, Hessen, Germany
ISBN 978-1-4842-7944-1 e-ISBN 978-1-4842-7945-8
https://doi.org/10.1007/978-1-4842-7945-8
Arjan Tijms, Teo Bais, and Werner Keil 2022
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Apress imprint is published by the registered company APress Media, LLC part of Springer Nature.

The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub (www.github.com). For more detailed information, please visit http://www.apress.com/source-code.

Table of Contents
About the Authors
Arjan Tijms

was a JSF (JSR 372) and Security API (JSR 375) EG member and is currently project lead for a number of Jakarta projects including Jakarta Security, Authentication, Authorization, and Faces and Expression Language. He is the cocreator of the popular OmniFaces library for JSF that was a 2015 Dukes Choice Award winner and has coauthored two books: The Definitive Guide to JSF in Java EE 8 and Pro CDI 2 in Java EE 8. Arjan holds an MSc degree in computer science from the University of Leiden, the Netherlands. He has been involved with Jakarta EE Security since around 2010, has created a set of tests that most well-known vendors have used (IBM, Oracle, Red Hat) to improve their offerings, was part of the JSR 375 (EE Security) EG, and has been the main architect of the security API and its initial RI implementation Soteria. Arjan has also written and certified the MicroProfile JWT implementation for Payara. He has been mentored by Suns (later Oracles) security expert Ron Monzillo. He has written a large series of blog posts about EE Security that have attracted a lot of views. As such, writing a book about Jakarta EE Security is very natural to him.

Teo Bais

is a software development manager, Scrum master, and programmer who contributes to the prosperity of the (software) community in several ways. He is the founder and leader of Utrecht Java User Group, which counts over 2600 members and has hosted over 45 events and amazing speakers (James Gosling, Uncle Bob, and over 20 Java Champions, among others), and is running three programs: Devoxx4kids, Speaker Incubator, and uJCP. Teo served JSR-385 (JSR of the Year 2019) as an EG member and was nominated as JCP Participant of the Year in 2019. Teo Bais enjoys sharing his knowledge as a public speaker to help others achieve their goals in career and life.

Werner Keil

is a cloud architect, Eclipse RCP, and Microservices expert for a large bank. He helps Global 500 Enterprises across industries and leading IT vendors. He worked for over 30 years as IT manager, PM, coach, SW architect, and consultant for the finance, mobile, media, transport, and public sectors. Werner develops enterprise systems using Java, Java/Jakarta EE, Oracle, IBM, Spring or Microsoft technologies, JavaScript, Node.js, Angular, and dynamic or functional languages. Werner is Committer at the Apache Foundation and the Eclipse Foundation, Babel Language Champion, UOMo Project Lead, and active member of the Java Community Process in JSRs like 321 (Trusted Java), 344 (JSF 2.2), 354 (Money, also Maintenance Lead), 358/364 (JCP.next), 362 (Portlet 3), 363 (Unit-API 1), 365 (CDI 2), 366 (Java EE 8), 375 (Java EE Security), 380 (Bean Validation 2), and 385 (Unit-API 2, also Spec Lead), and was the longest serving Individual Member of the Executive Committee for nine years in a row till 2017. Werner is currently the community representative in the Jakarta EE Specification Committee. He was among the first five Jakarta EE ambassadors when it was founded as Java EE Guardians and is a member of its Leadership Council.

About the Technical Reviewer
Yogesh Shetty

works as a senior software engineer for a European financial institution based in Amsterdam. He is currently involved with designing and developing applications in the payments area. He loves to connect problems in the business domain with technologies in the solution domain mainly using the Java/JEE suite of technologies.

When not working, he unwinds by cycling through the idyllic Dutch countryside or with a book in hand.

Arjan Tijms, Teo Bais, and Werner Keil 2022
A. Tijms et al. The Definitive Guide to Security in Jakarta EE https://doi.org/10.1007/978-1-4842-7945-8_1
1. Security History
Arjan Tijms
(1)
AMSTERDAM, Noord-Holland, The Netherlands
(2)
Utrecht, Utrecht, The Netherlands
(3)
Bad Homburg vdH, Hessen, Germany

This chapter describes the history of security in Jakarta EE, starting from its early conception and ending where we are today at the moment of writing. Well take a look at how the security APIs themselves evolved, how various frameworks were created in response to restrictions and shortcomings in Jakarta EE security APIs, and who some of the people were that were involved in this. Note that well be mostly using the term EE throughout this chapter, even for those moments in time where it was called Java 2 Enterprise Edition (J2EE) , or Java EE. Likewise well be using Jakarta Authentication for the moment in time where it was called JMAC (Java Message Authentication SPI for Container(s)) or JASPIC (Java Authentication SPI for Containers) and use Jakarta Authorization for when it was called JACC (Jakarta Authorization Contract for Containers).

The Beginning

The story of security in Jakarta EE starts with how security in Java SE itself was conceived. Java was originally designed to support embedded usage such as running inside set-top boxes. At the time of its introduction, this shifted to so-called applets , which were small applications embedded in web pages that executed on the computer of the user visiting such web page. In that environment, the applet code is foreign and potentially hostile to the user. The local JVM on the users computer therefore employs a security model that protects the user and the computer against this downloaded code doing anything harmful. In broad lines, this works by a system of permissions being assigned to downloaded application code, like a

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More»

Look at similar books to The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More»

Discussion, reviews of the book The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.