Secure Spring Boot Application With Keycloak
I will describe how you can secure your Spring Boot based REST API with the help of Keycloak.
Designing Systems and Crafting Code
I will describe how you can secure your Spring Boot based REST API with the help of Keycloak.
I will describe and explain OpenID Connect Flows. The processes of authentication described in OpenID Connect specification.
In today’s text, I will describe and explain OAuth Grant Types — the processes of authorization. I will start with a quick recap of the most basic OAuth roles. Recap of OAuth Roles Although you probably know them already I want to make a quick recap for everyone reading this to be on the same … Read more
I will be taking a closer look at a queueing theory and its potential applications in the world of software engineering.
Sharding is a technique of splitting some arbitrary set of entities into smaller parts. It is used to achieve better consistency and reduce contention in our systems.
Applicative is just another concept similar in meaning and history to Functors and Monads. Besides explaining the theory behind it, I will implement a simple Applicative. I will also use Optional, to show what advantages Applicatives may give us. The source code for this article is available in GitHub repository. Why Should We Care About … Read more
Functor is a concept originating from mathematics, to be exact, from a part of mathematics called category theory. Here I will try to give you some more insight into Functors — what they are, how they work, and what the theory behind them is. I will also implement a simple Functor to better understand how they work … Read more
In short, the CAP theorem is a mathematical theorem describing how our application will behave in the event of network partitioning. It is one of the most important laws currently in existence. Through the course of this text, I will share more information on this theorem and why it is significant. By the time you’re … Read more
Have you ever wonder what allMatch on empty Stream will return ? Here you will get all information needed to understand why it works this way.
Comprehensive guide through the most commonly used web security standards. In details comparison of SAML OAuth OIDC.