Tag

Java security

0 views collected around this technical thread.

Top Architect
Top Architect
Nov 11, 2024 · Information Security

OAuth 2.0 Overview and Spring Boot Implementation Guide

This article introduces the core concepts and roles of OAuth 2.0, explains its four grant types, and provides a step‑by‑step Spring Boot implementation with complete configuration classes, dependency setup, and testing procedures for both authorization and resource servers.

Java securityOAuth2Resource Server
0 likes · 12 min read
OAuth 2.0 Overview and Spring Boot Implementation Guide
macrozheng
macrozheng
Jan 11, 2024 · Information Security

How to Secure Your SpringBoot Application from Decompilation with ClassFinal

This guide explains how to protect a SpringBoot-based e‑commerce project from source leakage by using code obfuscation or the ClassFinal Maven plugin, detailing configuration, startup options, decompilation results, and machine‑binding to ensure the packaged jar runs only on authorized servers.

ClassFinalJava securitySpringBoot
0 likes · 7 min read
How to Secure Your SpringBoot Application from Decompilation with ClassFinal
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Nov 2, 2023 · Backend Development

Secure Spring Boot Configs: Encrypt Sensitive Data with Spring Cloud

This guide explains why and how to encrypt sensitive information in Spring Boot configuration files using Spring Cloud's built‑in encryption, Jasypt, command‑line parameters, and demonstrates the underlying implementation classes for secure application deployment.

Backend DevelopmentConfiguration EncryptionJasypt
0 likes · 7 min read
Secure Spring Boot Configs: Encrypt Sensitive Data with Spring Cloud
Java Architect Essentials
Java Architect Essentials
Jun 1, 2022 · Information Security

Fastjson 1.2.80 and Earlier Vulnerability: Risks, Affected Versions, and Upgrade Recommendations

Fastjson versions up to 1.2.80 contain a deserialization vulnerability that can bypass autoType restrictions, posing significant remote attack risk; users are advised to upgrade to the latest 1.2.83 release, enable safeMode or use the noneautotype builds, and consider migrating to Fastjson 2.0 for enhanced security.

Java securityLibrary Upgradedeserialization vulnerability
0 likes · 5 min read
Fastjson 1.2.80 and Earlier Vulnerability: Risks, Affected Versions, and Upgrade Recommendations
macrozheng
macrozheng
Dec 12, 2021 · Information Security

Unpacking the Log4j2 Log4Shell Vulnerability: How JNDI Injection Works

This article breaks down the widely publicized Log4j2 (Log4Shell) flaw, explaining the underlying JNDI and LDAP lookup mechanisms, how malicious payloads are executed through log messages, the massive impact across Java ecosystems, and the steps needed to remediate the issue.

JNDI injectionJava securityRemote Code Execution
0 likes · 10 min read
Unpacking the Log4j2 Log4Shell Vulnerability: How JNDI Injection Works
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Nov 8, 2021 · Information Security

Comprehensive Apache Shiro Tutorial: Introduction, Configuration, Realms, Authentication Strategies, Encryption, Salt, Authorization, Spring Integration, and Caching

This extensive guide explains Apache Shiro's core concepts, demonstrates how to set up simple authentication, configure various Realm types, apply multi‑realm authentication strategies, encrypt passwords with hashing and salting, implement custom authorization, integrate Shiro with Spring MVC, explore different login methods, use JSP tags for UI control, and enable caching with Ehcache, providing complete code examples throughout.

Apache ShiroAuthenticationJava security
0 likes · 47 min read
Comprehensive Apache Shiro Tutorial: Introduction, Configuration, Realms, Authentication Strategies, Encryption, Salt, Authorization, Spring Integration, and Caching
Java Captain
Java Captain
Oct 14, 2018 · Information Security

Apache Shiro Java Security Framework Overview and Integration Guide

This article introduces Apache Shiro as a powerful Java security framework, explains its core components such as Subject, SecurityManager, Authenticator, Authorizer, Realm, SessionManager, CacheManager and Cryptography, and provides step‑by‑step integration instructions with Maven, XML configuration, custom realm code, controller logic and JSP tag usage.

Apache ShiroAuthenticationJava security
0 likes · 10 min read
Apache Shiro Java Security Framework Overview and Integration Guide
Java Captain
Java Captain
Apr 27, 2018 · Information Security

Integrating Apache Shiro with Spring MVC: Detailed Example and Configuration Guide

This article provides a step‑by‑step tutorial on using Apache Shiro for authentication, authorization, session management and encryption in a Java web project, covering Maven dependencies, custom Realm implementation, Spring XML configuration, servlet filter setup, controller logic, JSP login page, demo screenshots and common pitfalls.

Apache ShiroAuthenticationJava security
0 likes · 17 min read
Integrating Apache Shiro with Spring MVC: Detailed Example and Configuration Guide