Take your programming skills to the next level with our Java e-learning programme

Spring Security Module 3

featuring Spring Security, SSO and LDAP Authentication
  • This is an early release for subscribers. The course will be available for sale as soon as the last chapter is completed.
  • Coming later will be further chapters on ACLs and OpenIdConnect.
  • Part of our Spring Training series.

Contents -

 

Having problems? check the errata for this course.

1

Introduction - Interim Release with Enterprise SSO


1 m 31 s
This course will be released for retail when the final chapters have been added. Richard Chesterwood explains the plans for the course. Newly added for April 2016 are 3 chapters on Enterprise SSO.

2

Business Tier Authorization


40 m 58 s
How to use annotations to define access rules at the method level

3

Pre and Post Authorization


27 m 57 s
More advanced annotations for fine grained access control

4

LDAP Introduction


27 m 40 s
The basics of LDAP, for anyone new to the concept.

5

LDAP Authentication


41 m 6 s
How to integrate Spring Security with LDAP

6

Introducing Spring Social


55 m 59 s
This is a side project which allows your applications to connect to many social media providers. Although we are using it for Single Sign On only, this chapter gives a good overview, and we connect to Facebook to acquire a friends and posts graph.

7

SSO with Spring Social


29 m 19 s
We start the work of configuring Spring Security to work with Facebook as an SSO provider.

8

SSO with Spring Social - 2


66 m 39 s
This chapter completes the work of Facebook integration, and the completes the job with LinkedIn and Twitter.

9

Enterprise SSO - Installing CAS


31 m 39 s
What is Enterprise SSO? We use a common SSO provider called "Common Authentication Server" or CAS, and this chapter installs and configures.

10

Integrating CAS with Spring Security


40 m 48 s
We now need to integrate CAS with our application. At first, we'll be using a hardcoded user on the CAS system....

11

CAS and LDAP


46 m 3 s
...and finally, we point CAS at a true repository of users. We are using LDAP (we think the most common choice) but the process is similar for JDBC.

Let the Course Come to You

About Us Pricing Frequently Asked Questions Contact Privacy T&Cs Affiliates and Resellers
Facebook Twitter YouTube