Posts

Showing posts with the label JWT

Kotlin Spring Security JWT Authorization and Authentication

Image
Hello everyone, today we will learn how to handle authentication and authorization on RESTful APIs written with Kotlin & Spring Boot. GitHub repository link is provided at the end of this tutorial. You can download the source code. Technologies used: Kotlin   is an open-source statically typed programming language. It is object-oriented and supports functional programming features. It is designed for the JVM (Java Virtual Machine) Spring boot  is used to develop REST web services and microservices. Spring Boot has taken the Spring framework to the next level. It has drastically reduced the configuration and setup time required for spring projects. We can set up a project with almost zero configuration and start building the things that actually matter to your application. Spring Security  is a Java/Java EE framework that provides authentication, authorization, and other security features for enterprise applications. JSON Web Token (JWT)  is an open standard (RFC 7519) that defines

Authentication and Authorization with Spring Security & JWT

Image
Hello everyone, today we will learn how to handle authentication and authorization on RESTful APIs written with Spring Boot. GitHub repository link is provided at the end of this tutorial. You can download the source code. Technologies used: Spring boot is used to develop REST web services and microservices. Spring Boot has taken the Spring framework to the next level. It has drastically reduced the configuration and setup time required for spring projects. We can set up a project with almost zero configuration and start building the things that actually matter to your application. Spring Security is a Java/Java EE framework that provides authentication, authorization, and other security features for enterprise applications. JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be sig