my blog. for you.

Reden wir über Digitales.

Ich bin selbständiger IT Berater und Unternehmer in der Internet und Software Branche. Ich beschäftige mich mit Design, Enterprise Applikationen, Web Apps und SaaS Produkten. Ich entwerfe und entwickle Business Lösungen und Anwendungen. Ich helfe Unternehmen in Sachen Software Qualität und Wissenstransfer, z.B. mit Angular und Spring Boot.

Spring Boot 3, Spring Security 6, and Angular 15

Leider ist der Eintrag nur auf English verfügbar.Spring Boot is frequently used for business applications conjunction with Angular, with Spring Boot providing REST API endpoints and an Angular app delivering a user front-end on top of those endpoints. To help you get started with that kind of setup, particularly when it comes to the subjects of authentication and authorization and how to keep user data secure between the components involved in such an architecture, these GitHub projects can be quite helpful. All ... Read more

Implementing an Oauth 2 Authorization Server With Spring Security – The New Way! by Laurentiu Spilca @ Spring I/O 2022

Leider ist der Eintrag nur auf English verfügbar. Read more

Aaron Parecki – Why Do We Really Need OAuth Anyway? @ beyond tellerrand Düsseldorf 2021

Leider ist der Eintrag nur auf English verfügbar.At this year's beyond tellerrand Düsseldorf IndieWebCamp co-founder and OAuth consultant Aaron Parecki gave a talk about OAuth, why we need it, and how we can use it to simplify authentication and authorization in web applications: Aaron Parecki - Why Do We Really Need OAuth Anyway? - beyond tellerrand Düseldorf 2021 from beyond tellerrand on Vimeo. Aaron also provides a guide to building an OAuth 2.0 server and a video course titled "The Nuts and ... Read more

OAuth 2.0 Authentication with Jira – A Spring Boot Example Application

Leider ist der Eintrag nur auf English verfügbar.When dealing with the specifics of authentication techniques and protocols such as OAuth the devil often is in the detail. While the OAuth 2.0 protocol generally is easy to grasp and simple to use implementation details for specific authentication providers can easily have you hit a snag fairly quickly. Documentation and examples sometimes are outdated or scattered across several - sometimes contradictory documents. Additionally, examples for the authentication provider you want to use might not ... Read more