~Get Your Files Here !/08. Auditing Access to the Application/01. Introduction.mp433.86MB
~Get Your Files Here !/08. Auditing Access to the Application/02. Auditing User Access to a Spring Application.mp44.52MB
~Get Your Files Here !/08. Auditing Access to the Application/03. Demo - Auditing User Access in NekoShlink with Spring Security and Spring Actuator Event.mp412.75MB
~Get Your Files Here !/08. Auditing Access to the Application/04. Auditing Access to Data in a Spring Application.mp44.16MB
~Get Your Files Here !/08. Auditing Access to the Application/05. Demo - Auditing Data Access in NekoShlink with JPA Callbacks and Spring Data Audit.mp412.17MB
~Get Your Files Here !/08. Auditing Access to the Application/06. Auditing Changes to Data and Storing Historical Data with Hibernate Envers.mp42.72MB
~Get Your Files Here !/08. Auditing Access to the Application/07. Demo - Integrating Hibernate Envers to NekoShlink.mp48.11MB
~Get Your Files Here !/08. Auditing Access to the Application/08. Auditing Changes to Data and Storing Historical Data with JaVers.mp41.73MB
~Get Your Files Here !/08. Auditing Access to the Application/09. Demo - Integrating JaVers to NekoShlink.mp411.2MB
~Get Your Files Here !/08. Auditing Access to the Application/10. Summary.mp4872.79KB
~Get Your Files Here !/08. Auditing Access to the Application/11. Course Wrap-up.mp438.76MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp44.19MB
~Get Your Files Here !/2. Manually Securing a CLI Application/1. Introduction.mp449.12MB
~Get Your Files Here !/2. Manually Securing a CLI Application/2. An Overview of the Sample Application - NekoShlink.mp49.25MB
~Get Your Files Here !/2. Manually Securing a CLI Application/3. Demo - Getting Familiar with NekoShlink.mp46.88MB
~Get Your Files Here !/2. Manually Securing a CLI Application/4. Introducing Spring Security Internals.mp411.44MB
~Get Your Files Here !/2. Manually Securing a CLI Application/5. Demo - Securing the NekoShlink CLI.mp423.01MB
~Get Your Files Here !/2. Manually Securing a CLI Application/6. Summary.mp4749.66KB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/1. Introduction.mp439.44MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/2. The NekoShlink REST Project.mp43.42MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/3. Demo - Getting Familiar with the NekoShlink REST .mp47.57MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/4. Demo - Adding API Key Authentication with a Custo.mp418.74MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/5. Transport Layer Security (TLS) and Server X.509 C.mp44.08MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/6. Demo - Adding TLS to NekoShlink.mp412.89MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/7. Mutual Transport Layer Security (mTLS) and Client.mp41.9MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/8. Demo - Adding mTLS to NekoShlink.mp414.4MB
~Get Your Files Here !/3. Adding Authentication to a RESTful API with Spring Security and Spring Boot/9. Summary.mp4903.07KB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/1. Introduction.mp438.01MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/2. User Repositories in Spring Security.mp48.37MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/3. Demo - A Custom DAO Authentication Provider for NekoShlink.mp421.04MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/4. Spring Security Login Options.mp48.94MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/5. Demo - Basic and Form-based Challanges in NekoShlink.mp410.22MB
~Get Your Files Here !/4. Creating and Maintaining a User Base for your RESTful API/6. Summary.mp41.51MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/1. Introduction.mp444.61MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/2. OAuth2 Overview.mp46.02MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/3. OpenID Connect (OIDC) Overview.mp43.34MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/4. OAuth2 (and OIDC) Servers.mp43.05MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/5. Demo - Setting up the Spring Authorization Server.mp416.08MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/6. OAuth2 Flows.mp43.31MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/7. Demo - Using the Spring Authorization Server in NekoShlink.mp410.61MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/8. Demo - Using KeyCloak in NekoShlink.mp416.36MB
~Get Your Files Here !/5. Implementing OIDC Authentication with KeyCloak/9. Summary.mp4811.38KB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/1. Introduction.mp434.71MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/2. Authorizing HTTP Endpoints.mp47.88MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/3. Demo - Role-based Authorization for NekoShlinks REST Endpoints.mp49.3MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/4. Role Hierarchies.mp42.93MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/5. Demo - Using Role Hierarchies with NekoShlink Roles.mp47.89MB
~Get Your Files Here !/6. Adding Authorization to the RESTful API Endpoints/6. Summary.mp4903.89KB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/1. Introduction.mp451.13MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/2. Applying Method-level Security to Web Endpoints.mp48.31MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/3. Applying Method-level Security to Service Beans.mp44.72MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/4. Declaring and Using Custom Security Annotations.mp43.42MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/5. The Need for RunAs Delegation.mp43.36MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/6. Demo - Using RunAs Delegation in NekoShlink.mp47.13MB
~Get Your Files Here !/7. Adding Authorization to the Business Logic Services/7. Summary.mp41.58MB