Category: Software, Database, Security, Redis, github

Security is generally a topic that is left out when talking about software architecture, but that doesn’t mean that it is not essential. To talk more about it, we created this series on Java API security with Jakarta EE. In this third part, we will talk about the OAuth2 authentication process, moving it quickly to the cloud, and how to implement it with two MongoDB and Redis databases.

And it is only for this reason that we are using private visibility and public access methods, in cases where we have no other option.

It continues to load user information and permission rules, however, there is no password validation, as all of this is done by the user's identifier.

Related Articles