Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Spring Boot 3.0

You're reading from  Mastering Spring Boot 3.0

Product type Book
Published in Jun 2024
Publisher Packt
ISBN-13 9781803230788
Pages 256 pages
Edition 1st Edition
Languages
Author (1):
Ahmet Meric Ahmet Meric
Profile icon Ahmet Meric
Toc

Table of Contents (16) Chapters close

Preface 1. Part 1: Architectural Foundations
2. Chapter 1: Introduction to Advanced Spring Boot Concepts 3. Part 2: Architectural Patterns and Reactive Programming
4. Chapter 2: Key Architectural Patterns in Microservices – DDD, CQRS, and Event Sourcing 5. Chapter 3: Reactive REST Development and Asynchronous Systems 6. Part 3: Data Management, Testing, and Security
7. Chapter 4: Spring Data: SQL, NoSQL, Cache Abstraction, and Batch Processing 8. Chapter 5: Securing Your Spring Boot Applications 9. Chapter 6: Advanced Testing Strategies 10. Part 4: Deployment, Scalability, and Productivity
11. Chapter 7: Spring Boot 3.0 Features for Containerization and Orchestration 12. Chapter 8: Exploring Event-Driven Systems with Kafka 13. Chapter 9: Enhancing Productivity and Development Simplification 14. Index 15. Other Books You May Enjoy

Implementing RBAC in Spring Boot

Making sure that users only get access to the resources that they are entitled to is of paramount importance in the landscape of modern web development. This is where RBAC comes in. Imagine setting up a series of gates within your application, each requiring a specific key that only certain users possess. This is the essence of RBAC—ensuring that access is granted based on the roles assigned to a user, enhancing both security and usability.

Why prioritize RBAC in your Spring Boot application with Keycloak? Well, first of all, it simplifies the complex task of access management, making it easier for developers to define and enforce security policies. This allows your applications to tap into Keycloak’s great support for OAuth2 and provides a very structured, scalable way to secure endpoints. This will make your application more secure and its features clearer when it comes to controlling access to a user. As we delve more into setting...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime