Author: Editorial Team
-
Java 9 try-with-resources enhancement
1. Introduction From JDK 9 onwards, you can use the resource reference variables created outside of try block directly in try block resources’ list. That is, the resource reference variables need not be local to try block. Before Java 9, the resource reference variables created outside of try block can not be used as a…
-
Private methods in Java 9 interfaces
1. Introduction From Java 9, private methods can be added to Java interfaces. In this tutorial, we’ll discuss the purpose of adding private methods in Java and how to define these methods in an interface. 2. Why private methods in Java interface? Java 8 allowed interface to have methods with implementation logic. Such methods are…
-
A guide to Java KeyStore and KeyStore API
1. Introduction In this tutorial, we’ll discuss a very important concept of security – keystore. A keystore is a storage facility for cryptographic keys and certificates and represented by java.security.KeyStore class in Java. A KeyStore manages different types of entries and the three basic type of entries are PrivateKey, SecretKey and Certificate. Let us discuss…
-
TLS Handshake process
1. Introduction A TLS handshake is the first step that starts the a TLS communication session. During a TLS handshake, the two parties in the communication exchange acknowledgement messages, verify each other, agree on the cryptographic algorithms to be used in communication and agree on session keys. SSL was replaced by TLS (Transport Layer Security),…
-
What is HTTPS
1. Introduction Hypertext transfer protocol secure (HTTPS) is the secure version of HTTP. The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web. HTTP is an application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack. In HTTPS, the data…
-
OAuth 2.0 protocol flow
1. Introduction In this tutorial, we’ll discuss the OAuth 2.0 protocol flow. We’ll discuss the basic protocol flow. There are other variations to this flow bases on the different use cases, for example in case of refresh tokens there is an extra step to get the new access token in case the existing access token…
-
What is OAuth 2.0?
1. Introduction OAuth 2.0 is the industry-standard protocol for authorization. OAuth 2.0 is an open protocol (or you can say a set of specifications) that allows developers to authorize users from web, mobile and desktop applications. This specification and its extensions are being developed within the IETF OAuth Working Group. One important point to note…
-
Spring Boot password encryption for application properties file using Jasypt
1. Introduction In this tutorial, we’ll learn how to encrypt sensitive information in Spring Boot application configuration file (application.properties or application.yml), such as username and password of datasource using Jasypt library. When you create a Spring Boot application, you keep properties in configuration files (application.properties or application.yaml). You should not keep sensitive configuration values in…
-
Service-oriented architecture
1. Introduction Service-oriented architecture (SOA) is a method of software development that uses software components called services to create business applications. Each service provides a business capability. Services can communicate with each other across platforms and languages. Services are reusable and can be used in different systems or can be combined to perform complex tasks.…
-
Monolithic architecture
1. Introduction This is the first article of Microservices with Spring series. In this article, we’ll discuss the monolithic architecture and its drawbacks which lead to the popularity of microservices. Not every architecture is bad and have few advantages. We’ll discuss advantages and disadvantages of monolithic architecture as well. 2. Monolithic architecture In the monolithic…
