Spring And Keycloak: Api, Authentication And Authorization

Posted By: ELK1nG

Spring And Keycloak: Api, Authentication And Authorization
Published 3/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 511.48 MB | Duration: 1h 48m

IMPORTANT: This course is partially dubbed by AI and partially by the instructor into English.

What you'll learn

Mastery in Authentication and Authorization with Keycloak: Students will learn to set up and manage Keycloak, a high-level identity and access solution.

Integration with Spring Security: Become an expert in integrating Keycloak and Spring Security, securing RESTful APIs with complex authorizations.

Expertise in Docker: Master Docker and Docker-Compose to efficiently create and manage containers, establishing robust development environments.

Secure API with Spring Boot: Develop APIs in Spring Boot with advanced, production-ready authentication, applying the best security practices.

Requirements

Basic Knowledge in Java: Essential to follow the practical classes and understand the logic behind Spring Boot applications.

Introductory Knowledge of Spring Framework: Helps to quickly grasp the advanced concepts of Spring Security and integration with Keycloak.

Java JDK 17 Installed: Necessary for developing and testing Spring Boot applications. Java 17 is recommended to ensure compatibility and use of updated features.

IDE IntelliJ IDEA: Recommended for an integrated and efficient development environment, although other IDEs such as Eclipse or VSCode are also acceptable.

Docker and Docker-Compose Installed: Essential for creating and managing containers, which are fundamental in the course for configuring Keycloak and PostgreSQL.

Database Client (DeBeaver Preferred): A useful tool for viewing and managing data in PostgreSQL, although other database clients can also be used.

Basic Knowledge in Authentication and Authorization: Useful for understanding the main security concepts that will be deepened in the course.

Willingness to Learn and Explore: Important to engage with practical challenges and fully absorb the course content.

Description

This course serves as a valuable resource for developers seeking to streamline their focus on business aspects by entrusting the intricacies of user access management to Keycloak. By leveraging Keycloak's robust capabilities, developers can efficiently manage user authentication and authorization, thereby saving significant development time. This empowers developers to allocate their efforts towards enhancing the core functionality of their systems, accelerating the development process and improving time-to-market. With Keycloak handling the complexities of user access management, developers can avoid the need to reinvent the wheel with each new system iteration. Instead, they can rely on a proven and reliable solution, allowing for consistent and scalable access control across their applications. By embracing Keycloak, developers can enhance the security, scalability, and efficiency of their systems while simultaneously reducing the burden of user access management, ultimately driving business growth and innovation.In addition, this course provides practical insights and hands-on experience to ensure developers can effectively implement Keycloak within their projects. By mastering Keycloak's capabilities, developers can customize access control policies to meet specific project requirements, ensuring seamless integration with existing systems and workflows. This comprehensive approach empowers developers to build robust and secure applications while enhancing user experience and overall system reliability.

Overview

Section 1: Keycloak - Theory, Installation, and Configuration Using Docker.

Lecture 1 Our Journey

Lecture 2 Context

Lecture 3 What is Keycloak

Lecture 4 Why use Keycloak - Part 1

Lecture 5 Why use Keycloak - Part 2

Lecture 6 Key Concepts

Lecture 7 Realms

Lecture 8 Authenticaton and Authorization

Lecture 9 Understanding Roles, Users and Groups

Lecture 10 Tokens, Scopes/Clams, Roles nd Sessions

Lecture 11 Approaches

Lecture 12 Thinking the Structure

Lecture 13 Starting write our docker compose

Lecture 14 Keeping write our docker compose

Lecture 15 Keycloak - Configuring Environment and Users

Section 2: Spring API - Authentication and Authorization.

Lecture 16 Journey - Introduction to our Sprint API

Lecture 17 Refresh Token

Lecture 18 Spring Initializr

Lecture 19 Opening and Running the Project for the First Time

Lecture 20 Application Properties Client Configuration

Lecture 21 Login Endpoint - Part 1

Lecture 22 Login Endpoint - Part 2

Lecture 23 Refactoring Login Endpoint and Creating a Service

Lecture 24 Implementing the Refresh Token

Lecture 25 Admin and Operation Endpoints

This course is ideal for developers and IT professionals looking to deepen their knowledge in application security, authentication, and authorization. It's perfect for those who already have a foundation in Java and Spring Framework and are looking to specialize in Spring Security with Keycloak integration. It's also extremely valuable for developers who want to master the use of Docker and Docker-Compose in development environments. Professionals interested in building robust, secure, and scalable back-end applications with Spring Boot will find in this course a clear and practical path to achieve these goals. Moreover, it's a great opportunity for those who wish to update their skills in cutting-edge technologies and apply them in real project scenarios.