Handling gRPC Authorization using Context in Java
In the Grpc world, we have secured our application by encrypting the channel and authenticating the requests using interceptors. So we have secured our appli...
In the Grpc world, we have secured our application by encrypting the channel and authenticating the requests using interceptors. So we have secured our appli...
In today’s world microservices has taken the software industry by storm, the reason is obvious, it provides loose coupling, microservices are more reliable a...
Java Streams provide a wide range of collectors which is generally sufficient for most of the day to day use. But sometimes you need to perform some special ...
We have looked into basics of spring security in my previous post. Lets look into how we can authenticate a user from custom list;
In the world of internet, information is flowing across multiple networks. We need to secure our application against the threats posed by hackers or unauthor...