Spring Boot Application Over HTTPS

Introduction In this example I am going to show you how to start your spring boot application on HTTPS protocol. HTTPS is a secured protocol, whereas HTTP is unsecured protocol. So the data passed over the network using HTTPS protocol are generally encrypted data. The application which I am going to build is in the local environment and for this…

Spring Security Pre-Authentication with Spring Data JPA

Introduction In this example I am going to show you Spring Security Pre-authentication hasrole with Spring Data JPA. In my another example I had shown the similar example on Spring Security Pre-Authentication with Spring JDBC Template. There are situations where you want to use Spring Security for authorization, but the user has already been reliably authenticated by some external system…

OWASP Top 10 Securities Consideration In Web Applications

Introduction Here I will discuss about OWASP top 10 securities considerations in web applications. These applications could be anything from standalone to enterprise to web applications. OWASP is an acronym that stands for Open Web Application Security Project (OWASP) and it is a global community that continuously focuses on the improvement of all types of software. A collective efforts from…

Working Principle of Content Security Policy (CSP) in Web Applications

Introduction Here in this tutorial I am going to discuss about working principle of content security policy (CSP) in web applications. What if you want to minimize attacks on your website, what if you want to restrict the content to be displayed on your web site for some security reasons, what if you want to prevent Cross Site Scripting (XSS)…