Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Developing Middleware in Java EE 8
  • Toc
  • feedback
Developing Middleware in Java EE 8

Developing Middleware in Java EE 8

By : Abdalla Mahmoud
close
Developing Middleware in Java EE 8

Developing Middleware in Java EE 8

By: Abdalla Mahmoud

Overview of this book

Middleware is the infrastructure in software based applications that enables businesses to solve problems, operate more efficiently, and make money. As the use of middleware extends beyond a single application, the importance of having it written by experts increases substantially. This book will help you become an expert in developing middleware for a variety of applications. The book starts off by exploring the latest Java EE 8 APIs with newer features and managing dependencies with CDI 2.0. You will learn to implement object-to-relational mapping using JPA 2.1 and validate data using bean validation. You will also work with different types of EJB to develop business logic, and with design RESTful APIs by utilizing different HTTP methods and activating JAX-RS features in enterprise applications. You will learn to secure your middleware with Java Security 1.0 and implement various authentication techniques, such as OAuth authentication. In the concluding chapters, you will use various test technologies, such as JUnit and Mockito, to test applications, and Docker to deploy your enterprise applications. By the end of the book, you will be proficient in developing robust, effective, and distributed middleware for your business.
Table of Contents (12 chapters)
close

Securing an Application with Java Security 1.0

Security is the most important aspect of any middleware solution in the cloud era. By security, we mean authentication and authorization features found in nearly any kind of software solution. Any of your users should log in to identify themselves before delving into your system, and also should be authorized to access whatever resources they are requesting from your system.

Since the beginning of Java EE, security APIs (namely JACC and JASPIC) have always been there. However, over time, those APIs got more complex and became just not flexible enough to support the required features of modern security APIs in an easy and standard manner. Therefore, in Java EE 8, a new security API has been introduced (without elimination of the mentioned legacy APIs) to overcome the problems mentioned earlier.

In this chapter, we're going to...

bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete