Through lectures and lab exercises, this 12-hour, deep-dive workshop prepares you to use Micronaut's robust, built-in security capabilities when building microservices and serverless applications using the Framework.
Overview
Many of the Micronaut framework's features, such as token propagation, are specifically designed to boost productivity and simplify coding when working with microservice security.
In this live, instructor-led, online workshop, we provide an in-depth overview of the Micronaut security landscape, using demonstrations and hands-on exercises to prepare participants to use the Framework's security features with confidence.
DETAILS
Dates: March 16, 17, 18, and 19, 2021
Time: 9:00 a.m. to 12:00 p.m. CDT
Location: Online
Instructor: Sergio del Amo Caballero
Registration Fee: $199.00 USD
Objectives
Participants learn how to define security for Micronaut endpoints (@Secured, Intercept URL Map), retrieve the current user, use different authentication flows (basic, ldap, database), and create custom authentication providers.
We also discuss Micronaut's out-of-the-box support for JSON web token (JWT) validation, generation, claims customization, JWKS, and Oauth 2.
Finally, we demonstrate how easy it is to integrate Micronaut apps with an OpenID connect provider, such as AWS Cognito, Auth0, or Okta.
INTENDED AUDIENCE
This workshop is a great learning opportunity for JVM developers interested in learning to leverage Micronaut's wide range of capabilities and build secure apps with the Framework.
Technical Requirements
For the lab exercises, you will need JDK 8 and IntelliJ IDEA Community Edition or Ultimate.
Prerequisites
Although everyone is welcome, we recommend attendees have at least a working familiarity with web development, HTTP, Java, and JVM development frameworks, such as the Grails framework and Spring Boot. Experience with the Micronaut framework is a plus, but not required.
Outline
The following topics are covered in this workshop:
-
Security installation
-
Access authenticated user
-
Define security: @Secured, Intercept URL Map
-
Session-based authentication
-
Basic authentication
-
LDAP authentication
-
Database authentication
-
JSON web token (JWT) validation, generation etc.
-
JWKS
-
Security events
-
Token propagation.
-
Oauth2
-
authorization code flow
-
password grant flows
-
integration with third-party Oauth2 providers: Auth0, Okta, Keycloack, AWS Cognito
-
Duration
12 hours
Schedule a custom offering of this workshop.
Professional Training for Modern Technology Teams
Open Enrollment Courses
Open enrollment courses are a great, cost-effective option for organizations that have an immediate need to train a small number of employees.
Customized Training Programs
Customized training programs can be delivered on-site, in our training lab, or online to help organizations enhance the skills of their internal development teams.