Building Secure Microservice and Serverless Applications With The Micronaut Framework

Through lectures and lab exercises, this 12-hour, deep-dive workshop prepares you to use Micronaut's robust, built-in security capabilities when building microservices and serverless applications using the Framework. 

Overview

Many of the Micronaut framework's features, such as token propagation, are specifically designed to boost productivity and simplify coding when working with microservice security.

In this live, instructor-led, online workshop, we provide an in-depth overview of the Micronaut security landscape, using demonstrations and hands-on exercises to prepare participants to use the Framework's security features with confidence.

DETAILS

Dates: March 16, 17, 18, and 19, 2021

Time: 9:00 a.m. to 12:00 p.m. CDT

Location: Online

Instructor: Sergio del Amo Caballero

Registration Fee: $199.00 USD

Enroll Now

Objectives

Participants learn how to define security for Micronaut endpoints (@Secured, Intercept URL Map), retrieve the current user, use different authentication flows (basic, ldap, database), and create custom authentication providers.

We also discuss Micronaut's out-of-the-box support for JSON web token (JWT) validation, generation, claims customization, JWKS, and Oauth 2. 

Finally, we demonstrate how easy it is to integrate Micronaut apps with an OpenID connect provider, such as AWS Cognito, Auth0, or Okta.

INTENDED AUDIENCE

This workshop is a great learning opportunity for JVM developers interested in learning to leverage Micronaut's wide range of capabilities and build secure apps with the Framework.

Technical Requirements

For the lab exercises, you will need JDK 8 and IntelliJ IDEA Community Edition or Ultimate.

Prerequisites

Although everyone is welcome, we recommend attendees have at least a working familiarity with web development, HTTP, Java, and JVM development frameworks, such as the Grails framework and Spring Boot. Experience with the Micronaut framework is a plus, but not required.

Outline

The following topics are covered in this workshop:

  • Security installation

  • Access authenticated user

  • Define security: @Secured, Intercept URL Map

  • Session-based authentication

  • Basic authentication

  • LDAP authentication

  • Database authentication

  • JSON web token (JWT) validation, generation etc.

  • JWKS

  • Security events

  • Token propagation.

  • Oauth2

    • authorization code flow

    • password grant flows

    • integration with third-party Oauth2 providers: Auth0, Okta, Keycloack, AWS Cognito

Duration

12 hours

Schedule a custom offering of this workshop.

Professional Training for Modern Technology Teams

Sign up today for open enrollment technology training.

Open Enrollment Courses

Open enrollment courses are a great, cost-effective option for organizations that have an immediate need to train a small number of employees.

View Course Schedule

Customized technology training designed to meet your team's specific needs

Customized Training Programs

Customized training programs can be delivered on-site, in our training lab, or online to help organizations enhance the skills of their internal development teams.

Request More Information

secret