Chasing Destiny: An Indian IT Engineer’s Triumph in Europe’s Tech Haven
Introduction The dream of living in Europe, with its diverse cultures and stunning landscapes, has always held a special place in my heart. As an IT engineer based in India,…
Introduction The dream of living in Europe, with its diverse cultures and stunning landscapes, has always held a special place in my heart. As an IT engineer based in India,…
While working on a licensing application, I had to develop a system to send heartbeats to a licensing server every 10 mins. In this blog post, we'll explore how to…
In our previous tutorial, we implemented a thin REST API client application to consume secured CRUD REST APIs. However, the client does not support proxy authentication. Therefore, we are going to…
Problem While working on a project recently, I ran into an issue in which Hibernate was unnecessarily executing database queries to fetch some lazy associations. The reason is, I was…
In the previous Part 1, Part 2 & Part 3 tutorial series, we developed REST APIs, secured one API with Basic authentication and all other APIs with OAuth2 JWT authentication,…
In the previous Part 1 & Part 2 tutorial series, we developed REST APIs, secured them with OAuth2 JWT authentication, and documented them using OpenAPI 3 spec. Now, we are…
In the previous article, we implemented user registration and login with OAuth 2.0 bearer token authentication. Now, we are gonna document the API with OpenAPI 3 specification. Introduction The OpenAPI…
In the previous article, we implemented JWT authentication using custom spring security. However, it is not recommended to customize spring security, especially in enterprise-level applications. Because one defect in custom…