My review on Meta Android Developer Professional Certificate of CourseraI recently completed the [Meta Android Developer Professional] on Coursera, aimed at equipping learners with the foundational skills…Sep 20, 20232Sep 20, 20232
My Review on the ‘Cloud Computing Law’ Specialization in CourseraI finished the specialization in 3 weeks and my movtivation was to understand the terms and conditions(T&C) when using cloud services…Aug 8, 2023Aug 8, 2023
Customize the response of token endpoint and the token claims in Spring-Authorization-ServerIt’s common to customize the token claims of the access token and also the token response of the token endpoint, when using…Jul 20, 2023Jul 20, 2023
I cannot rollback when using DelegatingPasswordEncoderFrom Spring Security 5, there is DelegatingPasswordEncoder which enables supporting different encoding algorithms in the same field.Feb 7, 2023Feb 7, 2023
The issues I encountered when migrating Spring Boot from 2.x to 3.x including Spring SecurityIn this article I share my exprience in migration of Spring boot 3.x. My application contains login/social login, basic auth and hibernate.Jan 24, 20231Jan 24, 20231
The password disaster when migrating authentication serviceLegacy authentication service — seldom touched. How the password should look like when migrating it to na new authentication service?Dec 1, 2022Dec 1, 2022
Using Bcrypt as password encoder can be problematic when passwords are non-ASCII charactersIt’s an issue to simply use the Spring Security BCryp function as password encoder. What is Bcrypt…Nov 24, 20222Nov 24, 20222
My review on “Exploiting and Securing Vulnerabilities in Java Applications” in CourseraMy job recently has to build a solution for user management and protecting OWASP risks is important. Then, I want to know more about how my…Apr 6, 2022Apr 6, 2022
Comparisons of identity management solutionsIt has been some time since the decision on an authentication solution. In the following, I will share some insights and present the…Mar 22, 2022Mar 22, 2022
What is the “strength” parameter in BcryptEncoder of Spring SecurityRecently I was asked about to explain when one application uses BcryptEncoder(10), can the other application uses BcryptEncoder(11) and two…Dec 7, 2021Dec 7, 2021