SlideShare a Scribd company logo
Stormpath 101:
Spring Boot & Spring Security
Welcome!
• Agenda
• Stormpath 101 (5 mins)
• Get Started with Spring Boot (25 mins)
• Q&A (30 mins)
• Claire Hunsaker
VP of Marketing & Customer Success
• Micah Silverman
Java Developer Evangelist
Customer Identity Poses Major Challenges
Speed to Market & Cost Reduction
• Complete Identity solution out-of-the-box
• Security best practices and updates by default
• Clean & elegant API/SDKs
• Little to code, no maintenance
Focus on Your Core Competency
Stormpath User Management
User Data
User
Workflows Google ID
Your Applications
Application SDK
Application SDK
Application SDK
ID Integrations
Facebook
Active
Directory
SAML
Features
• Secure, flexible Authentication
(Password, Token, OAuth, API)
• Deep Authorization
Groups, Roles
Customer Organizations
Permissions
• Customer Profile Data
• Single Sign-On Across Your Apps
• Hosted User Screens
Authentication Pain Points in Java
Typical Authentication coding tasks:
• Large pile of code
• NOTHING to do with your business
• And you must maintain
You’re on your own:
• DO NOT forget to encrypt those passwords
• DO NOT forget to include csrf tokens in your
templates
Authentication Pain Points in Java
Authentication Pain Points in Java
Authentication Pain Points in Java
Authentication Pain Points in Java
Stormpath, Spring Boot, and You
1. Create a Stormpath account
2. Create and API Access keyset
3. stormpath-default-spring-boot-starter
4. Write your Spring Boot App
Quickstart: Setting Up Stormpath
with Spring Security
LET’S LOOK AT SOME CODE!
Java Resources
• Token Auth for Spring Boot + Stormpath
https://stormpath.com/blog/token-auth-for-java/
• SSO with Spring Boot + Stormpath
https://stormpath.com/blog/spring-boot_id-site_heroku/
• Stormpath Java SDK
https://github.com/stormpath/stormpath-sdk-java
• Stormpath Java All The Integrations
http://docs.stormpath.com/java/
QUESTIONS?
THANK YOU

More Related Content

PPTX
Multi-Tenancy with Spring Boot
PPTX
Spring Boot Authentication...and More!
PDF
Mobile Authentication for iOS Applications - Stormpath 101
PPTX
JWTs for CSRF and Microservices
PPTX
How to Use Stormpath in angular js
PPTX
Secure API Services in Node with Basic Auth and OAuth2
PDF
JWTs in Java for CSRF and Microservices
PPTX
REST API Security: OAuth 2.0, JWTs, and More!
Multi-Tenancy with Spring Boot
Spring Boot Authentication...and More!
Mobile Authentication for iOS Applications - Stormpath 101
JWTs for CSRF and Microservices
How to Use Stormpath in angular js
Secure API Services in Node with Basic Auth and OAuth2
JWTs in Java for CSRF and Microservices
REST API Security: OAuth 2.0, JWTs, and More!

What's hot (20)

PPTX
Building a document e-signing workflow with Azure Durable Functions
PDF
Azure security guidelines for developers
PDF
Programming with Azure Active Directory
PPTX
Mobile Authentication for iOS Applications
PPTX
Zero Credential Development with Managed Identities
PPTX
Zero Credential Development with Managed Identities for Azure resources
PPTX
Zero credential development with managed identities
PDF
Build a REST API for your Mobile Apps using Node.js
PDF
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
Azure Meetup: Keep your secrets and configurations safe in azure!
PPTX
Azure AD B2C An Introduction - DogFoodCon 2018
PPTX
Azure AD B2C Webinar Series: Custom Policies Part 1
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
MongoDB World 2019: Securing Application Data from Day One
PPTX
Azure Key Vault - Getting Started
PPTX
2 Speed IT powered by Microsoft Azure and Minecraft
PDF
Identity Security - Azure Active Directory
PDF
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
PPT
SQL Server 2008 Security Overview
Building a document e-signing workflow with Azure Durable Functions
Azure security guidelines for developers
Programming with Azure Active Directory
Mobile Authentication for iOS Applications
Zero Credential Development with Managed Identities
Zero Credential Development with Managed Identities for Azure resources
Zero credential development with managed identities
Build a REST API for your Mobile Apps using Node.js
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
Azure Meetup: Keep your secrets and configurations safe in azure!
Azure AD B2C An Introduction - DogFoodCon 2018
Azure AD B2C Webinar Series: Custom Policies Part 1
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
MongoDB World 2019: Securing Application Data from Day One
Azure Key Vault - Getting Started
2 Speed IT powered by Microsoft Azure and Minecraft
Identity Security - Azure Active Directory
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
SQL Server 2008 Security Overview
Ad

Viewers also liked (19)

PDF
Building Beautiful REST APIs in ASP.NET Core
PPTX
Storing User Files with Express, Stormpath, and Amazon S3
PPTX
Token Authentication in ASP.NET Core
PPTX
Custom Data Search with Stormpath
PPTX
Instant Security & Scalable User Management with Spring Boot
PDF
The Ultimate Guide to Mobile API Security
PPTX
Beautiful REST+JSON APIs with Ion
PDF
Building Beautiful REST APIs with ASP.NET Core
PPTX
Browser Security 101
PPTX
Building Secure User Interfaces With JWTs (JSON Web Tokens)
PDF
Getting Started With Angular
PDF
Securing Web Applications with Token Authentication
PPTX
Token Authentication for Java Applications
PPTX
Design Beautiful REST + JSON APIs
PPTX
So long scrum, hello kanban
PPTX
Build a Node.js Client for Your REST+JSON API
PPTX
Spring security
PPTX
Elegant Rest Design Webinar
PPTX
Build A Killer Client For Your REST+JSON API
Building Beautiful REST APIs in ASP.NET Core
Storing User Files with Express, Stormpath, and Amazon S3
Token Authentication in ASP.NET Core
Custom Data Search with Stormpath
Instant Security & Scalable User Management with Spring Boot
The Ultimate Guide to Mobile API Security
Beautiful REST+JSON APIs with Ion
Building Beautiful REST APIs with ASP.NET Core
Browser Security 101
Building Secure User Interfaces With JWTs (JSON Web Tokens)
Getting Started With Angular
Securing Web Applications with Token Authentication
Token Authentication for Java Applications
Design Beautiful REST + JSON APIs
So long scrum, hello kanban
Build a Node.js Client for Your REST+JSON API
Spring security
Elegant Rest Design Webinar
Build A Killer Client For Your REST+JSON API
Ad

Similar to Stormpath 101: Spring Boot + Spring Security (20)

PPTX
Rest API Security
PPTX
Secureyourrestapi 140530183606-phpapp02
PPTX
Secure Your REST API (The Right Way)
PPTX
Instant Security and User Management in Spring Boot
PDF
JDD2015: Security in the era of modern applications and services - Bolesław D...
PPTX
Token Management using Stormpath inside Mule
PPTX
User Management SaaS
PPTX
No-Code SAML Support for SaaS Applications with Stormpath
PPTX
A recipe for standards-based Cloud IdM
PDF
Anil saldhana cloudidentitybestpractices
PDF
IBM Index Conference - 10 steps to build token based API Security
PDF
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
PDF
WebAuthn & FIDO2
PDF
Implementing Microservices Security Patterns & Protocols with Spring
PDF
Spring4 security
PDF
[4developers2016] - Security in the era of modern applications and services (...
PDF
Java Web Programming [9/9] : Web Application Security
PPTX
Microservices security - jpmc tech fest 2018
PDF
Are You Properly Using JWTs?
PPTX
Api security
Rest API Security
Secureyourrestapi 140530183606-phpapp02
Secure Your REST API (The Right Way)
Instant Security and User Management in Spring Boot
JDD2015: Security in the era of modern applications and services - Bolesław D...
Token Management using Stormpath inside Mule
User Management SaaS
No-Code SAML Support for SaaS Applications with Stormpath
A recipe for standards-based Cloud IdM
Anil saldhana cloudidentitybestpractices
IBM Index Conference - 10 steps to build token based API Security
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
WebAuthn & FIDO2
Implementing Microservices Security Patterns & Protocols with Spring
Spring4 security
[4developers2016] - Security in the era of modern applications and services (...
Java Web Programming [9/9] : Web Application Security
Microservices security - jpmc tech fest 2018
Are You Properly Using JWTs?
Api security

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Cloud computing and distributed systems.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Monthly Chronicles - July 2025
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Cloud computing and distributed systems.
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
cuic standard and advanced reporting.pdf

Stormpath 101: Spring Boot + Spring Security

  • 1. Stormpath 101: Spring Boot & Spring Security
  • 2. Welcome! • Agenda • Stormpath 101 (5 mins) • Get Started with Spring Boot (25 mins) • Q&A (30 mins) • Claire Hunsaker VP of Marketing & Customer Success • Micah Silverman Java Developer Evangelist
  • 3. Customer Identity Poses Major Challenges
  • 4. Speed to Market & Cost Reduction • Complete Identity solution out-of-the-box • Security best practices and updates by default • Clean & elegant API/SDKs • Little to code, no maintenance Focus on Your Core Competency
  • 5. Stormpath User Management User Data User Workflows Google ID Your Applications Application SDK Application SDK Application SDK ID Integrations Facebook Active Directory SAML
  • 6. Features • Secure, flexible Authentication (Password, Token, OAuth, API) • Deep Authorization Groups, Roles Customer Organizations Permissions • Customer Profile Data • Single Sign-On Across Your Apps • Hosted User Screens
  • 7. Authentication Pain Points in Java Typical Authentication coding tasks: • Large pile of code • NOTHING to do with your business • And you must maintain You’re on your own: • DO NOT forget to encrypt those passwords • DO NOT forget to include csrf tokens in your templates
  • 12. Stormpath, Spring Boot, and You 1. Create a Stormpath account 2. Create and API Access keyset 3. stormpath-default-spring-boot-starter 4. Write your Spring Boot App
  • 13. Quickstart: Setting Up Stormpath with Spring Security
  • 14. LET’S LOOK AT SOME CODE!
  • 15. Java Resources • Token Auth for Spring Boot + Stormpath https://stormpath.com/blog/token-auth-for-java/ • SSO with Spring Boot + Stormpath https://stormpath.com/blog/spring-boot_id-site_heroku/ • Stormpath Java SDK https://github.com/stormpath/stormpath-sdk-java • Stormpath Java All The Integrations http://docs.stormpath.com/java/

Editor's Notes

  • #8: The main pain points of authentication in Java that we solve with the Spring boot / Spring security example
  • #9: The main pain points of authentication in Java that we solve with the Spring boot / Spring security example
  • #10: The main pain points of authentication in Java that we solve with the Spring boot / Spring security example
  • #11: The main pain points of authentication in Java that we solve with the Spring boot / Spring security example
  • #12: The main pain points of authentication in Java that we solve with the Spring boot / Spring security example
  • #13: An overview of how all these pieces fit together within their  architecture. 
  • #15: Recap of presentation and Stormpath. Final pitch on how all these pieces fit together with Stormpath being an incredibly easy solution.