
Java Authentication and Authorization with Apache Shiro
airhacks.fm podcast with adam bien
00:00
Isli Is a Jason Webtoke?
A, in theory, yes. But a, it's a little bit more complicated, because you thougt my dea, you will need er, some more requests. And at the moment, a shers er implemented authentication mechanisms were only allow to doyou to do one request,. which is usually asked an active directory held up o a data base. So we haven't tried it yet, and we didn't get a request to implement it yet. E jacks orrest in cidia become more and more common. Why that? You see a uptake usage of shiro in sidii and micro profile applications. i think it's a natural way to e, to look more more
Play episode from 14:46
Transcript


