
Java Authentication and Authorization with Apache Shiro
airhacks.fm podcast with adam bien
00:00
Hiroshima Secret Injection
Using shiro behind the scenes to maintain the secrets could be also interesting. I would probably use micro profile confict to inject controgation items into siro ye tisdi. And cording e a another think we were sherock might be useful. Othis reminds me in jasen problems i had, because i decoded jasen twice. Also, common one, right? Or any other twice, because then you get double double. It is solved mosty in the clouds. Secret injection. So i can inject secrets a to to application serveic wire, or to micro prothe convic.
Play episode from 49:34
Transcript


