
airhacks.fm podcast with adam bien Java Authentication and Authorization with Apache Shiro
Mar 12, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
Introduction
00:00 • 3min
YES, Is It a Shiro?
02:48 • 2min
Application Service vs Application Service?
05:17 • 2min
How to Create a Shero Application?
07:21 • 3min
Is There Any Integration With Micro Profile?
10:26 • 2min
Using a Web Listener to but Shiro
12:11 • 3min
Isli Is a Jason Webtoke?
14:46 • 2min
What's Thevelet Suct Point?
16:42 • 2min
How to Set a Message on a Wep Application?
18:54 • 4min
Can I Also Call Out From the Permission Language to My Own Implementation?
22:32 • 2min
How to Build a Shero Permissions Array?
24:06 • 2min
Is It Possible to Extend a Wilecut Permission?
25:58 • 3min
Permissions
28:42 • 2min
Is It Possible to Use Shero as a Relm a in the Jacata Api Am?
31:01 • 2min
Hiroshima Authentication
32:49 • 2min
20 20 in Shiro
34:54 • 1min
Inshiro Framework
36:24 • 2min
Hiroshima
38:42 • 2min
Hiroshi
40:34 • 2min
The Peral Expression Language
42:19 • 2min
Ignore Yamel's Simplification Opensos Project
43:58 • 2min
Isos Projects
45:49 • 4min
Hiroshima Secret Injection
49:34 • 2min
Is There a Way to Do This in a Shiro?
51:08 • 2min
Is There a Way to Rename Existing Classes to Shiro?
53:30 • 2min
Permission Bases
55:19 • 2min
What a Shiro Will Do for You?
57:26 • 2min
The Future of Identity Store
59:18 • 2min
