Spring Security – Run-As Authentication 1. Overview In this tutorial, we’ll illustrate how to use Run-As authentication in Spring Security with a simple scenario. The very high-level explanation about Run-As is as follows: a user can execute some piece of logic as another principal with different privileges. 2. The RunAsManager… Continue Reading spring-security-run-as-auth

REST API Discoverability and HATEOAS 1. Overview This article will focus on Discoverability of the REST API, HATEOAS and practical scenarios driven by tests. 2. Why Make the API Discoverable Discoverability of an API is a topic that doesn’t get enough well-deserved attention. As a consequence, very few APIs get… Continue Reading restful-web-service-discoverability

Pattern Matching in Strings in Groovy 1. Overview In this article, we’ll look at the Groovy language features for pattern matching in Strings. We’ll see how Groovy’s batteries-included approach provides us with a powerful and ergonomic syntax for our basic pattern matching needs. 2. Pattern Operator The Groovy language introduces… Continue Reading groovy-pattern-matching

REST Assured Authentication 1. Overview In this tutorial, we’ll analyze how we can authenticate with REST Assured to test and validate a secured API properly. The tool provides support for several authentication schemes: Basic Authentication Digest Authentication Form Authentication OAuth 1 and OAuth 2 And we’ll see examples for each… Continue Reading rest-assured-authentication