Keycloak is awesome and I've been a big fan of Keycloak for some time now. In this post, I'll share my thoughts on the decisions I've had to make when designing a multi-tenant application with Keycloak as the IAM server. I must give a heads up on the fact that the latest version of Keycloak … Continue reading Designing Authentication and Authorization for a Multi-Tenant Application with Keycloak
Category: Java
How to use Hibernate Filters coupled with Spring Aspects for Data Isolation
Designing a multi-tenant system is fun as long as you get the data isolation done right. If not it could be painful. 😀 In a previous post, I explained how we utilised Row Level Security to enforce data isolation in one of the multi-tenant solutions that I worked with in the past. While Row Level … Continue reading How to use Hibernate Filters coupled with Spring Aspects for Data Isolation
Multi-Tenant Data Isolation & Row Level Security
Over the past 1 and a half years, I was involved in designing and developing a multi-tenant Treasury Management system. In this article, I will share our approaches to the data isolation aspect of our multi-tenant solution and the learnings from it. Background & problem regarding Data isolation Before going into the problem which I … Continue reading Multi-Tenant Data Isolation & Row Level Security
Java Considerations for Containerization
Running your application on virtual machines is now a thing in the past and by now most organizations have either already switched to container-based environments to run their applications or are planning to switch to a containerized environment. This article will attempt to give some insight onto how the Java memory-based aspects should change when one is planning to move their Java application to containers.
Extracting Private Key from Java KeyStore (JKS)
I've been working with the AS2 Protocol and the AdroitLogic AS2Gateway for quite some time now and hence playing with JKS has been a must. One of the tricks which were required from time to time was extracting the private key and public key (certificate) from Java KeyStores. In this blog post, we'll go through … Continue reading Extracting Private Key from Java KeyStore (JKS)
Message Signing & Encryption for AS2 Protocol in Java
The main idea of the AS2 protocol defined in the RFC 4130 is on how we can exchange structured business data securely using the HTTP transfer protocol. In one of the previous posts on AS2, we looked at an overview of the AS2 (Applicability Statement 2) protocol and why it wins over the other B2B … Continue reading Message Signing & Encryption for AS2 Protocol in Java
WiFi Information Extraction Java
Hello everyone, I was recently involved in a wireless networking project where we had to develop a student response system. In that I had to extract certain WiFi related information such as list of available SSIDs, connected SSID, IP address and Subnet Mask Java doesn't allows us to directly get that low level information. Therefore … Continue reading WiFi Information Extraction Java