First8 is gespecialiseerd in het pragmatisch ontwikkelen van bedrijfskritische Java toepassingen waarbij integratie van systemen, hoge eisen aan beveiliging en veel transacties een belangrijke rol spelen. Op deze pagina vindt je onze blogs. Op www.first8.nl vind je ons nieuws, de agenda, vacatures en meer.

Conflict-free replicated data types

By now everybody who has ever worked on a distributed system has heard of the CAP theorem. Simply put, it states that you have to choose between being (C)onsistent or being (A)vailable. The P, standing for Partition tolerant, is not really a choice for a distributed system (e.g. see the number 1 fallacy of distributed programming). So that leaves us in a peculiar state: … Lees verder Conflict-free replicated data types

Wall-clock constraints in distributed systems

At a project I am working on we had a discussion on how to implement certain constraints. The project in question is (will be) a heavily distributed system, replacing an old monolithic system. In the original system, there are many constrains like ‘the date for form X cannot be in the future’. These constraints are very difficult to implement in a … Lees verder Wall-clock constraints in distributed systems

Security with microservices: programmatic security with Keycloak

In todays modern IT architecture, domains are quite the thing. Domains are supposed to be as much isolated from each other as possible. If you have an application that manages sensitive data (and really, when do you not have sensitive data?), you need to think about security. Programmatic security In many cases, you can get away with role-based security (e.g. … Lees verder Security with microservices: programmatic security with Keycloak

Programmatically adding users in Keycloak

Managing users in Keycloak can be done manually via the admin console (if you are running it locally, it can be found on http://localhost:8080/auth). If you have an LDAP service somewhere, you could also integrate that and manage the users via that. In this blog post, we’ll examine a simple way to manage users programmatically. We could use the Admin REST … Lees verder Programmatically adding users in Keycloak

Testing Keycloak integration with Arquillian

In a previous blog post we discussed a bit on how you can integrate Keycloak with JAX-RS. In this blog post we’ll show an example on how to build an integration test to test if your REST endpoint is secured. In this setup, we are using Keycloak 1.4.0 for our identity management, and we deploy our application in Wildfly 9. (Older versions … Lees verder Testing Keycloak integration with Arquillian

Using SwitchUser functionality in Spring

If you are developing a website with external users, those users might require support. For the people providing support, it can be quite convenient to be able to log in as a user and see the application through their eyes. In this blog post we’ll visit some of the components Spring 3 provides to handle this kind of feature. Switching … Lees verder Using SwitchUser functionality in Spring