A comprehensive step by step tutorial on securing or authentication REST API Service with Spring Boot, Security, and Data MongoDB. Previously, we have shown you how to secure Spring Boot, MVC and MongoDB web application. In this tutorial, the secure endpoint will restrict the access from an unauthorized request. Every request to secure endpoint should bring authorization token with it. Of course, there will be an endpoint for login which will get authorization token after successful login.
Table of Contents:
- Generate a New Spring Boot Gradle Project
- Create Product, User, and Role Java Model or Entity Classes
- Create Product, User and Role Java Repository Interfaces
- Create a Custom User Details Service
- Configure Spring Boot Security Rest
- Create Product and Authentication Spring MVC Controllers
- Run and Test Spring Boot Security Rest using Postman
The following software, tools, and frameworks are required for this tutorial:
- Java Development Kit (JDK) 8
- Gradle
- Spring Boot
- Spring Data MongoDB
- MongoDB
- Spring Security
- Spring Initializer
- IDE or Text Editor (We are using Spring Tool Suite)
- Terminal or cmd
We assume that you already installed all required software, tools, and frameworks. So, we will not cover how to install that software, tools, and frameworks.
Generate a New Spring Boot Gradle Project
To create or generate a new Spring Boot Application or Project, simply go to Spring Initializer. Spring Initializr provides an extensible API to generate quickstart projects, and to inspect the metadata used to generate projects, for instance, to list the available dependencies and versions. Fill all required fields as below then click on Generate Project button.
The project will automatically be downloaded as a Zip file. Next, extract the zipped project to your java projects folder. On the project folder root, you will find `build.gradle` file for register dependencies, initially it looks like this.
buildscript {
ext {
springBootVersion = '2.1.2.RELEASE'
}
repositories {
mavenCentral()
}
dependencies {
classpath("org.springframework.boot:spring-boot-gradle-plugin:${springBootVersion}")
}
}
apply plugin: 'java'
apply plugin: 'org.springframework.boot'
apply plugin: 'io.spring.dependency-management'
group = 'com.djamware'
version = '0.0.1-SNAPSHOT'
sourceCompatibility = '1.8'
repositories {
mavenCentral()
}
dependencies {
implementation 'org.springframework.boot:spring-boot-starter-data-mongodb'
implementation 'org.springframework.boot:spring-boot-starter-security'
implementation 'org.springframework.boot:spring-boot-starter-web'
testImplementation 'org.springframework.boot:spring-boot-starter-test'
testImplementation 'org.springframework.security:spring-security-test'
}
Now, you can work with the source code of this Spring Boot Project using your own IDE or Text Editor. We are using Spring Tool Suite (STS). In STS, import the extracted zipped file as Existing Gradle Project.
Next, we have to add the JWT library to the `build.gradle` as the dependency. Open and edit `build.gradle` then add this line to dependencies after other implementation.
implementation 'io.jsonwebtoken:jjwt:0.9.1'
Next, compile the Gradle Project by type this command from Terminal or CMD.
./gradlew compile
Or you can compile directly from STS by right-clicking the project name then choose Gradle -> Refresh Gradle Project. Next, open and edit `src/main/resources/application.properties` then add these lines.
spring.data.mongodb.database=springmongodb
spring.data.mongodb.host=localhost
spring.data.mongodb.port=27017
Create Product, User, and Role Java Model or Entity Classes
We will be creating all required models or entities for products, user and role. In STS, right-click the project name -> New -> Class. Fill the package with `com.djamware.SecurityRest.models`, the name with `Product`, and leave other fields and checkbox as default then click Finish Button.
Next, open and edit `src/main/java/com/djamware/SecurityRest/models/Product.java` then add this annotation above the class name that will point to MongoDB collection.
@Document(collection = "products")
Inside Product class, add these variables.
@Id
String id;
String prodName;
String prodDesc;
Double prodPrice;
String prodImage;
Add constructors after the variable or fields.
public Product() {
}
public Product(String prodName, String prodDesc, Double prodPrice, String prodImage) {
super();
this.prodName = prodName;
this.prodDesc = prodDesc;
this.prodPrice = prodPrice;
this.prodImage = prodImage;
}
Generate or create Getter and Setter for each field.
public String getId() {
return id;
}
public void setId(String id) {
this.id = id;
}
public String getProdName() {
return prodName;
}
public void setProdName(String prodName) {
this.prodName = prodName;
}
public String getProdDesc() {
return prodDesc;
}
public void setProdDesc(String prodDesc) {
this.prodDesc = prodDesc;
}
public Double getProdPrice() {
return prodPrice;
}
public void setProdPrice(Double prodPrice) {
this.prodPrice = prodPrice;
}
public String getProdImage() {
return prodImage;
}
public void setProdImage(String prodImage) {
this.prodImage = prodImage;
}
Using STS you can organize imports automatically from the menu Source -> Organize Imports then you can see the imports after the package name.
package com.djamware.SecurityRest.models;
import org.springframework.data.annotation.Id;
import org.springframework.data.mongodb.core.mapping.Document;
You can do the same way as the above step for the User and Role class. Here's the User class looks like.
package com.djamware.SecurityRest.models;
import java.util.Set;
import org.springframework.data.annotation.Id;
import org.springframework.data.mongodb.core.index.IndexDirection;
import org.springframework.data.mongodb.core.index.Indexed;
import org.springframework.data.mongodb.core.mapping.DBRef;
import org.springframework.data.mongodb.core.mapping.Document;
@Document(collection = "users")
public class User {
@Id
private String id;
@Indexed(unique = true, direction = IndexDirection.DESCENDING, dropDups = true)
private String email;
private String password;
private String fullname;
private boolean enabled;
@DBRef
private Set<Role> roles;
public String getId() {
return id;
}
public void setId(String id) {
this.id = id;
}
public String getEmail() {
return email;
}
public void setEmail(String email) {
this.email = email;
}
public String getPassword() {
return password;
}
public void setPassword(String password) {
this.password = password;
}
public String getFullname() {
return fullname;
}
public void setFullname(String fullname) {
this.fullname = fullname;
}
public boolean isEnabled() {
return enabled;
}
public void setEnabled(boolean enabled) {
this.enabled = enabled;
}
public Set<Role> getRoles() {
return roles;
}
public void setRoles(Set<Role> roles) {
this.roles = roles;
}
}
And the Role class will be like this.
package com.djamware.SecurityRest.models;
import org.springframework.data.annotation.Id;
import org.springframework.data.mongodb.core.index.IndexDirection;
import org.springframework.data.mongodb.core.index.Indexed;
import org.springframework.data.mongodb.core.mapping.Document;
@Document(collection = "roles")
public class Role {
@Id
private String id;
@Indexed(unique = true, direction = IndexDirection.DESCENDING, dropDups = true)
private String role;
public String getId() {
return id;
}
public void setId(String id) {
this.id = id;
}
public String getRole() {
return role;
}
public void setRole(String role) {
this.role = role;
}
}
Create Product, User and Role Java Repository Interfaces
Next steps to create Product, User, and Role Repository Interfaces. From the STS, right-click the project name -> New -> Interface then fill all required fields and checkboxes as below before click Finish button.
Next, open and edit `src/main/java/com/djamware/SecurityRest/repositories/ProductRepository.java` then add extends to MongoDB CRUD Repository.
public interface ProductRepository extends CrudRepository<Product, String> {
}
Inside the class-name add this method.
@Override
void delete(Product deleted);
Organize all required imports of CrudRepository and Product model.
import org.springframework.data.repository.CrudRepository;
import com.djamware.SecurityRest.models.Product;
The same way can be applied to User and Role repositories. So, the User Repository Interface will look like this.
package com.djamware.SecurityRest.repositories;
import org.springframework.data.mongodb.repository.MongoRepository;
import com.djamware.SecurityRest.models.User;
public interface UserRepository extends MongoRepository<User, String> {
User findByEmail(String email);
}
And the Role Repository Interface will look like this.
package com.djamware.SecurityRest.repositories;
import org.springframework.data.mongodb.repository.MongoRepository;
import com.djamware.SecurityRest.models.Role;
public interface RoleRepository extends MongoRepository<Role, String> {
Role findByRole(String role);
}
Create a Custom User Details Service
To implements authentication using existing User and Role from MongoDB, we have to create a custom user details service. From the STS, right-click the project name -> New -> Class File then fill all required fields and checkboxes as below before clicking the finish button.
Next, open and edit `src/main/java/com/djamware/SecurityRest/services/CustomUserDetailsService.java` then give an annotation above the class name and implement the Spring Security User Details Service.
@Service
public class CustomUserDetailsService implements UserDetailsService {
}
Next, inject all required beans at the first line of the class bracket.
@Autowired
private UserRepository userRepository;
@Autowired
private RoleRepository roleRepository;
@Autowired
private PasswordEncoder bCryptPasswordEncoder;
Add a method to find a user by email field.
public User findUserByEmail(String email) {
return userRepository.findByEmail(email);
}
Add a method to save a new user.
public void saveUser(User user) {
user.setPassword(bCryptPasswordEncoder.encode(user.getPassword()));
user.setEnabled(true);
Role userRole = roleRepository.findByRole("ADMIN");
user.setRoles(new HashSet<>(Arrays.asList(userRole)));
userRepository.save(user);
}
Override the Spring Security User Details to load User by email.
@Override
public UserDetails loadUserByUsername(String email) throws UsernameNotFoundException {
User user = userRepository.findByEmail(email);
if(user != null) {
List<GrantedAuthority> authorities = getUserAuthority(user.getRoles());
return buildUserForAuthentication(user, authorities);
} else {
throw new UsernameNotFoundException("username not found");
}
}
Add a method to get a set of Roles that related to a user.
private List<GrantedAuthority> getUserAuthority(Set<Role> userRoles) {
Set<GrantedAuthority> roles = new HashSet<>();
userRoles.forEach((role) -> {
roles.add(new SimpleGrantedAuthority(role.getRole()));
});
List<GrantedAuthority> grantedAuthorities = new ArrayList<>(roles);
return grantedAuthorities;
}
Add a method for authentication purpose.
private UserDetails buildUserForAuthentication(User user, List<GrantedAuthority> authorities) {
return new org.springframework.security.core.userdetails.User(user.getEmail(), user.getPassword(), authorities);
}
Configure Spring Boot Security Rest
Now, the main purpose of this tutorial is configuring Spring Security Rest. First, we have to create a bean for JWT token generation and validation. Right-click the project name -> New -> Class File. Fill the package name as `com.djamware.SecurityRest.configs` and the Class name as `JwtTokenProvider` then click the Finish button. Next, open and edit that newly created class file then give it an annotation above the class name.
@Component
public class JwtTokenProvider {
}
Add variables and injected bean inside the class bracket at the top lines.
@Value("${security.jwt.token.secret-key:secret}")
private String secretKey = "secret";
@Value("${security.jwt.token.expire-length:3600000}")
private long validityInMilliseconds = 3600000; // 1h
@Autowired
private CustomUserDetailsService userDetailsService;
Add a method for initialization.
@PostConstruct
protected void init() {
secretKey = Base64.getEncoder().encodeToString(secretKey.getBytes());
}
Add a method to create a JWT token.
public String createToken(String username, Set<Role> set) {
Claims claims = Jwts.claims().setSubject(username);
claims.put("roles", set);
Date now = new Date();
Date validity = new Date(now.getTime() + validityInMilliseconds);
return Jwts.builder()//
.setClaims(claims)//
.setIssuedAt(now)//
.setExpiration(validity)//
.signWith(SignatureAlgorithm.HS256, secretKey)//
.compact();
}
Add a method to load User by username.
public Authentication getAuthentication(String token) {
UserDetails userDetails = this.userDetailsService.loadUserByUsername(getUsername(token));
return new UsernamePasswordAuthenticationToken(userDetails, "", userDetails.getAuthorities());
}
Add a method to get the username by JWT token.
public String getUsername(String token) {
return Jwts.parser().setSigningKey(secretKey).parseClaimsJws(token).getBody().getSubject();
}
Add a method to resolve JWT token from request headers of Authorization that has a Bearer prefix.
public String resolveToken(HttpServletRequest req) {
String bearerToken = req.getHeader("Authorization");
if (bearerToken != null && bearerToken.startsWith("Bearer ")) {
return bearerToken.substring(7, bearerToken.length());
}
return null;
}
Add a method to validate a JWT token.
public boolean validateToken(String token) {
try {
Jws<Claims> claims = Jwts.parser().setSigningKey(secretKey).parseClaimsJws(token);
if (claims.getBody().getExpiration().before(new Date())) {
return false;
}
return true;
} catch (JwtException | IllegalArgumentException e) {
throw new JwtException("Expired or invalid JWT token");
}
}
Finally, organize all required imports like below.
package com.djamware.SecurityRest.configs;
import java.util.Base64;
import java.util.Date;
import java.util.Set;
import javax.annotation.PostConstruct;
import javax.servlet.http.HttpServletRequest;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.userdetails.UserDetails;
import org.springframework.stereotype.Component;
import com.djamware.SecurityRest.models.Role;
import com.djamware.SecurityRest.services.CustomUserDetailsService;
import io.jsonwebtoken.Claims;
import io.jsonwebtoken.Jws;
import io.jsonwebtoken.JwtException;
import io.jsonwebtoken.Jwts;
import io.jsonwebtoken.SignatureAlgorithm;
Next, create a JWT filter class with the name `JwtTokenFilter` in configs package that extends Spring GenericFilterBean. Replace all Java codes with these lines of codes.
package com.djamware.SecurityRest.configs;
import java.io.IOException;
import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.web.filter.GenericFilterBean;
public class JwtTokenFilter extends GenericFilterBean {
private JwtTokenProvider jwtTokenProvider;
public JwtTokenFilter(JwtTokenProvider jwtTokenProvider) {
this.jwtTokenProvider = jwtTokenProvider;
}
@Override
public void doFilter(ServletRequest req, ServletResponse res, FilterChain filterChain)
throws IOException, ServletException {
String token = jwtTokenProvider.resolveToken((HttpServletRequest) req);
if (token != null && jwtTokenProvider.validateToken(token)) {
Authentication auth = token != null ? jwtTokenProvider.getAuthentication(token) : null;
SecurityContextHolder.getContext().setAuthentication(auth);
}
filterChain.doFilter(req, res);
}
}
Next, create a class with the name `JwtConfigurer` for JWT configuration in configs package then replace all codes with these lines of codes.
package com.djamware.SecurityRest.configs;
import org.springframework.security.config.annotation.SecurityConfigurerAdapter;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.web.DefaultSecurityFilterChain;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
public class JwtConfigurer extends SecurityConfigurerAdapter<DefaultSecurityFilterChain, HttpSecurity> {
private JwtTokenProvider jwtTokenProvider;
public JwtConfigurer(JwtTokenProvider jwtTokenProvider) {
this.jwtTokenProvider = jwtTokenProvider;
}
@Override
public void configure(HttpSecurity http) throws Exception {
JwtTokenFilter customFilter = new JwtTokenFilter(jwtTokenProvider);
http.addFilterBefore(customFilter, UsernamePasswordAuthenticationFilter.class);
}
}
Finally, we have to configure the Spring Security by creating a Java class file inside configs package with the name `WebSecurityConfig`. Give annotations to this class and extends Spring WebSecurityConfigurerAdapter.
@Configuration
@EnableWebSecurity
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
}
Inject JWT token provider inside this class.
@Autowired
JwtTokenProvider jwtTokenProvider;
Add an override method to configure Authentication Manager Builder.
@Override
protected void configure(AuthenticationManagerBuilder auth) throws Exception {
UserDetailsService userDetailsService = mongoUserDetails();
auth.userDetailsService(userDetailsService).passwordEncoder(bCryptPasswordEncoder());
}
Next, add an override method to configure Spring Security Http Security.
@Override
protected void configure(HttpSecurity http) throws Exception {
http.httpBasic().disable().csrf().disable().sessionManagement()
.sessionCreationPolicy(SessionCreationPolicy.STATELESS).and().authorizeRequests()
.antMatchers("/api/auth/login").permitAll().antMatchers("/api/auth/register").permitAll()
.antMatchers("/api/products/**").hasAuthority("ADMIN").anyRequest().authenticated().and().csrf()
.disable().exceptionHandling().authenticationEntryPoint(unauthorizedEntryPoint()).and()
.apply(new JwtConfigurer(jwtTokenProvider));
}
Next, declare all required beans for this configuration.
@Bean
public PasswordEncoder bCryptPasswordEncoder() {
return new BCryptPasswordEncoder();
}
@Bean
@Override
public AuthenticationManager authenticationManagerBean() throws Exception {
return super.authenticationManagerBean();
}
@Bean
public AuthenticationEntryPoint unauthorizedEntryPoint() {
return (request, response, authException) -> response.sendError(HttpServletResponse.SC_UNAUTHORIZED,
"Unauthorized");
}
@Bean
public UserDetailsService mongoUserDetails() {
return new CustomUserDetailsService();
}
Create Product and Authentication Spring MVC Controllers
Now it's time for REST API Service endpoint. All REST API will be created from each controller. Product controller will handle CRUD endpoint of product and Authentication controller will handle login and register endpoint. Right-click project name -> New -> Class then fill the package with `com.djamware.SecurityRest.controllers` and the class name as `ProductController`. Open and edit the newly created class file then replace all codes with these lines of codes.
package com.djamware.SecurityRest.controllers;
import java.util.Optional;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.web.bind.annotation.PathVariable;
import org.springframework.web.bind.annotation.RequestBody;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestMethod;
import org.springframework.web.bind.annotation.RestController;
import com.djamware.SecurityRest.models.Product;
import com.djamware.SecurityRest.repositories.ProductRepository;
@RestController
public class ProductController {
@Autowired
ProductRepository productRepository;
@RequestMapping(method=RequestMethod.GET, value="/api/products")
public Iterable<Product> product() {
return productRepository.findAll();
}
@RequestMapping(method=RequestMethod.POST, value="/api/products")
public String save(@RequestBody Product product) {
productRepository.save(product);
return product.getId();
}
@RequestMapping(method=RequestMethod.GET, value="/api/products/{id}")
public Optional<Product> show(@PathVariable String id) {
return productRepository.findById(id);
}
@RequestMapping(method=RequestMethod.PUT, value="/api/products/{id}")
public Product update(@PathVariable String id, @RequestBody Product product) {
Optional<Product> prod = productRepository.findById(id);
if(product.getProdName() != null)
prod.get().setProdName(product.getProdName());
if(product.getProdDesc() != null)
prod.get().setProdDesc(product.getProdDesc());
if(product.getProdPrice() != null)
prod.get().setProdPrice(product.getProdPrice());
if(product.getProdImage() != null)
prod.get().setProdImage(product.getProdImage());
productRepository.save(prod.get());
return prod.get();
}
@RequestMapping(method=RequestMethod.DELETE, value="/api/products/{id}")
public String delete(@PathVariable String id) {
Optional<Product> product = productRepository.findById(id);
productRepository.delete(product.get());
return "product deleted";
}
}
For login, we need to create a POJO to mapping required fields of User. Create a new class file with the name `AuthBody` inside controllers package then replace all Java codes with these lines of codes.
package com.djamware.SecurityRest.controllers;
public class AuthBody {
private String email;
private String password;
public String getEmail() {
return email;
}
public void setEmail(String email) {
this.email = email;
}
public String getPassword() {
return password;
}
public void setPassword(String password) {
this.password = password;
}
}
Finally, create a controller for authentication with the name `AuthController` inside the controllers' package. Open and edit that newly created file then replace all Java codes with these lines of codes.
package com.djamware.SecurityRest.controllers;
import static org.springframework.http.ResponseEntity.ok;
import java.util.HashMap;
import java.util.Map;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.http.ResponseEntity;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.BadCredentialsException;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.AuthenticationException;
import org.springframework.web.bind.annotation.PostMapping;
import org.springframework.web.bind.annotation.RequestBody;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RestController;
import com.djamware.SecurityRest.configs.JwtTokenProvider;
import com.djamware.SecurityRest.models.User;
import com.djamware.SecurityRest.repositories.UserRepository;
import com.djamware.SecurityRest.services.CustomUserDetailsService;
@RestController
@RequestMapping("/api/auth")
public class AuthController {
@Autowired
AuthenticationManager authenticationManager;
@Autowired
JwtTokenProvider jwtTokenProvider;
@Autowired
UserRepository users;
@Autowired
private CustomUserDetailsService userService;
@SuppressWarnings("rawtypes")
@PostMapping("/login")
public ResponseEntity login(@RequestBody AuthBody data) {
try {
String username = data.getEmail();
authenticationManager.authenticate(new UsernamePasswordAuthenticationToken(username, data.getPassword()));
String token = jwtTokenProvider.createToken(username, this.users.findByEmail(username).getRoles());
Map<Object, Object> model = new HashMap<>();
model.put("username", username);
model.put("token", token);
return ok(model);
} catch (AuthenticationException e) {
throw new BadCredentialsException("Invalid email/password supplied");
}
}
@SuppressWarnings("rawtypes")
@PostMapping("/register")
public ResponseEntity register(@RequestBody User user) {
User userExists = userService.findUserByEmail(user.getEmail());
if (userExists != null) {
throw new BadCredentialsException("User with username: " + user.getEmail() + " already exists");
}
userService.saveUser(user);
Map<Object, Object> model = new HashMap<>();
model.put("message", "User registered successfully");
return ok(model);
}
}
Run and Test Spring Boot Security Rest using Postman
Before run and test the application, we have to populate a Role data first. Open and edit `src/main/java/com/djamware/SecurityRest/SecurityRestApplication.java` then add these lines of codes inside the initialization method.
@Bean
CommandLineRunner init(RoleRepository roleRepository) {
return args -> {
Role adminRole = roleRepository.findByRole("ADMIN");
if (adminRole == null) {
Role newAdminRole = new Role();
newAdminRole.setRole("ADMIN");
roleRepository.save(newAdminRole);
}
};
}
Next, make sure you have run the MongoDB server on your local machine then run the Gradle application using this command.
./gradlew bootRun
Or in STS just right-click the project name -> Run As -> Spring Boot App. Next, open the Postman application then change the method to `GET` and address to `localhost:8080/api/products` then click Send button.
You will see this response in the bottom panel of Postman.
{
"timestamp": "2019-03-07T13:16:34.935+0000",
"status": 401,
"error": "Unauthorized",
"message": "Unauthorized",
"path": "/api/products"
}
Next, change the method to POST then address to `localhost:8080/api/auth/register` then fill the body with raw data as below image then click Send button.
You will get the response in the bottom panel of Postman.
{
"message": "User registered successfully"
}
Next, change the address to `localhost:8080/api/auth/login` and change the body as below then click Send button.
{ "email":"[email protected]", "password": "q1w2we3r4" }
You will see this response in the bottom panel of Postman.
{
"username": "[email protected]",
"token": "eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJpbmZvQGRqYW13YXJlLmNvbSIsInJvbGVzIjpbeyJpZCI6IjVjODBjNjIzYjIwMTkxNGIyYTY5N2U4ZCIsInJvbGUiOiJBRE1JTiJ9XSwiaWF0IjoxNTUxOTY0OTc3LCJleHAiOjE1NTE5Njg1Nzd9.j5CHZ_LCmeQtdxQeH9eluxVXcOsHPWV1p8WnBn0CULo"
}
Copy the token then back to the GET product. Add a header with the name `Authorization` and the value that paste from a token that gets by login with additional `Bearer ` prefix (with space) as below.
Bearer eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJpbmZvQGRqYW13YXJlLmNvbSIsInJvbGVzIjpbeyJpZCI6IjVjODBjNjIzYjIwMTkxNGIyYTY5N2U4ZCIsInJvbGUiOiJBRE1JTiJ9XSwiaWF0IjoxNTUxOTY0OTc3LCJleHAiOjE1NTE5Njg1Nzd9.j5CHZ_LCmeQtdxQeH9eluxVXcOsHPWV1p8WnBn0CULo
You should see this response after clicking the Send button.
[
{
"id": "5c80dc6cb20191520567b68a",
"prodName": "Dummy Product 1",
"prodDesc": "The Fresh Dummy Product in The world part 1",
"prodPrice": 100,
"prodImage": "https://dummyimage.com/600x400/000/fff"
}
]
You can test the POST product with the token in headers using the same way.
That it's, the Securing RESTful API with Spring Boot, Security, and Data MongoDB tutorial. You can get the full source code from our GitHub.
That just the basic. If you need more deep learning about Java and Spring Framework you can take the following cheap course:
- Master Java Web Services and REST API with Spring Boot
- JDBC Servlets and JSP - Java Web Development Fundamentals
- The Complete Java Web Development Course
- Spring MVC For Beginners: Build Java Web App in 25 Steps
- Practical RESTful Web Services with Java EE 8 (JAX-RS 2.1)
Thanks!