Recent Posts

DPoP: What It Is, How It Works, and Why Bearer Tokens Aren’t Enough

Author: Hüseyin Akdoğan Original post on Foojay: Read More Table of Contents What is DPoP?The Problem: Bearer Tokens and the “Finders Keepers” RiskHow Does DPoP Work?Configuring DPoP in KeycloakDPoP in Action with Quarkus Project Setup Protected Endpoints Replay Protection with a jti Filter Testing with k6 Conclusion DPoP is one of the most exciting developments in the IAM (Identity and …

Read More »

Role-Based Access Control in Java Applications

Author: Matteo Rossi Original post on Foojay: Read More Table of Contents Authorization Is a Business ConcernModeling Permissions FirstUsing MongoDB for User MetadataFrom Infrastructure Model to Application PrincipalCentralizing Authorization LogicContextual Rules: Where RBAC StopsRBAC vs ABAC: When Roles Are Not EnoughThe Architectural PayoffConclusion We often work with Java applications where security begins and ends with authentication. The JWT token is …

Read More »

No Keys, No LLM: Building a Wikidata Definition API with Embabel

Author: Vincent Vauban Original post on Foojay: Read More Table of Contents TL;DRPart I — Concepts I.1 Embabel I.2 Spring AI (even in a “no LLM” demo) I.3 Role of Embabel in this application I.4 Wikidata: definition and why it’s ideal for demos Part II — App building (code + explanations) II.1 Maven setup (pom.xml) II.2 Configuration (application.yml) II.3 App …

Read More »