How to implement JWT authentication in Spring Security and Angular – Part 4

Now that we’ve secured the backend with Spring security and implemented the basic JWT features, it’s time to allow users to log in from a user interface. In this example, I’ll show you how to implement a very basic authentication form in an Angular frontend. The pages, that may only be visited by authenticated users, will be protected by a special guard. For that purpose, I’ll show you how to implement such a guard and how to use the Angular router to redirect unauthenticated users to the login page.

Continue reading How to implement JWT authentication in Spring Security and Angular – Part 4

How to implement JWT authentication in Spring Security and Angular – Part 3

In this part of the series we’ll look at the most complex part of the project: Generating, reading, and validating JWT tokens. Our backend server will issue a token and return it to a requesting user. When a user tries to access a restricted resource, the token gets validated and, if the user is permitted, the resource can be accessed.

Continue reading How to implement JWT authentication in Spring Security and Angular – Part 3

How to implement JWT authentication in Spring Security and Angular – Part 2

In this part of the series we’ll make sure that Spring Security restricts access to certain resources and uses our custom bearer token authorization method to allow authenticated users to access resources.

Continue reading How to implement JWT authentication in Spring Security and Angular – Part 2

How to implement JWT authentication in Spring Security and Angular – Part 1

I recently had to implement a bearer token authentication mechanism in a Spring backend and an Angular frontend. I wasn’t surprised to see that there are already a lot of tutorials around, however, I was shocked by how poorly most of them are written and how bad some solutions were. Now, don’t get me wrong: By no means do I want to claim that my solution is the state-of-the art single way to go. However, this has worked for me and I think it’s much easier to understand and follow than other guides. Additionally, there are a few things that almost all tutorials get wrong and I’ll try to address these as well.

Continue reading How to implement JWT authentication in Spring Security and Angular – Part 1

A comprehensive collection of 3D printing tricks – Part 4

This part of the series discusses what happens when your print is done. Believe it or not but you’re not safe yet! There’s still a few things that can go wrong, even after your print finished successfully and this article addresses them.

Continue reading A comprehensive collection of 3D printing tricks – Part 4

USB volume knob for Windows, Mac OS and Linux – Part 2

I finally came around finishing this project and I also made a video in which I explain the build and also show you how to assemble the project. This article covers the case design and some changes in the source code in more detail compared to the video.

Continue reading USB volume knob for Windows, Mac OS and Linux – Part 2

How to use Websockets to control an ESP8266 and a Raspberry Pi with a web browser

For a current project of mine, I had to evaluate how high the latency is when using websockets. In my case, I wanted to use a small single board computer as the server and any device, that can run a web browser, as the client. This tutorial illustrates how a Raspberry Pi and an ESP8266 can be used to act as a websocket server that can be controlled with a standard webbrowser.

Continue reading How to use Websockets to control an ESP8266 and a Raspberry Pi with a web browser