Skip to content

Releases: nopesir/oauth-hw-security-custom

v1.0

03 Jul 16:44
Compare
Choose a tag to compare

Second implementation example from OAuth2: protocol analysis and implementation, homework report of the course Computer System Security, A.Y. 2019/20

NOTES

  • This is only meant for educational purposes, DO NOT DEPLOY IN PRODUCTION ENVIRONMENTS!
  • The assets for the single .jar builds, the video and the docker-compose.yaml are the same as v0.5-alpha.

Changelog

  • Added flow_access-token and flow_refresh-token diagrams.
  • Finished testing phase.
  • Bugfix and improvements.

v1.0-beta

16 Jun 17:39
Compare
Choose a tag to compare
v1.0-beta Pre-release
Pre-release

Second implementation example from OAuth2: protocol analysis and implementation, homework report of the course Computer System Security, A.Y. 2019/20

NOTES

  • This is only meant for educational purposes, DO NOT DEPLOY IN PRODUCTION ENVIROMENTS!
  • The assets for the single .jar builds, the video and the docker-compose.yaml are the same of v0.5-alpha.

Changelog

  • Added serialversionUID to Servlet classes.
  • Fixed minor issues on JWT issuer and resource addresses.
  • Fixed exposed port forward of the resource server on the local machine.
  • docker-compose-build.yml extensively tested.
  • Bugfix and improvements.

v0.5-alpha

30 May 16:05
Compare
Choose a tag to compare
v0.5-alpha Pre-release
Pre-release

Second implementation example from OAuth2: protocol analysis and implementation, homework report of the course Computer System Security, A.Y. 2019/20

NOTE This is only meant for educational purposes, DO NOT DEPLOY IN PRODUCTION ENVIROMENTS!

Changelog

  • Added docker-compose-build.yaml to automatically build the solution in-place.
  • Added ARGs on the client and authz server' Dockerfile to pass the secrets: now you only need to write them on the compose.
  • Fixed mvnw error by forcing LF on .gitattributes.
  • Bugfix and improvements.

v0.1-alpha

16 May 14:49
Compare
Choose a tag to compare
v0.1-alpha Pre-release
Pre-release

Second implementation example from OAuth2: protocol analysis and implementation, homework report of the course Computer System Security, A.Y. 2019/20

NOTE This is only meant for educational purposes, DO NOT DEPLOY IN PRODUCTION ENVIROMENTS!