Official Security Solution for Micronaut

LicenseApache 2.0
Tagsmicronautsecurityauthenticationoauth
HomePage https://micronaut.io 🔍 Inspect URL
DateFeb 10, 2025
Filespom (2 KB)  jar (629 KB)  View All
RepositoriesCentral
Ranking#160963 in MvnRepository (See Top Artifacts)
Used By3 artifacts

Note: There is a new version for this artifact

New Version4.15.0

Scope:
Scope:
Format:
Scope:
Scope:
Scope:
Scope:
Scope:
Scope:

Compile Dependencies (3)

Runtime Dependencies (2)

Category/License Group / ArtifactVersionUpdates

Apache 2.0
io.micronaut » micronaut-http-client-core 4.8.14.10.8

Apache 2.0
io.micronaut.reactor » micronaut-reactor 3.7.03.9.1

Licenses

LicenseURL
The Apache Software License, Version 2.0 http://www.apache.org/licenses/LICENSE-2.0.txt

Developers

NameEmailDev IdRolesOrganization
James Kleehjameskleeh
Sergio del Amosergiodelamo

Related Books

The Micronaut Way: The Developer’s Guide to Reactive MicroservicesThe Micronaut Way: The Developer’s Guide to Reactive Microservices (2025)
by Tripathy, Badal
Micronaut in Action: Designing, Developing, and Deploying Resilient, Cloud-Native MicroservicesMicronaut in Action: Designing, Developing, and Deploying Resilient, Cloud-Native Microservices (2025)
by Joshi, Aarav
Cloud Native Data Security with OAuth: A Scalable Zero Trust ArchitectureCloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025)
by Archer, Gary, Kahrer, Judith, Trojanowski, Michał
CLOUD-NATIVE MICROSERVICES WITH MICRONAUT: Secure, Fast, and Scalable Java ApplicationsCLOUD-NATIVE MICROSERVICES WITH MICRONAUT: Secure, Fast, and Scalable Java Applications (2025)
by Mercer, Orion
Pro RESTful APIs with Micronaut: Build Java-Based Microservices with REST, JSON, and XMLPro RESTful APIs with Micronaut: Build Java-Based Microservices with REST, JSON, and XML (2025)
by Patni, Sanjay
OAuth 2.0: All you need to know (Identity in Cybersecurity)OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025)
by Relington, James
Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition)Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025)
by Snoke, Nancy
GraphQL Programming with Java™: And the Micronaut® FrameworkGraphQL Programming with Java™: And the Micronaut® Framework (2024)
by Bruno, Eric
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024)
by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam
Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition)Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023)
by Dash, Sambit Kumar
Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applicationsKeycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023)
by Thorgersen, Stian, Silva, Pedro Igor
Pro RESTful APIs with Micronaut: Build Java-Based Microservices with REST, JSON, and XMLPro RESTful APIs with Micronaut: Build Java-Based Microservices with REST, JSON, and XML (2023)
by Patni, Sanjay
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022)
by Wilson, Yvonne, Hingnikar, Abhishek
Introducing Micronaut: Build, Test, and Deploy Java Microservices on Oracle CloudIntroducing Micronaut: Build, Test, and Deploy Java Microservices on Oracle Cloud (2022)
by Sharp, Todd Raymond
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and MoreThe Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022)
by Tijms, Arjan, Bais, Teo, Keil, Werner
Building Microservices with Micronaut®: A quick-start guide to building high-performance reactive microservices for Java developersBuilding Microservices with Micronaut®: A quick-start guide to building high-performance reactive microservices for Java developers (2021)
by Singh, Nirmal, Dawood, Zack, Foundation, The Micronaut
Advanced API Security: OAuth 2.0 and BeyondAdvanced API Security: OAuth 2.0 and Beyond (2019)
by Siriwardena, Prabath
OAuth 2.0 SimplifiedOAuth 2.0 Simplified (2018)
by Parecki, Aaron
OAuth 2 in ActionOAuth 2 in Action (2017)
by Richer, Justin, Sanso, Antonio
OAuth 2.0: Learn OAuth in a simple wayOAuth 2.0: Learn OAuth in a simple way (2016)
by Warnock, Dan
OAuth 2.0: Introduction to API Security with OAuth 2.0OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016)
by Moore, Joseph
Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkMastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015)
by Bihis, Charles
OAuth 2.0: Getting Started in Web-API Security (API University Series)OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015)
by Biehl, Matthias
OAuth 2.0: Getting Started in API Security (API-University Series Book 1)OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014)
by Biehl, Matthias
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014)
by Siriwardena, Prabath
OAuth 2.0 Identity and Access Management PatternsOAuth 2.0 Identity and Access Management Patterns (2013)
by Spasovski, Martin
Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and AuthenticationGetting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012)
by Boyd, Ryan
Java Security (2nd Edition)Java Security (2nd Edition) (2001)
by Oaks, Scott
OAuth 2.0 ServersOAuth 2.0 Servers
by Parecki, Aaron