Google API data retrieving example using OAuth2 for authentication and authorization

LicenseApache 2.0BSDCC0 1.0CDDL 1.1GPL 1.1Public
CategoriesWeb Applications
Tagsapplicationwarglassfishgooglewebwebappauthenticationclientwebserviceexampleoauth
Ranking#430252 in MvnRepository (See Top Artifacts)
#2856 in Web Applications
Used By1 artifacts

VersionVulnerabilitiesRepositoryUsagesDate
2.27.x
2.27CentralApr 10, 2018
2.26.x
2.26CentralSep 05, 2017
2.26-b09CentralJul 27, 2017
2.26-b08CentralJul 12, 2017
2.26-b07CentralJun 30, 2017
2.26-b06CentralJun 15, 2017
2.26-b05CentralJun 09, 2017
2.26-b04CentralMay 19, 2017
2.26-b03CentralMar 13, 2017
2.26-b02CentralFeb 01, 2017
2.26-b01CentralJan 13, 2017
2.25.x
2.25.1CentralJan 19, 2017
2.25CentralDec 08, 2016
2.24.x
2.24.1CentralNov 21, 2016
2.24CentralOct 27, 2016
2.23.x
2.23.2CentralAug 08, 2016
2.23.1CentralJun 09, 2016
2.23CentralMay 18, 2016
2.22.x
2.22.4CentralNov 30, 2016
2.22.3CentralOct 26, 2016

Related Books

GlassFish Deployment and Administration Guide: Definitive Reference for Developers and EngineersGlassFish Deployment and Administration Guide: Definitive Reference for Developers and Engineers (2025)
by Johnson, Richard
Cloud Native Data Security with OAuth: A Scalable Zero Trust ArchitectureCloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025)
by Archer, Gary, Kahrer, Judith, Trojanowski, Michał
OAuth 2.0: All you need to know (Identity in Cybersecurity)OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025)
by Relington, James
Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition)Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023)
by Dash, Sambit Kumar
Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applicationsKeycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023)
by Thorgersen, Stian, Silva, Pedro Igor
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022)
by Wilson, Yvonne, Hingnikar, Abhishek
Advanced API Security: OAuth 2.0 and BeyondAdvanced API Security: OAuth 2.0 and Beyond (2019)
by Siriwardena, Prabath
OAuth 2.0 SimplifiedOAuth 2.0 Simplified (2018)
by Parecki, Aaron
OAuth 2 in ActionOAuth 2 in Action (2017)
by Richer, Justin, Sanso, Antonio
OAuth 2.0: Learn OAuth in a simple wayOAuth 2.0: Learn OAuth in a simple way (2016)
by Warnock, Dan
OAuth 2.0: Introduction to API Security with OAuth 2.0OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016)
by Moore, Joseph
Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkMastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015)
by Bihis, Charles
OAuth 2.0: Getting Started in Web-API Security (API University Series)OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015)
by Biehl, Matthias
OAuth 2.0: Getting Started in API Security (API-University Series Book 1)OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014)
by Biehl, Matthias
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014)
by Siriwardena, Prabath
Java EE 7 with GlassFish 4 Application ServerJava EE 7 with GlassFish 4 Application Server (2014)
by Heffelfinger, David R.
OAuth 2.0 Identity and Access Management PatternsOAuth 2.0 Identity and Access Management Patterns (2013)
by Spasovski, Martin
Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and AuthenticationGetting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012)
by Boyd, Ryan
Beginning Java EE 6 with GlassFish 3Beginning Java EE 6 with GlassFish 3 (2011)
by Goncalves, Antonio
[(Beginning Java EE 6 with GlassFish 3 )] [Author: Antonio Goncalves] [Aug-2010][(Beginning Java EE 6 with GlassFish 3 )] [Author: Antonio Goncalves] [Aug-2010] (2010)
by Antonio Gonçalves
Beginning Java EE 6 with GlassFish 3 (Expert's Voice in Java Technology)Beginning Java EE 6 with GlassFish 3 (Expert's Voice in Java Technology) (2010)
by Goncalves, Antonio
Java EE 6 with GlassFish 3 Application ServerJava EE 6 with GlassFish 3 Application Server (2010)
by Heffelfinger, David
GlassFish SecurityGlassFish Security (2010)
by Kalali, Masoud
GlassFish AdministrationGlassFish Administration (2010)
by Kou,Xuekun
OAuth 2.0 ServersOAuth 2.0 Servers
by Parecki, Aaron
Beginning Java EE 6 : GlassFish 3 de hajimeru entapuraizu Java.Beginning Java EE 6 : GlassFish 3 de hajimeru entapuraizu Java.
by