| Categories | Auth Libraries |
|---|---|
| Tags | authsecurityauthenticationclientaccess |
| Organization | uk.gov.hmrc |
| HomePage | https://github.com/hmrc/auth-client 🔍 Inspect URL |
| Date | Mar 17, 2022 |
| Files | pom (3 KB) jar (385 KB) View All |
| Repositories | UkGov |
| Ranking | #2503 in MvnRepository (See Top Artifacts) #10 in Auth Libraries |
| Used By | 252 artifacts |
| Scala Target | Scala 2.13 (View all targets) |
| Vulnerabilities | Vulnerabilities from dependencies: CVE-2022-36944 |
Note: this artifact is located at UkGov repository (https://open.artefacts.tax.service.gov.uk/maven2/)
Compile Dependencies (3)
| Category/License | Group / Artifact | Version | Updates | |
|---|---|---|---|---|
| Config MIT | com.iheart » ficus_2.13 | 1.4.7 | 1.5.2 | |
| JVM Languages Apache 2.0 | org.scala-lang » scala-library1 vulnerability | 2.13.7 | 3.7.4 | |
| uk.gov.hmrc » http-verbs-play-28_2.13 | 13.12.0 | 15.1.0 |
Provided Dependencies (1)
| Category/License | Group / Artifact | Version | Updates | |
|---|---|---|---|---|
| Scalac Plugins Apache 2.0 | com.github.ghik » silencer-lib_2.13.7 | 1.7.7 | 1.17.13 |
Test Dependencies (5)
| Category/License | Group / Artifact | Version | Updates | |
|---|---|---|---|---|
| Markdown BSD 2-clause | com.vladsch.flexmark » flexmark-all | 0.35.10 | 0.64.8 | |
| Mocking MIT | org.scalamock » scalamock_2.13 | 4.4.0 | 7.5.2 | |
Apache 2.0 | org.scalatestplus » mockito-3-4_2.13 | 3.2.2.0 | 3.2.10.0 | |
| Testing Apache 2.0 | org.scalatestplus.play » scalatestplus-play_2.13 | 5.1.0 | 7.0.2 | |
| uk.gov.hmrc » http-verbs-test-play-28_2.13 | 13.12.0 | 15.1.0 |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |