This video is a recording of a live Twitch stream wherein Brian Demers and Matt Raible (from Okta) work with Josh Long (from Spring) to make Okta’s Spring Boot starter work with Spring Native.
Security.txt: Make Vulnerabilities Easier to Report

This video is a recording of a live Twitch stream wherein Brian Demers and Matt Raible (from Okta) work with Josh Long (from Spring) to make Okta’s Spring Boot starter work with Spring Native.
Learn how sessions are used with OAuth 2.0 and build an example with HAproxy, Redis, and Spring Boot.
A common OAuth 2.0 question we get: “How do I deal with OAuth in a load-balanced application?” The short answer: There’s nothing specific about session clustering for OAuth. The longer answer is—you likely still need to worry about cluster session management. This post will discuss how an OAuth login relates to your application’s session. And we’ll build a simple, secure, load-balanced application to demonstrate.
Tutorial: Learn how to use JWT and opaque access with Spring Boot.
The topic of validating an OAuth 2.0 access tokens comes up frequently on this blog. Often we talk about how to validate JSON Web Token (JWT) based access tokens; however, this is NOT part of the OAuth 2.0 specification. JWTs are so commonly used that Spring Security supported them before adding support for remotely validating tokens (which is part of the OAuth 2.0 specification.)
This tutorial demonstrates the logout options you have when developing Spring applications and helps you pick the right one for you!
On the Okta blog, we spend much of our time talking about logging in. That is because once you configure your application to log in, the log out just works. But there are a few things you should consider when you’re thinking about your app’s logout configuration. In this post, I’ll walk through examples of the two logout options you have with Spring Security: the “default” session clearing logout, and relying party initiated logout.
Video/Stream
Curious to know best practices for securing your Spring Boot applications? This webinar provides 10 excellent ways to secure your Spring Boot apps with Spring Security and other techniques.