In previous article, we became familiar with how to fetch a valid certificate using Let’s Encrypt client. In this post, we see how we can renew our certificates and use them with Spring Boot.








In this article, we become familiar how to generate a standalone certificate using Let’s Encrypt authority and how to make it work with Spring Boot application. Let’s Encrypt made it easy and free for the whole web to obtain a valid certificate.
I have a security plugin installed on my blog. This plugin has many features including bruteforce attack detection which hardens the login page. If it detects repetitive login requests by an IP address in a short period of time, it blocks the IP for a considerable amount of time. Continue reading
In this article we secure our Spring Boot application with HTTPS. First of all we become familiar with TLS/SSL briefly. Then we see how we can generate a self-signed certificate and secure a simple Spring Boot application. We call this project Spring Boot HTTPS Seed and you can grab the code from my Github. Continue reading
In this article we briefly explains how a Native Application client can authenticate itself against Azure AD and obtain access token in order to safely gain access to a secured Web API. Then, a very short example is given using Java and CURL. Continue reading
In this article, we briefly see some examples about basic functionalities of Elasticsearch using its native Java API. Then, we try to create an embedded node for Unit Testing. This embedded Elastic node comes with a minimal configuration and all the necessary cleanup functions for test executions. Continue reading
Using native Java API of the Elasticsearch, you’re able to create several types of nodes: normal Elastic node, embedded Node, node for testing, and remote nodes. In this article, we skim through different types of nodes as well as showing the way of instantiating them.
Continue reading
A workflow consists of an orchestrated and repeatable pattern of business activity enabled by the systematic organization of resources into processes that transform materials, provide services, or process information[8]. The Workflow paradigm has been adopted in a wide range of software systems in order to make business logic more flexible, manageable and agile towards initial design and future changes. With the advent of Cloud Computing, enterprises have been making efforts for migration or deployment of their workflows and their middleware in the Cloud. On the way to achieve this goal, some challenges should be considered and planned, such as multi-tenancy, scalability, load balancing, hybrid Clouds, failure management, security and some other aspects. In this survey we present several leading workflow middleware with short overview of their features and we elaborate on those, which have support for deployment in a Cloud environment. Furthermore, we discuss some of the aforementioned challenges in more details.
Keyword: Workflow, Middleware, Cloud Computing
Emad Heydari Beni
In this article, we introduce some of the Elasticsearch basic concepts and examples of using its REST API.
Continue reading
Elasticsearch is an open source, distributed, scalable, highly available, document-oriented, RESTful, full text search engine with realtime search and analytics capabilities. It is basically built on top of the Apache Lucene for the indexing purposes. In this post, I am going to give you a very quick conceptual introduction to Elasticsearch.
Continue reading