Getting started with security


Red Hat build of Quarkus 3.8

Red Hat Customer Content Services

Abstract

This guide demonstrates how to secure Quarkus applications by using Basic authentication and Jakarta Persistence, guiding you through prerequisites, application setup, and testing. It covers creating a Maven project, verifying dependencies, writing application endpoints, defining user entities, and configuring Basic authentication. It includes testing the application with Dev Services for PostgreSQL, compiling, running, and verifying application security using curl or a browser. By the end, you’ll understand how to implement role-based access control, readying you for more advanced mechanisms like OIDC. It details using Jakarta Persistence for security, including entity specifications, role storage, and password hashing.

Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.