Avoid NullPointerException: Safe Navigation with Groovy

We know it’s all too common in Java to get a NullPointerException when we use an object reference which is null. This happens when our code tries to access a method or field of an object, or element of an array when there’s no instance present – e.g. it refers to null.

We might get an Animal instance from … Lees verder Avoid NullPointerException: Safe Navigation with Groovy

Security with microservices: programmatic security with Keycloak

In todays modern IT architecture, domains are quite the thing. Domains are supposed to be as much isolated from each other as possible. If you have an application that manages sensitive data (and really, when do you not have sensitive data?), you need to think about security. Programmatic security In many cases, you can get away with role-based security (e.g. … Lees verder Security with microservices: programmatic security with Keycloak

Programmatically adding users in Keycloak

Managing users in Keycloak can be done manually via the admin console (if you are running it locally, it can be found on http://localhost:8080/auth). If you have an LDAP service somewhere, you could also integrate that and manage the users via that. In this blog post, we’ll examine a simple way to manage users programmatically. We could use the Admin REST … Lees verder Programmatically adding users in Keycloak

Forward compatible messaging

If you have services or domains in your architecture, you probably have them to be able to develop them independently. In most cases, Message Queue’s are used to communicate between these services. But how does this work if one service upgrades the messages it is sending while the consuming services are still on an older version? In this blog post, we’ll … Lees verder Forward compatible messaging

Migration scenario to a safer password store

Previously, we posted a blogpost about hashed password storage. In our most recent First8 friday videoblog, I presented this strategy. If we have hashed passwords based on a fast algorithm, this post presents a strategy to migrate to slow hashing, as graceful as possible. Until the last possible moment we defer switching over completely. A strategy that can be applied … Lees verder Migration scenario to a safer password store

First8 sponsort de Maker Faire in Eindhoven

In het weekend van 29 & 30 augustus was het Maker Faire festival in Eindhoven. Dit is een jaarlijks event waar groot publiek geniet van tech-bedrijven die hun creativiteit op het gebied van de moderne techniek delen. First8 sponsorde dit high-tech festival en had er een informele stand. Er was veel belangstelling voor ons, mede dankzij onze vrolijke 3D-Led Cubes. … Lees verder First8 sponsort de Maker Faire in Eindhoven