This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Category:Scala"

From OWASP
Jump to: navigation, search
(Secure Coding Libraries)
Line 94: Line 94:
 
|}
 
|}
  
= Related 3rd Party Projects =
+
= Security Frameworks =
  
A list of third party (i.e. not part of Java SE or EE) security frameworks. This page contains a list of Java security libraries and frameworks and indicates which security features each library supports.
+
{| class="wikitable"
 
+
|-
==Enterprise==
+
! Framework !! Authentication !! Authorization !! CSRF !! XSS !! SQLInjection
* [http://shiro.apache.org/ Apache Shiro] is a Java security framework that performs authentication, authorization, cryptography, and session management.
+
|-
* [http://projects.spring.io/spring-security/ Spring Security] provides security services for Java EE-based enterprise software applications. Services include authentication, authorization and protection against attacks like session fixation, clickjacking and cross site request forgery.
+
| Play || Example || Example || Example || Example || Example
* [http://www.hdiv.org/ HDIV] A web application security framework that provides a number of functions.
+
|-
 
+
| Authentication and Authorization module || Example || Example || Example || Example || Example
== Access Control (Authentication and Authorization) ==
+
|-
* [http://oaccframework.org/ OACC] is an application security framework for Java designed for fine grained (object level) access control. OACC uses the abstraction of a ''resource'' for the application objects being secured. This key abstraction enables OACC to provide a rich API that includes grant, revoke and query capabilities for storing and managing the application's security relationships.
+
| Authenticity Token module || Example || Example || Example || Example || Example
* [http://picketlink.org/appsecurity/ PicketLink]  provides authentication, single sign on, permission based access control and other security features.
+
|-
 
+
| Deadbolt 2 || Example || Example || Example || Example || Example
== Encryption ==
+
|-
* [https://github.com/google/keyczar Keyczar] is an open source cryptographic toolkit designed to make it easier and safer for developers to use cryptography in their applications. Keyczar supports authentication and encryption with both symmetric and asymmetric keys.
+
| Play-pac4j || Example || Example || Example || Example || Example
* [http://www.bouncycastle.org/ Bouncycastle] is a lightweight Java cryptography API <i>provider</i>.
+
|-
* [http://www.jasypt.org/ Jasypt] is a Java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works.
+
| Scala-oauth2-provider || Example || Example || Example || Example || Example
 
+
|-
== XML Security ==
+
| SecureSocial || Example || Example || Example || Example || Example
* The [http://santuario.apache.org/ Apache Santuario] project is aimed at providing implementation of the primary security standards for XML: XML-Signature Syntax and Processing and XML Encryption Syntax and Processing.
+
|-
 
+
| Silhouette || Example || Example || Example || Example || Example
== Validation ==
+
|-
* [http://www.sapia-oss.org/projects/vlad/home.html Vlad] stands for "validation". This projects indeed aims at offering a simple, high-level, extensible, generic validation framework that can easily be integrated into existing applications.
+
| Stateless client authentication || Example || Example || Example || Example || Example
* [https://www.owasp.org/index.php/Protect_FileUpload_Against_Malicious_File This OWASP article] and [https://github.com/righettod/document-upload-protection code snippet] proposes a way to protect a file upload feature against submission of files that may contain malicious code.
+
|-
* [http://commons.apache.org/proper/commons-validator/ The Apache Common's validator] can be used to perform validation.
+
| Lift || Example || Example || Example || Example || Example
 +
|-
 +
| Akka (Akka-http) || Example || Example || Example || Example || Example
 +
|-
 +
| Akka-http-sessions || Example || Example || Example || Example || Example
 +
|-
 +
| Akka-http-extensions || Example || Example || Example || Example || Example
 +
|-
 +
| Akka-http-extensions || Example || Example || Example || Example || Example
 +
|}
 +
  
 
= Resources =
 
= Resources =

Revision as of 19:10, 5 November 2017

About

The OWASP Scala and JVM Technology Knowledge Base is the clearing house for all information related to building secure web/distributed applications and services based on Java and JVM technologies. The focus of these pages is on guidance for developers and architects using Scala frameworks and JVM based technologies for Backend development

Purpose

  • Provide deep, rich guidance for Scala developers in using the security features of Scala frameworks.
  • Address security in relation to the Java Virtual Machine and derived technologies.
  • Guide system administrators in managing Scala and JVM related components and applications.
  • Create guidance for use of OWASP components that are designed for use with Scala or other JVM languages.
  • Focus on information about working with and on OWASP tools built using Scala or other JVM technologies.
  • Provide a stream of security related information, like vulnerabilities and security patches, related to the Scala and JVM universe.
  • Build an ecosystem allowing to all actors interested to discuss, share and learn.

Licensing

OWASP Java™ and JVM Technology Knowledge Base is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Oracle® and Java™ are trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

What's Hot!

See the "Tasks and Roadmap" tab for more information.

Wiki Pages Review Operation - 2015/2016

OWASP Java Wiki logo.png


Meta

Last Update: 11/5/2017


Other Resources

Mailing List

GitHub (OWASP)


Related Projects

Framework Authentication Authorization CSRF XSS SQLInjection
Play Example Example Example Example Example
Authentication and Authorization module Example Example Example Example Example
Authenticity Token module Example Example Example Example Example
Deadbolt 2 Example Example Example Example Example
Play-pac4j Example Example Example Example Example
Scala-oauth2-provider Example Example Example Example Example
SecureSocial Example Example Example Example Example
Silhouette Example Example Example Example Example
Stateless client authentication Example Example Example Example Example
Lift Example Example Example Example Example
Akka (Akka-http) Example Example Example Example Example
Akka-http-sessions Example Example Example Example Example
Akka-http-extensions Example Example Example Example Example
Akka-http-extensions Example Example Example Example Example


Roadmap

  • Wiki Pages Review Operation - 2016 General review of all Java and JVM related pages in the wiki.
  • Build Java and JVM security related net resources guide
  • The OWASP Java and JVM Technology Knowledge Base is principally about creating deep, rich guidance for Java and JVM developers using all kind of security resources. The idea is to have an effort of building a internet resource guide for everything around the JVM universe. Information, blogs, articles, tools, test servers and more. Important however is that this list is seriously curated.
  • Concrete guideline for Java and JVM developers
  • Clear checklists, around various topics, language, servers and frameworks.


The first step would be to establish contact with the project leaders and/or the entire team. This can be done using a direct and private message, or by joining the public mailing list to say hello.

When it comes to participating in project activities, everything depends on the time you are willing and able to invest. It is however very important to not jump into too many things at the beginning, later having to back out or to let unfinished things behind you. It is much better to start with small tasks, increasing intensity and investment over time.

Please also be patient with expecting the "merge" of your work into the existing project pages and code. As everywhere in live, trust has to be built-up.

The Java and JVM knowledge base has currently multiple tasks open, which can be found on the adequate section of this page. Not all tasks require a wiki account. Please take something you are interested in and start participating. Work load is not the only outcome when participating in open projects. You are getting a lot of things back: recognition, satisfaction, knowledge and contacts, sometime friends.

Sounds cool? Then jump in...

To get involved join the mailing list, follow this link: OWASP Java and JVM Mailing List



The previous version of this JAVA Project home page is archived here: OWASP Java Project Archive (8.2010)









IMPORTANT: all pages of these project are currently under review. A lot are outdated and are in the process of being removed or updated. The review effort is coordinated on this page: Wiki Pages Review Operation - 2015/2016.


(The pages in the "old" category "OWASP Java Project" have to be moved into the category "Java". Work is in progress).

no pages or subcategories

Pages in category "Scala"

This category contains only the following page.