Need advice about which tool to choose?Ask the StackShare community!

Spring Security

539
583
+ 1
6
Stormpath

40
96
+ 1
146
Add tool

Spring Security vs Stormpath: What are the differences?

Developers describe Spring Security as "A powerful and highly customizable authentication and access-control framework". It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements. On the other hand, Stormpath is detailed as "User Management and Authentication for Developers". Stormpath is an authentication and user management service that helps development teams quickly and securely build web and mobile applications and services.

Spring Security and Stormpath belong to "User Management and Authentication" category of the tech stack.

Some of the features offered by Spring Security are:

  • Comprehensive
  • Servlet API integration
  • Protection against attacks

On the other hand, Stormpath provides the following key features:

  • User Authentication as a Service
  • Authorization – Easily model and manage your data, including pre-built roles
  • Flexible User Profiles

Spring Security is an open source tool with 3.63K GitHub stars and 3.2K GitHub forks. Here's a link to Spring Security's open source repository on GitHub.

Monkey Exchange, Debut, and Monbanquet.fr are some of the popular companies that use Spring Security, whereas Stormpath is used by Stormpath, Forerunner Games, and Notify-e. Spring Security has a broader approval, being mentioned in 12 company stacks & 9 developers stacks; compared to Stormpath, which is listed in 3 company stacks and 4 developer stacks.

Advice on Spring Security and Stormpath
Needs advice
on
KeycloakKeycloakOktaOkta
and
Spring SecuritySpring Security

I am working on building a platform in my company that will provide a single sign on to all of the internal products to the customer. To do that we need to build an Authorisation server to comply with the OIDC protocol. Earlier we had built the Auth server using the Spring Security OAuth project but since in Spring Security 5.x it is no longer supported we are planning to get over with it as well. Below are the 2 options that I was considering to replace the Spring Auth Server. 1. Keycloak 2. Okta 3. Auth0 Please advise which one to use.

See more
Replies (3)
Luca Ferrari
Solution Architect at Red Hat, Inc. · | 5 upvotes · 202.1K views
Recommends
on
KeycloakKeycloak

It isn't clear if beside the AuthZ requirement you had others, but given the scenario you described my suggestion would for you to go with Keycloak. First of all because you have already an onpremise IdP and with Keycloak you could maintain that setup (if privacy is a concern). Another important point is configuration and customization: I would assume with Spring OAuth you might have had some custom logic around authentication, this can be easily reconfigured in Keycloak by leveraging SPI (https://www.keycloak.org/docs/latest/server_development/index.html#_auth_spi). Finally AuthZ as a functionality is well developed, based on standard protocols and extensible on Keycloak (https://www.keycloak.org/docs/latest/authorization_services/)

See more
Sandor Racz
Recommends
on
KeycloakKeycloak

We have good experience using Keycloak for SSO with OIDC with our Spring Boot based applications. It's free, easy to install and configure, extensible - so I recommend it.

See more
Recommends
on
KeycloakKeycloak

You can also use Keycloak as an Identity Broker, which enables you to handle authentication on many different identity providers of your customers. With this setup, you are able to perform authorization tasks centralized.

See more
Get Advice from developers at your company using StackShare Enterprise. Sign up for StackShare Enterprise.
Learn More
Pros of Spring Security
Pros of Stormpath
  • 3
    Easy to use
  • 3
    Java integration
  • 29
    Authentication
  • 22
    User Management
  • 19
    API Authentication
  • 17
    Token Authentication
  • 17
    Security Workflows
  • 16
    Secure
  • 7
    Easy setup and great support
  • 7
    Great customer support
  • 6
    they manage the required, so I can focus on innovation
  • 3
    Private Deployment
  • 2
    Will sign BAA for HIPAA-compliance
  • 1
    Rapid Development
  • 0
    SAML Support

Sign up to add or upvote prosMake informed product decisions

Cons of Spring Security
Cons of Stormpath
    Be the first to leave a con
    • 4
      Discontinued

    Sign up to add or upvote consMake informed product decisions

    - No public GitHub repository available -

    What is Spring Security?

    It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.

    What is Stormpath?

    Stormpath is an authentication and user management service that helps development teams quickly and securely build web and mobile applications and services.

    Need advice about which tool to choose?Ask the StackShare community!

    What companies use Spring Security?
    What companies use Stormpath?
    See which teams inside your own company are using Spring Security or Stormpath.
    Sign up for StackShare EnterpriseLearn More

    Sign up to get full access to all the companiesMake informed product decisions

    What tools integrate with Spring Security?
    What tools integrate with Stormpath?

    Sign up to get full access to all the tool integrationsMake informed product decisions

    What are some alternatives to Spring Security and Stormpath?
    Django
    Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.
    OAuth2
    It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
    Keycloak
    It is an Open Source Identity and Access Management For Modern Applications and Services. It adds authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.
    Auth0
    A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.
    JSON Web Token
    JSON Web Token is an open standard that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed.
    See all alternatives