Featured
Java Spring Jongo Spring Boot Spring Security Authentication Authorization Denormalization
Authentication & authorization with Spring Boot & MongoDB
Posted on .Abstract: What should we denormalize and what should we not? How many times have you heard this question in the context of MongoDB? As a follow up of this question there is often a counter example of how we used to do it with a relational database. In this art…