- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 116字
- 2021-07-23 18:59:17
Authorization
Spring Security allows you, as an application developer, many choices by which you can authorize user's access to various parts of your application. Here are some of the approaches:
- Web URL: Based on a URL or URL pattern, you can control access
- Method invocation: Even a method in a Java Bean can be access-controlled if needs be
- Domain instance: One of the very cool features is to control access to specific data by having access control of certain needed domain objects within your application
- Web service: Allows you to secure exposed web services in your application
In the next chapter, we will get into these aspects in a bit more detail with more code snippets.
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 網絡空間攻防技術原理
- Getting Started with FortiGate
- Building a Home Security System with BeagleBone
- 信息安全導論(第2版)
- 電腦安全與攻防入門很輕松(實戰超值版)
- 編譯與反編譯技術實戰
- 黑客攻防實戰從入門到精通
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 捍衛隱私
- 企業數據安全防護指南
- 信息內容安全管理及應用
- Learn Azure Sentinel
- 密碼朋克:自由與互聯網的未來