- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 160字
- 2021-07-23 18:59:18
Deep Diving into Spring Security
This is a hands-on book, but our first chapter was theoretical (as it should be) because it was an introductory chapter.
In this chapter, we will dive deeply into the technical capabilities of Spring Security, specifically authentication and authorization, using code. However, before we get into the coding, we will give a brief explanation of the theory. We are doing this because it is important to understand the concepts before diving into coding.
The two most important aspects of security are as follows:
- Find the identity of the user
- Find what resources this user has access to
authentication is the mechanism by which you find out who a user is, and authorization is the mechanism that allows an application to find out what the user can do with the application:
Figure 01: Fundamental aspects of security—Authentication and Authorization
In this chapter we will cover the following:
- Authentication
- Authentication mechanisms
- Authorization
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Metasploit Penetration Testing Cookbook(Third Edition)
- Wireshark 2 Quick Start Guide
- 開發者的Web安全戒律:真實威脅與防御實踐
- Computer Forensics with FTK
- 網絡運維親歷記 (網絡運維紀實文學)
- 數據保護:工作負載的可恢復性
- 數據安全架構設計與實戰
- 網絡服務安全與監控
- 網絡安全實戰詳解(企業專供版)
- 功能型密碼算法設計與分析
- 黑客攻防從入門到精通:命令版
- 聯邦學習原理與算法
- 網絡空間安全實戰基礎
- 黑客攻防入門