官术网_书友最值得收藏!

Deep Diving into Spring Security

This is a hands-on book, but our first chapter was theoretical (as it should be) because it was an introductory chapter.

In this chapter, we will dive deeply into the technical capabilities of Spring Security, specifically authentication and authorization, using code. However, before we get into the coding, we will give a brief explanation of the theory. We are doing this because it is important to understand the concepts before diving into coding.

The two most important aspects of security are as follows:

  • Find the identity of the user
  • Find what resources this user has access to

authentication is the mechanism by which you find out who a user is, and authorization is the mechanism that allows an application to find out what the user can do with the application:

Figure 01: Fundamental aspects of security—Authentication and Authorization

In this chapter we will cover the following:

  • Authentication
  • Authentication mechanisms
  • Authorization
主站蜘蛛池模板: 桐柏县| 孙吴县| 杭锦后旗| 南京市| 巨鹿县| 寻乌县| 申扎县| 宜章县| 永春县| 陈巴尔虎旗| 辛集市| 新巴尔虎右旗| 富裕县| 太和县| 峨山| 益阳市| 尼勒克县| 竹山县| 合作市| 衡阳县| 东宁县| 山东| 淮阳县| 宁德市| 乌兰县| 西乡县| 镇康县| 张掖市| 东宁县| 彰化市| 清原| 中西区| 北流市| 迁西县| 沛县| 黄山市| 南溪县| 宁乡县| 始兴县| 罗江县| 宁南县|