- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 160字
- 2021-07-23 18:59:18
Deep Diving into Spring Security
This is a hands-on book, but our first chapter was theoretical (as it should be) because it was an introductory chapter.
In this chapter, we will dive deeply into the technical capabilities of Spring Security, specifically authentication and authorization, using code. However, before we get into the coding, we will give a brief explanation of the theory. We are doing this because it is important to understand the concepts before diving into coding.
The two most important aspects of security are as follows:
- Find the identity of the user
- Find what resources this user has access to
authentication is the mechanism by which you find out who a user is, and authorization is the mechanism that allows an application to find out what the user can do with the application:
Figure 01: Fundamental aspects of security—Authentication and Authorization
In this chapter we will cover the following:
- Authentication
- Authentication mechanisms
- Authorization
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 為你護航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- INSTANT Metasploit Starter
- 反黑命令與攻防從新手到高手(微課超值版)
- 工業(yè)物聯(lián)網(wǎng)安全
- 隱私計算
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- Mastering Reverse Engineering
- INSTANT Apple Configurator How-to
- 持續(xù)集成:軟件質(zhì)量改進和風險降低之道
- CTF特訓營:技術(shù)詳解、解題方法與競賽技巧
- 信息安全工程與實踐
- VMware vCloud Security
- Mastering Malware Analysis
- 物聯(lián)網(wǎng)信息安全技術(shù)