官术网_书友最值得收藏!

Base project setup

Apart from the actual authentication mechanism, many aspects of the application are quite similar. In this section, we will set up the example and then cover the specific authentication mechanism in detail.

We will be using the default Spring Security DB schema against which we will authenticate the user. We will create a fully fledged Spring MVC web application, with each component being created from scratch. Creating a sample Spring Security application using Spring MVC with the help of Spring Boot is very easy. The application will function through many things that are hidden away from developers. But in this case, we will be creating this application component by component so that you can see the actual code with which a web application that is built on Spring MVC can be secured.

The default DB schema used by Spring Security is shown in the following diagram. However, you can customize it the way you think it is suitable for your application. We will be using the Users and Authorities tables for our setup here:

Figure 04: Spring Security default database schema

Let's now start developing our sample application.

主站蜘蛛池模板: 永修县| 手游| 东台市| 开远市| 兴国县| 大石桥市| 宁夏| 洮南市| 宜兰县| 甘洛县| 沭阳县| 陕西省| 瑞金市| 吴旗县| 富裕县| 莱西市| 兰州市| 双流县| 蛟河市| 上饶市| 鹤庆县| 博乐市| 漳浦县| 张家界市| 甘孜| 姜堰市| 安化县| 林芝县| 西畴县| 炎陵县| 新龙县| 古蔺县| 馆陶县| 西乌珠穆沁旗| 米易县| 威远县| 吉水县| 栾川县| 东宁县| 江山市| 景宁|