- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 191字
- 2021-07-23 18:59:20
Base project setup
Apart from the actual authentication mechanism, many aspects of the application are quite similar. In this section, we will set up the example and then cover the specific authentication mechanism in detail.
We will be using the default Spring Security DB schema against which we will authenticate the user. We will create a fully fledged Spring MVC web application, with each component being created from scratch. Creating a sample Spring Security application using Spring MVC with the help of Spring Boot is very easy. The application will function through many things that are hidden away from developers. But in this case, we will be creating this application component by component so that you can see the actual code with which a web application that is built on Spring MVC can be secured.
The default DB schema used by Spring Security is shown in the following diagram. However, you can customize it the way you think it is suitable for your application. We will be using the Users and Authorities tables for our setup here:
Let's now start developing our sample application.
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- Kali Linux CTF Blueprints
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 黑客攻防技巧
- 等級(jí)保護(hù)測(cè)評(píng)理論及應(yīng)用
- 黑客攻防與無(wú)線安全從新手到高手(超值版)
- 網(wǎng)絡(luò)運(yùn)維親歷記 (網(wǎng)絡(luò)運(yùn)維紀(jì)實(shí)文學(xué))
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 隱私計(jì)算
- 人工智能安全(精裝版)
- End to End GUI Development with Qt5
- CTF特訓(xùn)營(yíng):技術(shù)詳解、解題方法與競(jìng)賽技巧
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實(shí)戰(zhàn)
- 云計(jì)算安全防護(hù)技術(shù)
- Mastering Malware Analysis