Security use case

The use case we will use for all our examples is as follows:

  1. The user reaches the application or homepage of the application and clicks on a secure link (for example, login).
  2. The moment the user clicks on the secured link, Spring Security brings the login page.
  3. The login page will perform a credential check from the authentication provider; this can be plain-text, database, or similar.
  4. An authentication failure happens if wrong credentials are given by the user; otherwise, the user will be allowed to the secured area.
  5. When the user clicks on logout, they will be directed to the homepage.

The following diagram illustrates the preceding steps:

Get Spring: Developing Java Applications for the Enterprise now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.