Summary

There are lots of ways to secure Spring MVC applications from unexpected attacks. The common way is to use third-party authentication modules, database authentication or any server-side security installations. This chapter talks about challenging the users to validate their intentions when accessing the software. Although not the ultimate solution, it provides delays which can help the administrator observe the nature of access of many visitors.

Get Spring MVC Blueprints now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.