O'Reilly logo

Spring Roo in Action by Ken Rimple, Srini Penchikala. Foreword by Ben Alex.

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Configuring security

 

This chapter covers
  • Spring Security concepts
  • Configuring security
  • Generating configuration files
  • Protecting URLs
  • Customizing authorization credential storage
  • Creating user and role management pages
  • Implementing authentication to resources
  • Enabling security event logging

 

Most applications have to provide some level of security to prevent unauthorized users or external programs from accessing the system. In traditional Java EE applications, developers would delegate security to the application server infrastructure. Although there’s a standard API for Java security—the Java Authentication and Authorization Service, or JAAS—it doesn’t standardize the entire process of implementing the application security. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required