Custom Authentication

In Chapter 2, Getting Started with Spring Security, we demonstrated how to use an in-memory datastore to authenticate the user. In this chapter, we'll explore how to solve some common, real-world problems by extending Spring Security's authentication support to use our existing set of APIs. Through this exploration, we'll get an understanding of each of the building blocks that Spring Security uses in order to authenticate users.

During the course of this chapter, we will cover the following topics:

  • Leverage Spring Security’s annotations and Java-based configuration
  • Discovering how to obtain the details of the currently logged-in user
  • Adding the ability to log in after creating a new account
  • Learning the simplest method ...

Get Spring Security - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.