O'Reilly logo

Spring Security - Third Edition by Peter Mularien, Robert Winch, Mick Knutson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Creating a simple ACL entry

Recall that our very simple scenario is to only allow user2@example.com access to the birthday party event and ensure that no other events are accessible. You may find it helpful to refer back several pages to the database schema diagram to follow which data we are inserting and why.

We have already included a file named data.sql in the sample application. All of the SQL explained in this section will be from the file—you may feel free to experiment and add more test cases based on the sample SQL we've provided—in fact, we'd encourage that you experiment with sample data!

Let's take a look at the following steps for creating a simple ACL entry:

  1. First, we'll need to populate the ACL_CLASS table with any or all ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required