O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security is complicated: The architecture of secured web requests

The three step configuration that we illustrated before was impressively quick to implement; thanks to the Spring Security's powerful baseline configuration features and sensible out of the box defaults for authentication, which we enabled through the presence of the auto-config attribute on the <http> element.

Unfortunately, application implementation concerns, architecture limitations, and infrastructure integration requirements are likely to complicate your implementation of Spring Security well beyond what this simple configuration provides. Many users of Spring Security run into trouble moving beyond the basic configuration, as they don't understand the architecture of the product ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required