O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Access Control Lists

In this chapter, we will finally address the complex topic of access control lists, which can provide a rich model of domain object instance-level authorization. Spring Security ships with a robust, but complicated and poorly documented, access control list module which can serve the needs of small to medium-sized implementations reasonably well.

During the course of this chapter we'll:

  • Understand the conceptual model of access control lists
  • Review the terminology and application of access control list concepts in the Spring Security ACL module
  • Build and review the database schema required to support Spring ACL
  • Configure JBCP Pets to use ACL secured business methods via annotations and Spring Beans
  • Perform advanced configuration, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required