O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding how Spring LDAP authentication works

We saw that we were able to log in using a user defined in the LDIF file, and thus was present in the LDAP directory. What exactly happens when a user issues a login request for a user in LDAP? There are three basic steps to the LDAP authentication process:

  • Authenticate the credentials supplied by the user against the LDAP directory
  • Determine the GrantedAuthority that the user has, based on their information in LDAP
  • Pre-load information from the LDAP entry for the user into a custom UserDetails object, for further use by the application

Authenticating user credentials

For the first step, authentication against the LDAP directory, a custom authentication provider is wired into the AuthenticationManager ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required