O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Client Certificate Authentication

Although username and password authentication is extremely common, as we discussed in Chapter 1, Anatomy of an Unsafe Application and Chapter 2, Getting Started with Spring Security; forms of authentication exist that allow users to present different types of credentials. Spring Security caters to these requirements as well, and in this chapter we'll move beyond form-based authentication to explore authentication using trusted client-side certificates.

During the course of this chapter we'll:

  • Learn how client certificate authentication is negotiated between the user's browser and a compliant server
  • Configure Spring Security to authenticate users with client certificates
  • Understand the architecture of client ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required