Chapter 7. Dealing with Security

Security crosses every boundary of IT systems; from physical access to data centers and server racks, to encrypting communications, and all the way to validating inputs of web services endpoints. In this chapter, we will focus on the security measures that directly affect web services. We will cover the following topics:

  • The booking component of our sample RESTful web service being used to illustrate how security concerns can be addressed with Spring
  • Authentication techniques
  • Authorization techniques
  • Input validation
  • The use of encryption

The booking service

Before we delve into how to handle security with Spring, let's first discuss the component of our sample property management system that we will use in this chapter: ...

Get Building a RESTful Web Service with Spring now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.