© Carlo Scarioni and Massimo Nardone 2019
C. Scarioni, M. NardonePro Spring Securityhttps://doi.org/10.1007/978-1-4842-5052-5_4

4. Spring Security Architecture and Design

Carlo Scarioni1  and Massimo Nardone2
(1)
Surbiton, UK
(2)
HELSINKI, Finland
 

In the previous chapter, you developed an initial application secured with Spring Security. You got an overview of the way this application worked and looked in detail at some of the Spring Security components that are put into action in common Spring Security–secured applications. In this chapter, we are going to extend those explanations and delve deeply into the framework.

We’ll look at the main components of the framework, explain the work of the servlet filters for securing web applications, look at how ...

Get Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.