© Carlo Scarioni and Massimo Nardone 2019
C. Scarioni, M. NardonePro Spring Securityhttps://doi.org/10.1007/978-1-4842-5052-5_5

5. Web Security

Carlo Scarioni1  and Massimo Nardone2
(1)
Surbiton, UK
(2)
HELSINKI, Finland
 

In this chapter, we will continue explaining how to apply security at the web layer for the Java Web-Based Applications you started in Chapter 3. You will see in detail the inner work of the security filter chain and the different metadata options at your disposal to define security constraints in your application. We will also explain in detail the taglib facility for enforcing security constraints at the view level, which was also introduced in Chapter 3.

Introducing the Simple Example Application

In this chapter, you will be working ...

Get Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.