© Carlo Scarioni and Massimo Nardone 2019
C. Scarioni, M. NardonePro Spring Securityhttps://doi.org/10.1007/978-1-4842-5052-5_6

6. Configuring Alternative Authentication Providers

Carlo Scarioni1  and Massimo Nardone2
(1)
Surbiton, UK
(2)
HELSINKI, Finland
 

One of Spring Security’s strongest points is that you can plug different authentication mechanisms into the framework. Spring Security was built to create, as much as possible, a pluggable architecture model, where different things can be plugged into the framework in an easy and unobtrusive way. In the authentication layer, this means that an abstraction exists that takes care of this part of the security process. This abstraction comes in the form, mainly, of the AuthenticationProvider interface, ...

Get Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.