© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. Nardone, C. ScarioniPro Spring Securityhttps://doi.org/10.1007/979-8-8688-0035-1_4

4. Spring Security Architecture and Design

Massimo Nardone1   and Carlo Scarioni2
(1)
HELSINKI, Finland
(2)
Surbiton, UK
 

In Chapter 3, you developed an initial application secured with Spring Security. You got an overview of how this application worked and looked at some of the Spring Security components put into action in common Spring Security–secured applications. This chapter extends those explanations and delve deeply into the framework.

We’ll look at the main components of the framework, explain the work of the servlet filters for securing web applications, look at how ...

Get Pro Spring Security: Securing Spring Framework 6 and Boot 3-based Java Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.