February 2019
Intermediate to advanced
442 pages
11h 46m
English
Spring Security is the de facto standard for implementing security constraints in Spring-based applications. In previous chapters, we used Spring Security with an in-memory model while implementing user authentication and authorization. The in-memory model should only be used for testing purposes only. In a real scenario, authentication and authorization details are fetched from other systems to make it loosely coupled with the application code, such as LDAP, OAuth, and so on.
In Chapter 3, Blogpress – A Simple Blog Management System, we learned how to configure Spring Security with LDAP and OAuth in detail. In this chapter, we will use database tables to store authentication and authorization details. First, let's create ...