5 Securing Spring Boot applications

This chapter covers

  • An overview of Spring Security and common security threats
  • Enabling Spring Security in a Spring Boot application and understanding Spring Security autoconfiguration
  • Customizing Spring Security with in-memory, JDBC, and LDAP authentication
  • Implementing HTTP basic authentication in a Spring Boot project

In past chapters, you learned several essential techniques to build Spring Boot applications, and you are now well-versed in core Spring Boot concepts, understand several techniques to communicate to the database, can monitor Spring Boot applications with Spring Boot Actuator, and are in a position to start building enterprise-grade Spring Boot applications. However, before you get super ...

Get Spring Boot in Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.