Chapter 8. Configuring security

 

This chapter covers
  • Spring Security concepts
  • Configuring security
  • Generating configuration files
  • Protecting URLs
  • Customizing authorization credential storage
  • Creating user and role management pages
  • Implementing authentication to resources
  • Enabling security event logging

 

Most applications have to provide some level of security to prevent unauthorized users or external programs from accessing the system. In traditional Java EE applications, developers would delegate security to the application server infrastructure. Although there’s a standard API for Java security—the Java Authentication and Authorization Service, or JAAS—it doesn’t standardize the entire process of implementing the application security. ...

Get Spring Roo in Action now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.