O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we have:

  • Introduced the configuration to support a permanent security data store using a JDBC-compatible database.
  • Configured JBCP Pets to use the database for user authentication and highly secure password storage, using password encryption and salting techniques.
  • Evaluated techniques for managing users persisted to a database using JDBC.
  • Configured user assignment into security groups, conferring roles, rather than direct role assignment. This increases the manageability of the site and its user community.
  • Explored the use of Spring Security with a legacy (non-default)database schema.
  • Examined configuration and application design techniques used to incorporate HTTPS to increase the security of data transferred to and from ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required