In this chapter, we have:
- Introduced the configuration to support a permanent security data store using a JDBC-compatible database.
- Configured JBCP Pets to use the database for user authentication and highly secure password storage, using password encryption and salting techniques.
- Evaluated techniques for managing users persisted to a database using JDBC.
- Configured user assignment into security groups, conferring roles, rather than direct role assignment. This increases the manageability of the site and its user community.
- Explored the use of Spring Security with a legacy (non-default)database schema.
- Examined configuration and application design techniques used to incorporate HTTPS to increase the security of data transferred to and from ...