O'Reilly logo

Spring Security 3 by Peter Mularien

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

We have seen that LDAP servers can be relied upon to provide authentication and authorization information, as well as rich user profile information, when requested. In this chapter, we covered:

  • LDAP terminology and concepts, and understand how LDAP directories might be commonly organized to work with Spring Security
  • Configuration of both standalone (embedded) and external LDAP servers from a Spring Security configuration file
  • Authentication and authorization of users against LDAP repositories, and subsequent mapping to Spring Security actors
  • Differences in authentication schemes and password storage and security mechanisms in LDAP—and how they are treated in Spring Security
  • Mapping user detail attributes from the LDAP directory to the UserDetails ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required