October 2020
Beginner to intermediate
560 pages
14h 52m
English
This chapter covers
Selecting requests to apply restrictions using matcher methods
Learning best-case scenarios for each matcher method
In chapter 7, you learned how to configure access based on authorities and roles. But we only applied the configurations for all of the endpoints. In this chapter, you’ll learn how to apply authorization constraints to a specific group of requests. In production applications, it’s less probable that you’ll apply the same rules for all requests. You have endpoints that only some specific users can call, while other endpoints might be accessible to everyone. Each application, depending on the business requirements, has its own custom authorization configuration. ...
Read now
Unlock full access