October 2020
Beginner to intermediate
560 pages
14h 52m
English
This chapter covers
Implementing cross-site request forgery protection
Customizing CSRF protection
Applying cross-origin resource sharing configurations
You have learned about the filter chain and its purpose in the Spring Security architecture. We worked on several examples in chapter 9, where we customized the filter chain. But Spring Security also adds its own filters to the chain. In this chapter, we’ll discuss the filter that applies CSRF protection and the one related to CORS configurations. You’ll learn to customize these filters to make a perfect fit for your scenarios.
You have probably observed that in most of the ...
Read now
Unlock full access