10 Applying CSRF protection and CORS
This chapter covers
-
Implementing cross-site request forgery protection
-
Customizing CSRF protection
-
Applying cross-origin resource sharing configurations
You have learned about the filter chain and its purpose in the Spring Security architecture. We worked on several examples in chapter 9, where we customized the filter chain. But Spring Security also adds its own filters to the chain. In this chapter, we’ll discuss the filter that applies CSRF protection and the one related to CORS configurations. You’ll learn to customize these filters to make a perfect fit for your scenarios.
10.1 Applying cross-site request forgery (CSRF) protection in applications
You have probably observed that in most of the ...
Get Spring Security in Action now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.