November 2017
Intermediate to advanced
542 pages
14h 24m
English
Now we need to map our existing users to groups, and the groups to authorities. This is done in the security-groups-mappings.sql file. Mapping based on groups can be convenient because often, organizations already have a logical group of users for various reasons. By utilizing the existing groupings of users, we can drastically simplify our configuration. This is how a layer of indirection helps us. We have included the group definitions, group to authority mappings, and a few users in the following group mapping:
//src/main/resources/database/h2/security-groups-mappings.sql -- Create the Groups insert into groups(group_name) values ('Users'); insert into groups(group_name) values ('Administrators'); -- Map the Groups ...Read now
Unlock full access