November 2017
Intermediate to advanced
542 pages
14h 24m
English
The first step is to be able to obtain the necessary information from the database. This will replace the logic that reads in the antMatchers() methods from our security bean configuration. In order to do this, the chapter's sample code contains JpaRequestConfigMappingService, which will obtain a mapping of an ant pattern and an expression from the database represented as RequestConfigMapping. The rather simple implementation is as follows:
// src/main/java/com/packtpub/springsecurity/web/access/intercept/ JpaRequestConfigMappingService.java @Repository("requestConfigMappingService") public class JpaRequestConfigMappingService implements RequestConfigMappingService { @Autowired private SecurityFilterMetadataRepository ...Read now
Unlock full access