Summary
We have seen that LDAP servers can be relied on to provide authentication and authorization information, as well as rich user profile information when requested. In this chapter, we covered the LDAP terminology and concepts, and how LDAP directories might be commonly organized to work with Spring Security. We also explored the configuration of both standalone (embedded) and external LDAP servers from a Spring Security configuration file.
We covered authentication and authorization of users against LDAP repositories, and subsequent mapping to Spring Security actors. We also saw the differences in authentication schemes, password storage, and security mechanisms in LDAP, and how they are treated in Spring Security. We also learned to ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access