November 2017
Intermediate to advanced
542 pages
14h 24m
English
Although username and password authentication is extremely common, as we discussed in Chapter 1, Anatomy of an Unsafe Application, and in Chapter 2, Getting Started with Spring Security, forms of authentication exist that allow users to present different types of credentials. Spring Security caters to these requirements as well. In this chapter, we'll move beyond form-based authentication to explore authentication using trusted client-side certificates.
During the course of this chapter, we will cover the following topics:
Read now
Unlock full access