This chapter covers
- An overview of Spring Security and common security threats
- Enabling Spring Security in a Spring Boot application and understanding Spring Security autoconfiguration
- Customizing Spring Security with in-memory, JDBC, and LDAP authentication
- Implementing HTTP basic authentication in a Spring Boot project
In past chapters, you learned several essential techniques to build Spring Boot applications, and you are now well-versed in core Spring Boot concepts, understand several techniques to communicate to the database, can monitor Spring Boot applications with Spring Boot Actuator, and are in a position to start building enterprise-grade Spring Boot applications. However, before you get super excited and announce to the world your newly acquired skills, there is another essential technique that you need to master. What about the security of our Spring Boot applications? In this chapter, you’ll explore several techniques to secure Spring Boot applications with Spring Security.