2 Hello Spring Security

 

This chapter covers

  • Creating your first project with Spring Security
  • Designing simple functionalities that use the basic actors for authentication and authorization
  • Understanding the relationship between the main actors involved in the basic authentication process
  • Applying the basic contracts to understand how these actors relate to each other
  • Writing your implementations for the primary responsibilities
  • Overriding the Spring Boot’s default configurations

Spring Boot appeared as an evolutionary stage for application development with the Spring framework. Instead of you needing to write all the configurations, Spring Boot comes with something preconfigured, so you override only the configurations that don’t match your implementation. We also call this approach “convention-over-configuration”.

2.1      Starting with the first project

2.2      Which are the default configurations?

2.3      Overriding the default configurations

2.3.1   Overriding the UserDetailsService component

2.3.2   Overriding the endpoint authorization configuration

2.3.3   Setting the configuration in different ways

2.3.4   Overriding the AuthenticationProvider implementation

2.3.5   Using multiple configuration classes in your project

2.4      Summary

sitemap