2 Hello Spring Security
This chapter covers
- Creating your first project with Spring Security
- Designing simple functionalities that use the basic actors for authentication and authorization
- Understanding the relationship between the main actors involved in the basic authentication process
- Applying the basic contracts to understand how these actors relate to each other
- Writing your implementations for the primary responsibilities
- Overriding the Spring Boot’s default configurations
Spring Boot appeared as an evolutionary stage for application development with the Spring framework. Instead of you needing to write all the configurations, Spring Boot comes with something preconfigured, so you override only the configurations that don’t match your implementation. We also call this approach “convention-over-configuration”.