Part 2. Implementation
In part 1, we discussed the importance of security and how to create the Spring Boot project using Spring Security as a dependency. This way, we’ve gone through the essential components for authentication, and we have a point to start from.
Part 2 makes up the bulk of this book. In this part, we dive into using Spring Security in application development. We detail each of the Spring Security components, and discuss different approaches you need to know when developing any real-world app. You’ll find all the various subjects you need to learn on developing security features in apps with Spring Security. I’ll drive you through a path of knowledge with multiple subjects, from the basics to using OAuth 2 and from securing apps using imperative programming to applying security in reactive applications. And I’ll make sure what we discuss is well spiced with lessons I’ve learned in my experience with using Spring Security.