welcome
In this book
Copyright 2020 Manning Publications
welcome
Part 1. First steps
1 Security today
2 Hello Spring Security
Part 2. Implementation
3 Managing users
4 Dealing with passwords
5 Implementing authentication
6 Hands-On: A small secured web application
7 Configuring authorization: restricting access
8 Configuring authorization: applying restrictions
9 Implementing filters
10 Applying CSRF protection and CORS
11 Hands-on: A separation of responsibilities
12 How does OAuth 2 work?
13 OAuth 2 – Implementing the authorization server
14 OAuth 2 – Implementing the resource server
15 OAuth 2 – Using JWT and cryptographic signatures
16 Global Method Security – Pre/Post Authorization
17 Global method security: Pre/post filtering
18 Hands-on: An OAuth 2 application
19 Spring Security for reactive apps
20 Spring Security testing
Appendix A Creating the Spring Boot project
Appendix A Creating the Spring Boot project