- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 89字
- 2021-07-23 18:59:16
Authentication
Spring Security provides a number of approaches by which your application can authenticate. It also allows you to write a custom authentication mechanism if these provided default approaches don't fit your requirements. Because of this extensibility, you can even use the legacy application against which authentication can be done. The book has a dedicated chapters (Chapter 3, Authentication Using SAML, LDAP, and OAuth/OIDC and Chapter 4, Authentication Using CAS and JAAS) where we will cover various authentications mechanisms, such as OAuth, LDAP, and SAML, in more detail.
推薦閱讀
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險與防范
- SASE原理、架構(gòu)與實踐
- 可信計算3.0工程初步
- Mastering Kali Linux for Advanced Penetration Testing
- Kali Linux Wireless Penetration Testing Cookbook
- 硬黑客:智能硬件生死之戰(zhàn)
- Spring Security(Third Edition)
- CTF競賽權(quán)威指南(Pwn篇)
- 網(wǎng)絡(luò)安全設(shè)計、配置與管理大全
- Mastering Reverse Engineering
- CTF特訓(xùn)營:技術(shù)詳解、解題方法與競賽技巧
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測與防御
- 紅藍(lán)攻防:技術(shù)與策略(原書第3版)
- 安全網(wǎng)絡(luò)構(gòu)建
- Metasploit 5.0 for Beginners