- Hands-On Spring Security 5 for Reactive Applications
- Tomcy John
- 191字
- 2021-07-23 18:59:20
Base project setup
Apart from the actual authentication mechanism, many aspects of the application are quite similar. In this section, we will set up the example and then cover the specific authentication mechanism in detail.
We will be using the default Spring Security DB schema against which we will authenticate the user. We will create a fully fledged Spring MVC web application, with each component being created from scratch. Creating a sample Spring Security application using Spring MVC with the help of Spring Boot is very easy. The application will function through many things that are hidden away from developers. But in this case, we will be creating this application component by component so that you can see the actual code with which a web application that is built on Spring MVC can be secured.
The default DB schema used by Spring Security is shown in the following diagram. However, you can customize it the way you think it is suitable for your application. We will be using the Users and Authorities tables for our setup here:
Let's now start developing our sample application.
- Android應用安全實戰:Frida協議分析
- Web漏洞分析與防范實戰:卷1
- 黑客攻防技巧
- Spring Security(Third Edition)
- 計算機網絡安全基礎(第5版)
- 信息安全案例教程:技術與應用(第2版)
- 網絡安全與攻防入門很輕松(實戰超值版)
- 數據安全架構設計與實戰
- Mastering Python for Networking and Security
- 復雜信息系統網絡安全體系建設指南
- Android Application Security Essentials
- 聯邦學習原理與算法
- 云計算安全:關鍵技術、原理及應用
- 計算機系統與網絡安全研究
- Practical Internet of Things Security