官术网_书友最值得收藏!

Base project setup

Apart from the actual authentication mechanism, many aspects of the application are quite similar. In this section, we will set up the example and then cover the specific authentication mechanism in detail.

We will be using the default Spring Security DB schema against which we will authenticate the user. We will create a fully fledged Spring MVC web application, with each component being created from scratch. Creating a sample Spring Security application using Spring MVC with the help of Spring Boot is very easy. The application will function through many things that are hidden away from developers. But in this case, we will be creating this application component by component so that you can see the actual code with which a web application that is built on Spring MVC can be secured.

The default DB schema used by Spring Security is shown in the following diagram. However, you can customize it the way you think it is suitable for your application. We will be using the Users and Authorities tables for our setup here:

Figure 04: Spring Security default database schema

Let's now start developing our sample application.

主站蜘蛛池模板: 江源县| 兴安县| 克东县| 黑水县| 陵川县| 石屏县| 连城县| 冕宁县| 时尚| 晋中市| 晋江市| 永丰县| 铅山县| 焉耆| 晋宁县| 信阳市| 霞浦县| 讷河市| 澎湖县| 巴里| 抚宁县| 开封县| 庆安县| 乐昌市| 库尔勒市| 安泽县| 怀来县| 深泽县| 九江市| 安龙县| 奎屯市| 沾化县| 八宿县| 高邮市| 嘉兴市| 绿春县| 霍邱县| 兰西县| 溆浦县| 五河县| 丰台区|