官术网_书友最值得收藏!

Base project setup

Apart from the actual authentication mechanism, many aspects of the application are quite similar. In this section, we will set up the example and then cover the specific authentication mechanism in detail.

We will be using the default Spring Security DB schema against which we will authenticate the user. We will create a fully fledged Spring MVC web application, with each component being created from scratch. Creating a sample Spring Security application using Spring MVC with the help of Spring Boot is very easy. The application will function through many things that are hidden away from developers. But in this case, we will be creating this application component by component so that you can see the actual code with which a web application that is built on Spring MVC can be secured.

The default DB schema used by Spring Security is shown in the following diagram. However, you can customize it the way you think it is suitable for your application. We will be using the Users and Authorities tables for our setup here:

Figure 04: Spring Security default database schema

Let's now start developing our sample application.

主站蜘蛛池模板: 漳浦县| 黔江区| 宝兴县| 莱西市| 洱源县| 永靖县| 邹平县| 冀州市| 安康市| 平果县| 兰溪市| 郴州市| 景谷| 沭阳县| 同江市| 乌拉特中旗| 上杭县| 昭觉县| 竹溪县| 韩城市| 德阳市| 东明县| 孟连| 栾川县| 长宁区| 襄垣县| 鱼台县| 武功县| 鹰潭市| 温州市| 慈溪市| 定州市| 明水县| 营口市| 泸水县| 鹤壁市| 开鲁县| 五大连池市| 谷城县| 赣州市| 伊吾县|