spring security authentication source code tracking

spring security authentication source code tracking ​ Before tracking the authentication source code, let's explain the internal principle of security according to the official website, mainly based on a series of filter s. You can https://docs.spring.io/spring-security/site/docs/5.5.3/reference/html5/#servlet-hello, check the relevant docum ...

Added by fredriksk on Sun, 28 Nov 2021 15:16:45 +0200

SpringSecurity microservice permission scheme

1. What is micro service 1.1 origin of microservices: Microservices were first proposed by Martin Fowler and James Lewis in 2014. Microservice architecture style is a way to use a set of small services to develop a single application. Each service runs in its own process and uses lightweight mechanisms to communicate, usually HTTP API s. These ...

Added by berridgeab on Sat, 20 Nov 2021 10:45:44 +0200

SpringSecurity permission control ✧ (intermediate level)

( • ̀ ω •́ ) ✧ spring security intermediate 1, Expression based access control ⭐ access() can be used to realize the same functions as the permission control learned before.. antMatchers.access("expression or method") has a wide range of expressions, such as:. anyRequest.access(@ class name. Method): determine wher ...

Added by scottb1 on Fri, 05 Nov 2021 21:05:23 +0200