UnavailableSecurityManagerException in Spring Boot integration shiro

Spring boot uses spring security by default. Spring security is a powerful security framework, needless to say. However, if you are used to shiro, you will not use spring security for a while, so you need to integrate shiro in spring boot. When it comes to integrating shiro, there are many online tutorials, but online tutorials are not necessar ...

Posted on Sun, 21 Jun 2020 02:28:31 -0400 by jollyjumper

springboot Integrated Redis Cache

Last article: springboot integrated logback log Contents of this article: Redis installation and setup, springboot implementation of Redis integration. 1 Redis Installation Download from github: https://github.com/MSOpenTech/redis/releases Unzip to get the following files: 2 Redis Settings Set password: The default configuration for Redis ...

Posted on Thu, 04 Jun 2020 18:19:52 -0400 by Eminem

Swagger permission control part 1: Implementation Based on Apache Shiro

Many articles mentioned that Swagger should be turned off in the production environment to prevent system resource leakage. Today, with my own experience in the development process, I share a method that can be implemented in just a few lines of code to allow Apache Shiro to take over Swagger authentication and authorization. If there is a bett ...

Posted on Fri, 22 May 2020 03:11:03 -0400 by K3nnnn

Notes on writing ssm project

catalog matters needing attention: Output station scrambling a link submitted as post Form validation before submission Confirm before jump c:if judgment jsr303 validation form Ajax shiro shiro comments Tags used by Shiro in jsp shiro uses Date conversion json garbled Reset button Path jump problem: PageHelper use matters needing attent ...

Posted on Fri, 15 May 2020 01:44:37 -0400 by hchsk

Spring Security has its own firewall!You don't know how secure your system is!

Previously, a small partner said that it would be better to write a Filter intercept request for Spring Security, which is so troublesome. Writing on your own is certainly possible, but in most cases, everyone is not a professional Web security engineer, so the problem is just certification and authorization. Once these two issues are addressed ...

Posted on Mon, 11 May 2020 22:05:33 -0400 by madrazel

okhttp3 with cookie request

Requests often carry cookies. As mentioned above, when creating a request, you can set parameters through the header. Cookie s are also one of the parameters. As follows: Request request = new Request.Builder() .url(url) .header("Cookie", "xxx") .build(); You can then get a new Cookie from the returned response. You may have to fi ...

Posted on Mon, 04 May 2020 05:08:57 -0400 by Cesar

Spring boot integrates shiro framework

shiro overview Apache Shiro is a Java security framework Shiro is a powerful and easy-to-use Java security framework, mainly used for more convenient authentication, authorization, encryption, session management, integration with the Web, caching, etc Shiro is small and easy to use Spring has spring security, which is a permission framework. ...

Posted on Mon, 13 Apr 2020 01:55:20 -0400 by anindya23

(6) Build dubbo distributed platform maven build config configuration project (2)

1. Create the mybatis-config.xml configuration file. The configuration is as follows: <span style="font-size: 16px;"><?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE configuration PUBLIC "-//mybatis.org//DTD Config 3.0//EN" "http://mybatis.org/dtd/mybatis-3-config.dtd"> <configuration> <! -- global parameters -- &g ...

Posted on Thu, 02 Apr 2020 12:14:32 -0400 by swampster

Shiro -- custom Realm

Introduction: Realm: domain, Shiro obtains security data (such as user, role, permission) from realm, that is, if SecurityManager wants to verify the user's identity, it needs to obtain the corresponding user from realm for comparison to determine whether the user's identity is legal; it also needs to obtain the corresponding role / permission ...

Posted on Thu, 27 Feb 2020 02:47:09 -0500 by rubadub

Spring Boot + Vue separate the front and back end and use Shiro to achieve login authentication

Hello, welcome to the program workplace, where you need to improve technology, career planning, personal growth, sideline development and other articles. Learn and improve with more small partners. In the last article, Shiro is used to encrypt user information. Have you read all of them? Click to ...

Posted on Wed, 26 Feb 2020 03:40:20 -0500 by KeitaroHimura