Spring MVC + Shiro integration oauth2
Analysis on the implementation of client (target downstream system) and error prone problems
At present, many open platforms, such as Sina Weibo open platform, are used to provide open API interfaces for developers to use, which brings the problem that third-party applications need to be authorized to the ...
Posted on Wed, 13 Oct 2021 13:18:50 -0400 by kee2ka4
, this article is about dynamic permissions and dynamic directories, shiro's authorizer will trigger when it encounters permission verification. At this time, it can obtain the user's associated role from the database, The permissions of role binding are roughly as shown in the figure below
If you are interested, you can learn ...
Posted on Sat, 09 Oct 2021 03:57:52 -0400 by xtops
The previous article described how shiro configures encryption services. This article uses the md5 encryption algorithm as an example. The md5 algorithm is a common encryption algorithm, and salt is often added to improve security. How do these configurations work is shown in this article.
What is the salt value?
Encrypts like MD5 ...
Posted on Sat, 25 Sep 2021 13:04:02 -0400 by Pointybeard
The source code address is added at the end of the article. Friends who report errors can download it - updated on June 15, 2020
At the request of netizens, the code of this pom file has been pasted completely, The springboot version uses the latest 2.3.4.RELEASE, shiro version uses the latest 1.6.0 The pro test is valid and will be updat ...
Posted on Thu, 23 Sep 2021 01:45:36 -0400 by mgilbert
Spring boot uses spring security by default. Spring security is a powerful security framework, needless to say. However, if you are used to shiro, you will not use spring security for a while, so you need to integrate shiro in spring boot. When it comes to integrating shiro, there are many online tutorials, but online tutorials are not necessar ...
Posted on Sun, 21 Jun 2020 02:28:31 -0400 by jollyjumper
Last article: springboot integrated logback log
Contents of this article: Redis installation and setup, springboot implementation of Redis integration.
Download from github:
Unzip to get the following files:
The default configuration for Redis ...
Posted on Thu, 04 Jun 2020 18:19:52 -0400 by Eminem
Many articles mentioned that Swagger should be turned off in the production environment to prevent system resource leakage. Today, with my own experience in the development process, I share a method that can be implemented in just a few lines of code to allow Apache Shiro to take over Swagger authentication and authorization. If there is a bett ...
Posted on Fri, 22 May 2020 03:11:03 -0400 by K3nnnn
matters needing attention:
Output station scrambling
a link submitted as post
Form validation before submission
Confirm before jump
jsr303 validation form
Tags used by Shiro in jsp
Path jump problem:
matters needing attent ...
Posted on Fri, 15 May 2020 01:44:37 -0400 by hchsk
Previously, a small partner said that it would be better to write a Filter intercept request for Spring Security, which is so troublesome.
Writing on your own is certainly possible, but in most cases, everyone is not a professional Web security engineer, so the problem is just certification and authorization. Once these two issues are addressed ...
Posted on Mon, 11 May 2020 22:05:33 -0400 by madrazel
Requests often carry cookies. As mentioned above, when creating a request, you can set parameters through the header. Cookie s are also one of the parameters. As follows:
Request request = new Request.Builder()
You can then get a new Cookie from the returned response. You may have to fi ...
Posted on Mon, 04 May 2020 05:08:57 -0400 by Cesar