Spring MVC + Shiro integration oauth2

Spring MVC + Shiro integration oauth2 Analysis on the implementation of client (target downstream system) and error prone problems At present, many open platforms, such as Sina Weibo open platform, are used to provide open API interfaces for developers to use, which brings the problem that third-party applications need to be authorized to the ...

Posted on Wed, 13 Oct 2021 13:18:50 -0400 by kee2ka4

[recommendation for exploding liver] touch your hand and take you to the background management project (Chapter 4) integrate redis and add shiro permissions

previously on , this article is about dynamic permissions and dynamic directories, shiro's authorizer will trigger when it encounters permission verification. At this time, it can obtain the user's associated role from the database, The permissions of role binding are roughly as shown in the figure below If you are interested, you can learn ...

Posted on Sat, 09 Oct 2021 03:57:52 -0400 by xtops

Shiro Learning - MD5 Encryption and Salt Value

Preface The previous article described how shiro configures encryption services. This article uses the md5 encryption algorithm as an example. The md5 algorithm is a common encryption algorithm, and salt is often added to improve security. How do these configurations work is shown in this article. What is the salt value? Encrypts like MD5 ...

Posted on Sat, 25 Sep 2021 13:04:02 -0400 by Pointybeard

springboot integrated shiro (full version)

The source code address is added at the end of the article. Friends who report errors can download it - updated on June 15, 2020 At the request of netizens, the code of this pom file has been pasted completely, The springboot version uses the latest 2.3.4.RELEASE, shiro version uses the latest 1.6.0 The pro test is valid and will be updat ...

Posted on Thu, 23 Sep 2021 01:45:36 -0400 by mgilbert

UnavailableSecurityManagerException in Spring Boot integration shiro

Spring boot uses spring security by default. Spring security is a powerful security framework, needless to say. However, if you are used to shiro, you will not use spring security for a while, so you need to integrate shiro in spring boot. When it comes to integrating shiro, there are many online tutorials, but online tutorials are not necessar ...

Posted on Sun, 21 Jun 2020 02:28:31 -0400 by jollyjumper

springboot Integrated Redis Cache

Last article: springboot integrated logback log Contents of this article: Redis installation and setup, springboot implementation of Redis integration. 1 Redis Installation Download from github: https://github.com/MSOpenTech/redis/releases Unzip to get the following files: 2 Redis Settings Set password: The default configuration for Redis ...

Posted on Thu, 04 Jun 2020 18:19:52 -0400 by Eminem

Swagger permission control part 1: Implementation Based on Apache Shiro

Many articles mentioned that Swagger should be turned off in the production environment to prevent system resource leakage. Today, with my own experience in the development process, I share a method that can be implemented in just a few lines of code to allow Apache Shiro to take over Swagger authentication and authorization. If there is a bett ...

Posted on Fri, 22 May 2020 03:11:03 -0400 by K3nnnn

Notes on writing ssm project

catalog matters needing attention: Output station scrambling a link submitted as post Form validation before submission Confirm before jump c:if judgment jsr303 validation form Ajax shiro shiro comments Tags used by Shiro in jsp shiro uses Date conversion json garbled Reset button Path jump problem: PageHelper use matters needing attent ...

Posted on Fri, 15 May 2020 01:44:37 -0400 by hchsk

Spring Security has its own firewall!You don't know how secure your system is!

Previously, a small partner said that it would be better to write a Filter intercept request for Spring Security, which is so troublesome. Writing on your own is certainly possible, but in most cases, everyone is not a professional Web security engineer, so the problem is just certification and authorization. Once these two issues are addressed ...

Posted on Mon, 11 May 2020 22:05:33 -0400 by madrazel

okhttp3 with cookie request

Requests often carry cookies. As mentioned above, when creating a request, you can set parameters through the header. Cookie s are also one of the parameters. As follows: Request request = new Request.Builder() .url(url) .header("Cookie", "xxx") .build(); You can then get a new Cookie from the returned response. You may have to fi ...

Posted on Mon, 04 May 2020 05:08:57 -0400 by Cesar