spring security authorization (custom) and source tracking

spring security authorization (custom) and source tracking ( In this section, we'll look at several authorization methods for spring security and a brief source tracking. When you first came into contact with spring security, it was difficult to find a lot of articles and examples on the web in order to achieve its authorization, especially ...

Posted on Thu, 02 Dec 2021 13:29:39 -0500 by NiteCloak

spring security+swagger3 access default path( http://localhost: Port / swagger UI /) appears 404

springboot vue3 redis MySQL spring security swagger3 front and back end separation items. redis and rabbitMQ Redis: Redis is a multi utility tool. It is a key value NoSQL database that can be used as a cache. It is very active in development and maintenance. Although it is a key value database storage system, it supports MQ functions, me ...

Posted on Sat, 20 Nov 2021 14:03:35 -0500 by Cut

Spring Security Series tutorial 23 -- four permission control methods of spring security

preface In the previous chapters, brother 11 has introduced many functions of Spring Security. Among these functions, we know that its core function is authentication + authorization. Previously, we have implemented authentication and authorization functions based on memory model, default database model and user-defined database model respecti ...

Posted on Mon, 25 Oct 2021 20:11:00 -0400 by lessthanthree

Use of Spring Security OAuth anonymous authentication

AnonymousAuthenticationFilter spring security provides an anonymous Authentication filter by default, which defines the anonymous user Authentication object that unauthenticated users can access resources: protected Authentication createAuthentication(HttpServletRequest request) { // key is a UUID.randomUUID().toString() // principal ...

Posted on Sun, 19 Sep 2021 03:17:49 -0400 by dent_moosely

Springboot + spring security front and back end separation + Jwt permission authentication (transformation record)

preface Generally speaking, we use spring security. By default, the front and back ends are integrated, such as thymeleaf or Freemarker. Spring security also comes with a login page and allows you to configure the login page and error page. But now the separation of front and back ends is the right way. If the front and back ends are separated ...

Posted on Tue, 07 Sep 2021 14:56:31 -0400 by lewisstevens1