Summary
In this chapter, we learned how to use Spring Security’s built-in JDBC support. Specifically, we have learned that Spring Security provides a default schema for new applications. We also explored how to implement GBAC and how it can make managing users easier.
We also learned how to integrate Spring Security’s JDBC support with an existing database and also how to secure our passwords by hashing them and using a randomly generated salt.
In the next chapter, we will explore the Spring Data project and how to configure Spring Security to use object-relational mapping (ORM) to connect to an RDBMS, as well as a document database.