Hello Spring Security
Although Spring Security can be extremely difficult to configure, the creators of the product have been thoughtful and have provided us with a very simple mechanism to enable much of the software’s functionality with a strong baseline. From this baseline, additional configuration will allow for a fine level of detailed control over the security behavior of the application.
We’ll start with our unsecured calendar application from Chapter 1, Anatomy of an Unsafe Application, and turn it into a site that’s secured with a rudimentary username and password authentication. This authentication serves merely to illustrate the steps involved in enabling Spring Security for our web application; you’ll see that there are some obvious flaws in this approach that will lead us to make further configuration refinements.
Importing the sample application
We encourage you to import the chapter02.00-calendar
project into your Integrated Development...