This chapter picks up from where we left off in the previous chapter by looking at other authentication mechanisms, namely CAS and JAAS, supported by Spring Security. Again, this is also a fully hands-on coding chapter, and we will build small applications, most of them starting from the base application that we built in Chapter 2, Deep Diving into Spring Security. These authentication mechanisms are well-known in the industry and many enterprises have these as established mechanism by which they authenticate the user and give access to many of their employee and consumer facing applications.
Each of the authentication mechanisms has a project that you can see in the book’s GitHub page. However, in the book, we will only cover important aspects of the sample code to reduce clutter within the chapter.
In this chapter, we will cover...