Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Spring Security

You're reading from   Spring Security Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures

Arrow left icon
Product type Paperback
Published in Jun 2024
Publisher Packt
ISBN-13 9781835460504
Length 596 pages
Edition 4th Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Badr Nasslahsen Badr Nasslahsen
Author Profile Icon Badr Nasslahsen
Badr Nasslahsen
Arrow right icon
View More author details
Toc

Table of Contents (28) Chapters Close

Preface 1. Part 1: Fundamentals of Application Security FREE CHAPTER
2. Chapter 1: Anatomy of an Unsafe Application 3. Chapter 2: Getting Started with Spring Security 4. Chapter 3: Custom Authentication 5. Part 2: Authentication Techniques
6. Chapter 4: JDBC-based Authentication 7. Chapter 5: Authentication with Spring Data 8. Chapter 6: LDAP Directory Services 9. Chapter 7: Remember-me Services 10. Chapter 8: Client Certificate Authentication with TLS 11. Part 3: Exploring OAuth 2 and SAML 2
12. Chapter 9: Opening up to OAuth 2 13. Chapter 10: SAML 2 Support 14. Part 4: Enhancing Authorization Mechanisms
15. Chapter 11: Fine-Grained Access Control 16. Chapter 12: Access Control Lists 17. Chapter 13: Custom Authorization 18. Part 5: Advanced Security Features and Deployment Optimization
19. Chapter 14: Session Management 20. Chapter 15: Additional Spring Security Features 21. Chapter 16: Migration to Spring Security 6 22. Chapter 17: Microservice Security with OAuth 2 and JSON Web Tokens 23. Chapter 18: Single Sign-On with the Central Authentication Service 24. Chapter 19: Build GraalVM Native Images 25. Index 26. Other Books You May Enjoy Appendix – Additional Reference Material

To get the most out of this book

The primary method for integrating with the sample code is providing Gradle- and Maven-compatible projects. Since many Integrated Development Environments (IDEs). have rich integration with Gradle and Maven, users should be able to import the code into any IDE that supports either Gradle or Maven. As many developers use Gradle and Maven, we felt this was the most straightforward method of packaging the examples. Whatever development environment you are familiar with, hopefully, you will find a way to work through the examples in this book.

Many IDEs provide Gradle or Maven tooling that can automatically download the Spring and Spring Security 6 Javadoc and source code for you. However, there may be times when this is not possible. In such cases, you’ll want to download the full releases of both Spring 6 and Spring Security 6. The Javadoc and source code are top notch. If you get confused or want more information, the samples can provide an additional level of support or reassurance for your learning.

To run the sample application, you will need an IDE such as IntelliJ IDEA or Eclipse and build it with Gradle or Maven, which don’t have strict hardware requirements. However, these are some general recommendations to ensure a smooth development experience:

  1. System Requirements:
    • A modern computer with at least 4GB of RAM (8GB or more is recommended).
    • A multi-core processor for faster build and development.
  2. Operating System:
    • Spring applications can be developed on Windows, macOS, or Linux. Choose the one that you are most comfortable with.
  3. Disk Space:
    • You will need disk space for your project files, dependencies, and any databases you might use. At least 10GB of free disk space is advisable.
  4. Network Connection:
    • A stable internet connection may be needed for downloading dependencies, plugins, and libraries during project setup.

Software/hardware covered in the book

Operating system requirements

IntelliJ IDEA and Eclipse are both popular choices for Spring development

Windows, macOS, or Linux

JDK versions: 17 or 21

Spring- Security 6.

Spring- Boot 3.

Thymeleaf 6.

If you are using the digital version of this book, we advise you to type the code yourself or access the code from the book’s GitHub repository (a link is available in the next section). Doing so will help you avoid any potential errors related to the copying and pasting of code.

From Chapter 3, Custom Authentication onwards, the book shifts its emphasis to delve deeper into Spring Security, particularly in conjunction with the Spring Boot framework.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image