In this chapter, we will write some custom implementations for Spring Security's key authorization APIs. Once we have done this, we will use the understanding of the custom implementations to understand how Spring Security's authorization architecture works.
Throughout this chapter, we will cover the following topics:
- Gaining an understanding of how authorization works
- Writing a custom SecurityMetaDataSource backed by a database instead of antMatchers() methods
- Creating a custom SpEL expression
- Implementing a custom PermissionEvaluator object that allows our permissions to be encapsulated