Part 1: Fundamentals of Application Security
This part delves into the foundational aspects of application security, laying the groundwork for understanding potential vulnerabilities. We embark on a comprehensive exploration of application security using Spring Security. This part introduces you to the process of conducting a security audit on a hypothetical calendar application. Through this audit, we uncover common security vulnerabilities and lay the groundwork for implementing robust security measures.
Building upon this foundation, this part guides you through the installation and configuration of Spring Security. We start with a basic "Hello World"
example, gradually customizing Spring Security to suit the specific needs of our application.
We will also delve deeper into the authentication process within Spring Security. By customizing key components of the authentication infrastructure, we address real-world authentication challenges and gain a comprehensive understanding of Spring Security’s authentication mechanisms. Through practical examples and hands-on exercises, we learn how to integrate custom authentication solutions seamlessly into our applications.
This part has the following chapters:
- Chapter 1, Anatomy of an Unsafe Application
- Chapter 2, Getting Started with Spring Security
- Chapter 3, Custom Authentication