Custom Authorization
In this chapter, we will write some custom implementations for Spring Security
’s key authorization APIs. Once we have done this, we will use our understanding of the custom implementations to understand how Spring Security
’s authorization architecture works.
Throughout this chapter, we will cover the following topics:
- Gaining an understanding of how authorization works
- Writing a custom
SecurityMetaDataSource
backed by a database instead ofrequestMatchers()
methods - Creating custom Spring Expression Language (SpEL) expressions
- Implementing a custom
PermissionEvaluator
object that allows our permissions to be encapsulated - Declaring a custom
AuthorizationManager
This chapter’s code in action link is here: https://packt.link/e630f.