Skip to content

Files

Latest commit

 

History

History
14 lines (9 loc) · 1.16 KB

File metadata and controls

14 lines (9 loc) · 1.16 KB

Authorization

Having established how users will authenticate, you also need to configure your application’s authorization rules.

The advanced authorization capabilities within Spring Security represent one of the most compelling reasons for its popularity. Irrespective of how you choose to authenticate (whether using a Spring Security-provided mechanism and provider or integrating with a container or other non-Spring Security authentication authority), the authorization services can be used within your application in a consistent and simple way.

You should consider attaching authorization rules to request URIs and methods to begin. In either case, you can listen and react to authorization events that each authorization check publishes. Below there is also wealth of detail about how Spring Security authorization works and how, having established a basic model, it can be fine-tuned.