?
Solved

Can any body help me in implementing Acegi Security Authentication and security in spring

Posted on 2006-11-01
4
Medium Priority
?
175 Views
Last Modified: 2013-11-24
Hi Experts,

Iam currently working in a project which is being done by Spring and Hibernate. Now i have a requirement where i need to implement Security and Authentication using Acegi Security. So please help me how to proceed and go forward in this task.

And also tell me the total ways to implement Security and Authentication

Thanks in Advance,
Rave
0
Comment
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 92

Accepted Solution

by:
objects earned 1000 total points
ID: 17848952
0
 
LVL 35

Assisted Solution

by:girionis
girionis earned 1000 total points
ID: 17849050
Some additional information here: http://www.acegisecurity.org/petclinic-tutorial.html
 
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Java had always been an easily readable and understandable language.  Some relatively recent changes in the language seem to be changing this pretty fast, and anyone that had not seen any Java code for the last 5 years will possibly have issues unde…
A solution for Fortify Path Manipulation.
Viewers learn how to read error messages and identify possible mistakes that could cause hours of frustration. Coding is as much about debugging your code as it is about writing it. Define Error Message: Line Numbers: Type of Error: Break Down…
Viewers will learn one way to get user input in Java. Introduce the Scanner object: Declare the variable that stores the user input: An example prompting the user for input: Methods you need to invoke in order to properly get  user input:
Suggested Courses
Course of the Month9 days, 3 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question