Solved

Spring security

Posted on 2015-01-06
9
62 Views
Last Modified: 2015-02-25
Hi,

Spring security used only for authorization not for authentication. Please advise how Spring security works with any simple working examples and resources. thanks in advance
0
Comment
Question by:gudii9
  • 7
  • 2
9 Comments
 
LVL 35

Accepted Solution

by:
mccarl earned 500 total points
ID: 40534403
Spring security used only for authorization not for authentication
No, that's incorrect. It is used for both (and more).

Please advise how Spring security works with any simple working examples
Spring Security is such a large thing that covers a number of areas that there is no way to get anything simple that will explain it.

Yes, there are simple working examples/tutorials (that are easily found on the net) that will "show" you it working, but those will not "explain HOW it works" very well at all. To understand HOW it works you will need to read the documentation although unfortunately I would not call that "simple" !

If you think that me giving a very brief summary of a few of the main/most common aspects of Spring Security would be useful to you, let me know and I will do that?
0
 
LVL 7

Author Comment

by:gudii9
ID: 40534594
Yes please
0
 
LVL 7

Author Comment

by:gudii9
ID: 40534598
I thought single sign on sso, Tivoli etc rakes care of authentication where as spring security used at at next level of authorization
0
 
LVL 7

Author Comment

by:gudii9
ID: 40554362
Please advise
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 7

Author Comment

by:gudii9
ID: 40570794
Please advise
0
 
LVL 35

Expert Comment

by:mccarl
ID: 40574410
Sorry, I'm on holidays right now, I should be able to get back to this soon.
0
 
LVL 7

Author Comment

by:gudii9
ID: 40580657
ok. sure.
0
 
LVL 7

Author Comment

by:gudii9
ID: 40615027
please advise
0
 
LVL 7

Author Comment

by:gudii9
ID: 40626725
Please advise
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
stringclean challenge 26 56
Starting to learn JAVA, 7 47
thymeleaf natural templating vs JSP 2 24
maven project error 5 20
Java Flight Recorder and Java Mission Control together create a complete tool chain to continuously collect low level and detailed runtime information enabling after-the-fact incident analysis. Java Flight Recorder is a profiling and event collectio…
Introduction This article is the second of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article covers the basic installation and configuration of the test automation tools used by…
The goal of the video will be to teach the user the concept of local variables and scope. An example of a locally defined variable will be given as well as an explanation of what scope is in C++. The local variable and concept of scope will be relat…
The viewer will be introduced to the technique of using vectors in C++. The video will cover how to define a vector, store values in the vector and retrieve data from the values stored in the vector.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now