Solved

Spring security

Posted on 2015-01-06
9
64 Views
Last Modified: 2015-02-25
Hi,

Spring security used only for authorization not for authentication. Please advise how Spring security works with any simple working examples and resources. thanks in advance
0
Comment
Question by:gudii9
  • 7
  • 2
9 Comments
 
LVL 35

Accepted Solution

by:
mccarl earned 500 total points
ID: 40534403
Spring security used only for authorization not for authentication
No, that's incorrect. It is used for both (and more).

Please advise how Spring security works with any simple working examples
Spring Security is such a large thing that covers a number of areas that there is no way to get anything simple that will explain it.

Yes, there are simple working examples/tutorials (that are easily found on the net) that will "show" you it working, but those will not "explain HOW it works" very well at all. To understand HOW it works you will need to read the documentation although unfortunately I would not call that "simple" !

If you think that me giving a very brief summary of a few of the main/most common aspects of Spring Security would be useful to you, let me know and I will do that?
0
 
LVL 7

Author Comment

by:gudii9
ID: 40534594
Yes please
0
 
LVL 7

Author Comment

by:gudii9
ID: 40534598
I thought single sign on sso, Tivoli etc rakes care of authentication where as spring security used at at next level of authorization
0
 
LVL 7

Author Comment

by:gudii9
ID: 40554362
Please advise
0
3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

 
LVL 7

Author Comment

by:gudii9
ID: 40570794
Please advise
0
 
LVL 35

Expert Comment

by:mccarl
ID: 40574410
Sorry, I'm on holidays right now, I should be able to get back to this soon.
0
 
LVL 7

Author Comment

by:gudii9
ID: 40580657
ok. sure.
0
 
LVL 7

Author Comment

by:gudii9
ID: 40615027
please advise
0
 
LVL 7

Author Comment

by:gudii9
ID: 40626725
Please advise
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Non-recursive backtracking, using a stack 1 103
split string containing \r\n in Java 46 38
Problem to open text file 11 74
MySqlDump not dumping triggers 1 19
This article will show, step by step, how to integrate R code into a R Sweave document
Whether you’re a college noob or a soon-to-be pro, these tips are sure to help you in your journey to becoming a programming ninja and stand out from the crowd.
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
The viewer will learn how to clear a vector as well as how to detect empty vectors in C++.

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now