Solved

Spring security

Posted on 2015-01-06
9
65 Views
Last Modified: 2015-02-25
Hi,

Spring security used only for authorization not for authentication. Please advise how Spring security works with any simple working examples and resources. thanks in advance
0
Comment
Question by:gudii9
  • 7
  • 2
9 Comments
 
LVL 35

Accepted Solution

by:
mccarl earned 500 total points
ID: 40534403
Spring security used only for authorization not for authentication
No, that's incorrect. It is used for both (and more).

Please advise how Spring security works with any simple working examples
Spring Security is such a large thing that covers a number of areas that there is no way to get anything simple that will explain it.

Yes, there are simple working examples/tutorials (that are easily found on the net) that will "show" you it working, but those will not "explain HOW it works" very well at all. To understand HOW it works you will need to read the documentation although unfortunately I would not call that "simple" !

If you think that me giving a very brief summary of a few of the main/most common aspects of Spring Security would be useful to you, let me know and I will do that?
0
 
LVL 7

Author Comment

by:gudii9
ID: 40534594
Yes please
0
 
LVL 7

Author Comment

by:gudii9
ID: 40534598
I thought single sign on sso, Tivoli etc rakes care of authentication where as spring security used at at next level of authorization
0
Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

 
LVL 7

Author Comment

by:gudii9
ID: 40554362
Please advise
0
 
LVL 7

Author Comment

by:gudii9
ID: 40570794
Please advise
0
 
LVL 35

Expert Comment

by:mccarl
ID: 40574410
Sorry, I'm on holidays right now, I should be able to get back to this soon.
0
 
LVL 7

Author Comment

by:gudii9
ID: 40580657
ok. sure.
0
 
LVL 7

Author Comment

by:gudii9
ID: 40615027
please advise
0
 
LVL 7

Author Comment

by:gudii9
ID: 40626725
Please advise
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to parse custom JSON to POJO java 4 72
Re-position the objects 7 108
fibonacci ten numbers 4 38
Interview question Javascript, database 12 56
There is an easy way, in .NET, to centralize the treatment of all unexpected errors. First of all, instead of launching the application directly in a Form, you need first to write a Sub called Main, in a module. Then, set the Startup Object to th…
This article is meant to give a basic understanding of how to use R Sweave as a way to merge LaTeX and R code seamlessly into one presentable document.
This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.
The viewer will be introduced to the technique of using vectors in C++. The video will cover how to define a vector, store values in the vector and retrieve data from the values stored in the vector.

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now