Abstract
In the previous chapter, you developed an initial application secured with Spring Security. You got an overview of the way this application worked and looked in detail at some of the Spring Security components that are put into action in common Spring Security–secured applications. In this chapter, we are going to extend those explanations and delve deeply into the framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Carlo Scarioni and Massimo Nardone
About this chapter
Cite this chapter
Scarioni, C., Nardone, M. (2019). Spring Security Architecture and Design. In: Pro Spring Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5052-5_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5052-5_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5051-8
Online ISBN: 978-1-4842-5052-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)