Spring Security Architecture and Design

  • Carlo Scarioni
  • Massimo Nardone


In the previous chapter, you developed an initial application secured with Spring Security. You got an overview of the way this application worked and looked in detail at some of the Spring Security components that are put into action in common Spring Security–secured applications. In this chapter, we are going to extend those explanations and delve deeply into the framework.

Copyright information

© Carlo Scarioni and Massimo Nardone 2019

Authors and Affiliations

  • Carlo Scarioni
    • 1
  • Massimo Nardone
    • 2
  1. 1.SurbitonUK
  2. 2.HELSINKIFinland

Personalised recommendations