Abstract
In the previous chapter, I developed an initial application secured with Spring Security. I gave an overview of the way this application worked and looked in detail at some of the Spring Security components that are put into action in common Spring Security-secured application. In this chapter, I am going to extend those explanations and delve deeply into the framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2013 Carlo Scarioni
About this chapter
Cite this chapter
Scarioni, C. (2013). Spring Security Architecture and Design. In: Pro Spring Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4819-4_3
Download citation
DOI: https://doi.org/10.1007/978-1-4302-4819-4_3
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-4818-7
Online ISBN: 978-1-4302-4819-4
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)