Useful Links
Computer Science
Cybersecurity
Spring Security
1. Introduction to Spring Security
2. Core Architectural Components
3. Authentication Mechanisms
4. Authorization and Access Control
5. Web Security Configuration
6. OAuth 2.0 and OpenID Connect (OIDC)
7. Advanced Topics and Integrations
8. Customization and Extensibility
Authorization and Access Control
Declarative Authorization
Configuration via Java
Configuration via Annotations
Advantages and Limitations
Request-Based Authorization
Configuring `HttpSecurity`
Defining Authorization Rules
Chaining Configuration Methods
Rule Ordering and Precedence
Using `requestMatchers`
Matching by Path
Matching by HTTP Method
Matching by Request Parameters
Matching by Headers
Ant Matchers vs. MVC Matchers
Ant Pattern Syntax
MVC Pattern Syntax
Use Cases for Each
Performance Considerations
Spring Expression Language (SpEL) in Authorization Rules
SpEL Syntax and Capabilities
Custom Expressions
Built-in Security Expressions
`hasRole()`
`hasAuthority()`
`hasAnyRole()`
`hasAnyAuthority()`
`permitAll()`
`denyAll()`
`isAuthenticated()`
`isAnonymous()`
`isFullyAuthenticated()`
`hasPermission()`
Method-Level Security
Enabling Global Method Security
Configuration Options
Pre/Post Annotations Support
JSR-250 Annotations Support
Secured Annotations Support
JSR-250 Annotations
`@RolesAllowed`
Usage and Configuration
Limitations
`@PermitAll`
`@DenyAll`
Spring Security Annotations
`@PreAuthorize`
SpEL Expressions in Pre-Authorization
Method Parameter Access
Return Value Access
`@PostAuthorize`
Post-Execution Authorization
Return Value Filtering
`@PreFilter`
Filtering Input Collections
Filter Target Configuration
`@PostFilter`
Filtering Output Collections
Collection Element Access
Method Security Configuration
Global Method Security Configuration
Custom Permission Evaluators
Method Security Interceptor
Access Control Lists (ACLs) for Domain Objects
Introduction to ACLs
Object-Level Security Concepts
Use Cases for ACLs
ACL vs. Role-Based Security
Core ACL Architecture
ACL Database Schema
ACL Class Table
ACL Object Identity Table
ACL Entry Table
ACL SID Table
Key Interfaces
`AclService`
`Acl`
`Sid`
`Permission`
`ObjectIdentity`
Implementation and Configuration
Setting Up ACL Tables
Configuring ACL Services
Managing ACL Entries
ACL Caching
Custom ACL Implementations
Previous
3. Authentication Mechanisms
Go to top
Next
5. Web Security Configuration