Useful Links
Computer Science
Cybersecurity
Spring Security
1. Introduction to Spring Security
2. Core Architectural Components
3. Authentication Mechanisms
4. Authorization and Access Control
5. Web Security Configuration
6. OAuth 2.0 and OpenID Connect (OIDC)
7. Advanced Topics and Integrations
8. Customization and Extensibility
Web Security Configuration
Component-Based Configuration
Defining `SecurityFilterChain` as a `@Bean`
Java Configuration Approach
Multiple Filter Chains
Filter Chain Ordering
Configuration Method Chaining
Conditional Configuration
Protection Against Common Vulnerabilities
Cross-Site Request Forgery (CSRF)
How CSRF Protection Works
CSRF Tokens
Token Validation Process
Token Storage
Synchronizer Token Pattern
Implementation Details
Token Generation
Token Verification
Configuration and Customization
Enabling CSRF Protection
Disabling CSRF Protection
Custom CSRF Token Repository
CSRF Request Matcher
CSRF Failure Handler
Session Management
Session Fixation Protection
Session Regeneration Strategies
Migration Strategy
New Session Strategy
Change Session ID Strategy
Concurrent Session Control
Limiting Concurrent Sessions
Session Registry
Session Expiry Handling
Expired Session Strategy
Session Timeout Configuration
Session Timeout Settings
Inactivity Timeout
Custom Session Timeout Handler
Session Creation Policy
Always Create
If Required
Never Create
Stateless
Security HTTP Response Headers
Content Security Policy (CSP)
Defining Allowed Content Sources
Mitigating XSS Attacks
CSP Directives
Report-Only Mode
HTTP Strict Transport Security (HSTS)
Enforcing HTTPS
Max Age Configuration
Include Subdomains
Preload Configuration
X-Content-Type-Options
Preventing MIME Type Sniffing
No Sniff Directive
X-XSS-Protection
Browser-Based XSS Protection
Protection Modes
X-Frame-Options
Preventing Clickjacking
Deny Option
Same Origin Option
Allow From Option
Referrer Policy
Controlling Referrer Information
Policy Options
Feature Policy
Controlling Browser Features
Feature Directives
Cross-Origin Resource Sharing (CORS)
Integration with Spring MVC CORS Support
CORS Mappings in Controllers
Global CORS Configuration
Configuring CORS within Spring Security
CORS Filter Configuration
Allowed Origins
Allowed Methods
Allowed Headers
Exposed Headers
Allow Credentials
Max Age Configuration
Previous
4. Authorization and Access Control
Go to top
Next
6. OAuth 2.0 and OpenID Connect (OIDC)