Tagged articles
2 articles
Page 1 of 1
政采云技术
政采云技术
Mar 21, 2023 · Information Security

Deep Dive into Spring Security Authentication Process and Core Components

This article provides a comprehensive analysis of Spring Security's authentication mechanism, detailing the filter chain, core components such as SecurityContextHolder, AuthenticationManager, ProviderManager, and AuthenticationProvider, and illustrating the step‑by‑step flow of username‑password verification with extensive code examples.

AuthenticationAuthenticationManagerJava
0 likes · 18 min read
Deep Dive into Spring Security Authentication Process and Core Components
Programmer DD
Programmer DD
Oct 6, 2017 · Information Security

How Spring Security’s Core Configurations Protect Your Application

This article breaks down Spring Security’s three core Java configuration components—@EnableWebSecurity, WebSecurityConfiguration, and AuthenticationConfiguration—explaining how they replace XML setup, register the security filter chain, build the AuthenticationManager, and enable fine‑grained HttpSecurity rules such as path protection, form login, logout, CSRF, and security headers.

AuthenticationManagerHttpSecurityIn-Memory Authentication
0 likes · 8 min read
How Spring Security’s Core Configurations Protect Your Application