Tagged articles
1 articles
Page 1 of 1
Programmer DD
Programmer DD
Oct 6, 2017 · Information Security

How Spring Security’s Core Configurations Protect Your Application

This article breaks down Spring Security’s three core Java configuration components—@EnableWebSecurity, WebSecurityConfiguration, and AuthenticationConfiguration—explaining how they replace XML setup, register the security filter chain, build the AuthenticationManager, and enable fine‑grained HttpSecurity rules such as path protection, form login, logout, CSRF, and security headers.

AuthenticationManagerHttpSecurityIn-Memory Authentication
0 likes · 8 min read
How Spring Security’s Core Configurations Protect Your Application