-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Spring 5.0 Cookbook
By :

The previous recipe taught us how to create a custom authentication manager and a chain of providers that can help control the different gateways of authentication and authorization processes. Now, we will expand on customization, covering the setup of a filter stack and its handlers.
This recipe will create a security model out of Spring Security 4.2.2, where there is a filter chain of security transactions which includes all the managers and providers of the previous recipe, with the addition of security objects called handlers. This recipe is the most important part of this chapter when it comes to stretching the flexibility of the security architecture of the Spring Security framework.
Let us now add important supporting components to the authentication process established by the previous recipe: