Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Spring 5.0 Projects
  • Toc
  • feedback
Spring 5.0 Projects

Spring 5.0 Projects

By : Nilang Patel
3 (2)
close
Spring 5.0 Projects

Spring 5.0 Projects

3 (2)
By: Nilang Patel

Overview of this book

Spring makes it easy to create RESTful applications, merge with social services, communicate with modern databases, secure your system, and make your code modular and easy to test. With the arrival of Spring Boot, developers can really focus on the code and deliver great value, with minimal contour. This book will show you how to build various projects in Spring 5.0, using its features and third party tools. We'll start by creating a web application using Spring MVC, Spring Data, the World Bank API for some statistics on different countries, and MySQL database. Moving ahead, you'll build a RESTful web services application using Spring WebFlux framework. You'll be then taken through creating a Spring Boot-based simple blog management system, which uses Elasticsearch as the data store. Then, you'll use Spring Security with the LDAP libraries for authenticating users and create a central authentication and authorization server using OAuth 2 protocol. Further, you'll understand how to create Spring Boot-based monolithic application using JHipster. Toward the end, we'll create an online book store with microservice architecture using Spring Cloud and Net?ix OSS components, and a task management system using Spring and Kotlin. By the end of the book, you'll be able to create coherent and ?exible real-time web applications using Spring Framework.
Table of Contents (9 chapters)
close

LDAP authorization with Spring Security

 

You saw LDAP authentication with Spring Security in the previous section. Next, we will look at how to perform authorization. Let's recall that authorization is a verification process of whether an entity should have access to something. In short, authorization concerns the rules that will identify who is allowed to do what. After successful authentication, a user can perform various actions, based on the authority they have.

Let's recall that authentication deals with login credentials to verify valid users. Authorization is more of a check of whether a user has the authority to perform various actions, like adding, updating, viewing, or deleting a resource. An authorization happens after the user has been successfully authenticated. In this section, we will look at how to authorize an LDAP...

bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete