Spring-security
Spring Security is a powerful and highly customizable authentication and access control framework for Java applications. Part of the larger Spring Framework ecosystem
-
Spring Security Internal Flow
Spring Security is a powerful framework that provides authentication, authorization, and other security features for Java applications, particularly web applications. Understanding the internal flow of Spring Security configuration and its behavior. Overview of the Internal Flow The internal flow of Spring Security involves several components that work together to manage security concerns such as authentication and authorization . Spring Security Filters A series of Spring filters intercept each request & work together to identify if Authentication is required or not . if authentication is required, accordingly navigate the user to login page or use the existing details stored during initial authentication . Common Security Filters in the Chain: LogoutFilter:…
-
Rest api definition and setup with Spring boot
A REST API (Representational State Transfer) is a web service that follows the principles of REST architecture to allow communication between different systems over the web using HTTP methods. REST APIs are stateless, with each client request being transient, requiring all necessary information for the server to understand and process it. They are favored for their simplicity, scalability, and easy integration with different systems and platforms. HTTP Methods: Statelessness: Format: What is Spring boot ? Spring Boot is a framework that simplifies the development of Spring-based applications by offering a set of tools to create production-ready applications with minimal configuration. It streamlines the development process, allowing developers to focus on…
-
Eye opener of software beginner
Before starting the development of any web application, it is crucial for beginners to consider the following key points. 1. Presentation Layer (Frontend) Purpose: Handles the user interface and user experience. Components: Responsibilities: 2. Business Logic Layer (Backend) 3. Data Access Layer (DAL) 4. Database Layer 5. Security Layer