From the course: Extending, Securing, and Dockerizing Spring Boot Microservices

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Users and roles

Users and roles

- [Mary] Welcome to the Spring Security chapter. Spring Security is a framework that developers have used for many years to protect resources from the bad guys and the stupid guys. Honestly, it's enormous, the depth and breadth of which we can't cover in one chapter. But there are common abstractions that spring security follows no matter the type of implementation. We will demonstrate a simple example of security APIs with JSON webtokens. For an in depth explanation of spring security, I encourage you to watch Spring, Spring Security in the library which will fill in the gaps. Let's imagine the reception that we would receive if we wish to enter the White House. Do you think that the guard would say, come on in? I don't think so, it would probably go something like this, stop, who are you! Identification please. Who invited you? What's the reason for entering? After checking a list, the guard would either provide a badge, denoting the area and length of accessibility, or deny us…

Contents