Talk about how to customize the eureka management interface

preface Before the launch of nacos, eureka was basically the first choice for the registration center of the whole family bucket system of spring cloud. With the emergence of nacos, more and more micro service projects based on spring cloud use nacos as the registration center, but does this mean that eureka has no place to use force? In fact, ...

Posted by franzy_pan on Tue, 08 Mar 2022 06:57:59 +0100

Using Spring Security in SpringBoot

Reprint address: https://www.jianshu.com/p/defa75b65a46 Basic introduction to security spring Spring Security will not be introduced too much here. For details, please refer to Official documents Let me just talk about the core functions of spring security: Certification (who are you)Authorization (what can you do)Attack protection (against ...

Posted by ghostdog74 on Sat, 05 Mar 2022 03:49:58 +0100

Spring -- Annotation usage of Security framework

preface In the previous security, relevant configurations and tests were conducted for configuration items. But these are based on security config. Myconfig #configure (org. Springframework. Security. Config. Annotation. Web. Builders. Httpsecurity) to restrict the permission of the corresponding request. If there are multiple reque ...

Posted by rnintulsa on Wed, 23 Feb 2022 05:33:02 +0100

Spring -- permission restriction of Security framework

preface Last blog The Security framework imposes restrictions on requests In, login authentication is added for some requests. As long as the login is successful, you can access the restricted requests. However, this model is certainly not enough. For example: Taobao product page. Merchants can modify commodity prices, but custo ...

Posted by nosmasu on Tue, 22 Feb 2022 13:05:49 +0100

Spring security implements oauth2 0 - separation of authorization service and resource service

How to build OAuth2.0_01_basic edition authorization service by spring security and advanced edition authorization service by spring security are introduced in two articles 0 authorization server and resource server. This article will continue to optimize, separate the authorization server and resource server, and deploy them on different serv ...

Posted by will35010 on Tue, 15 Feb 2022 09:30:13 +0100

spring security + spring session + spring oauth2 notes

Series data The latest version of spring security5 X tutorial # blog The latest version of spring security5 Tutorial # source code # note spring security flowchart [the external chain image transfer fails. The source station may have an anti-theft chain mechanism. It is recommended to save the image and upload it directly (img-zgyd8qbp-1 ...

Posted by slickboyj on Tue, 08 Feb 2022 23:13:06 +0100

Spring security - Introduction and project construction

Spring security (I) -- Introduction and project construction preface The spring security framework is a permission management framework, and a Shiro framework with the same function (later, this series only describes spring security). This note will first explain the concept of permission, and then explain the construction of the most basic p ...

Posted by kade119 on Mon, 07 Feb 2022 05:41:02 +0100

springboot integrates spring security to realize authentication and authorization functions. A simple entry case

1, Introduction to spring security Spring Security is a security framework that can provide declarative security access control solutions for spring based enterprise applications. It provides a set of beans that can be configured in the spring application context, making full use of the functions of Spring IoC, DI (inversion of control, DI ...

Posted by chriztofur on Tue, 01 Feb 2022 18:31:48 +0100

Revisit Oath2 Configuration of 0

preparation Firstly, the UserDetailsService interface needs to be implemented to complete the loading of users; Note that the password here needs to be encrypted. If the database is plaintext, it needs to be encrypted and set later Furthermore, a UserDetails interface needs to be implemented to complete the external output of user informa ...

Posted by edawg on Tue, 25 Jan 2022 12:13:41 +0100

Spring Security Learning -- form based authentication

preface Starting from this article, we are officially learning spring security. On the basis of the first two blogs, we slowly enrich our examples (not mine, but a course on mk online) helloworld The development of spring security is different from the application development of our ordinary projects. We first run through the spring security ...

Posted by aaronxbond on Thu, 20 Jan 2022 11:56:58 +0100