Spring Security 3 Very full document API Chinese version

Source: Internet
Author: User
Tags cas ldap md5 encryption

Spring Security

Security Rights Management Manual
  • Preface

  • I. Basic article

    • 6.1. MD5 Encryption

    • 6.2. Salt-Value encryption

    • 6.3. User Information caching

    • 6.4. Get Current User information

    • 5.1. Database table Structure

    • 5.2. Initializing data

    • 5.3. Implementing read resource information from the database

    • 5.3.1. What data format is required

    • 5.3.2. The entry point for replacing the original function

    • 4.1. Implement a custom landing page

    • 4.2. Modify the configuration file

    • 4.3. Configuration of parameters in the landing page

    • 4.4. Test

    • 3.1. Customizing the table structure

    • 3.2. Initializing data

    • 3.3. Get custom user rights information

    • 3.3.1. Handling User Login

    • 3.3.2. Verifying user Rights

    • 2.1. Modify the configuration file

    • 2.2. Database table Structure

    • 1.1. Configure Filters

    • 1.2. Using namespaces

    • 1.3. Complete the project

    • 1.4. Running the sample

    • 1. A simple HelloWorld

    • 2. Using the database to manage user rights

    • 3. Customizing the database table structure

    • 4. Custom Landing Page

    • 5. Using the database to manage resources

    • 6. Controlling User Information

    • 7. Custom Access Denied page

    • 8. Dynamic management resources combined with custom login page

    • 9. Chinese User name

    • 10. Determine if the user is logged in

  • II. Protecting Web Articles

    • 25.1. Generate a Certificate

    • 25.2. Configure the server to use two-way encryption

    • 25.3. Configure X509 Authentication

    • 24.1. Configuration

    • 24.2. System Time Issues

    • 24.3. Openid4java Process

    • 22.1. Configuring Digest Authentication

    • 22.2. Using Ajax for Digest authentication

    • 22.3. Programming Implementation Digest Client

    • 21.1. Setting up channel Security

    • 21.2. Specify ports for HTTP and HTTPS

    • 20.1. How to configure

    • 20.2. Example Demo

    • 19.1. Configure Realm for Jetty

    • 19.2. Configure Spring Security

    • 18.1. Attack scenarios

    • 18.2. Resolve Session Forgery

    • 17.1. Configuration files

    • 17.2. Modify the Default user name

    • 17.3. Restrictions for anonymous users

    • 16.1. Default Policy

    • 16.2. Persistence strategy

    • 15.1. Configure Taglib

    • 15.2. Authenticaiton

    • 15.3. Authorize

    • 15.4. Acl/accesscontrollist

    • 15.5. Display the respective landing Success page for different users

    • 14.1. Configure Basic validation

    • 14.2. Programming for basic Client

    • 13.1. Configure Ja-sig

    • 13.2. Configure Spring Security

    • 13.3. Run a subsystem with CAS configured

    • 13.4. Configure SSL for CAs

    • 13.2.1. Adding dependencies

    • 13.2.2. Modifying applicationcontext.xml

    • 13.4.1. Generating keys

    • 13.4.2. Configuring SSL for Jetty

    • 13.4.3. Configuring SSL for Tomcat

    • 12.1. Adding listeners

    • 12.2. Adding filters

    • 12.3. Control Strategy

    • 12.3.1. Users in the rear are prohibited from logging in

    • 12.3.2. After landing will first login to the kick-off system

    • 11.1. Httpsessioncontextintegrationfilter

    • 11.2. Logoutfilter

    • 11.3. Authenticationprocessingfilter

    • 11.4. Defaultloginpagegeneratingfilter

    • 11.5. Basicprocessingfilter

    • 11.6. Securitycontextholderawarerequestfilter

    • 11.7. Remembermeprocessingfilter

    • 11.8. Anonymousprocessingfilter

    • 11.9. Exceptiontranslationfilter

    • 11.10. Sessionfixationprotectionfilter

    • 11.11. Filtersecurityinterceptor

    • 11. Schematic Filter

    • 12. Managing Sessions

    • 13. Single Sign-on

    • Basic Certification

    • 15. Tag Library

    • 16. Automatic Login

    • 17. Anonymous Login

    • 18. Defensive session Forgery

    • 19. Pre-Certification

    • 20. Switch Users

    • 21. Channel Security

    • Digest Certification

    • 23. Obtaining user information through LDAP

    • 24. Login via OpenID

    • 25. Log in using X509

    • 26. Sign in with NTLM

    • 27. Using the JAAS mechanism

    • 28. Using Httpinvoker

    • 29. Using RMI

    • 30. Control permissions for the portal

    • 31. Save the request before logging in

    • 32. Record the Operation log

  • Iii. Internal mechanisms

    • 51.1. Using Rolehierarchyvoter

    • 51.2. Using a database to implement Rolehierarchy

    • 50.1. Not logged in automatically jump to the corresponding login page

    • 50.2. Return the corresponding page when the password is wrong

    • 49.1. Principle of implementation

    • 49.2. Code implementation

    • 49.3. Current deficiencies in implementation

    • 48.1. Standard Filter

    • 48.2. Enable standard filters in HTTP

    • 48.3. Set the location for the custom filter

    • 47.1. Antpathrequestmatcher

    • 47.2. Regexrequestmatcher

    • 46.1. Limitations of the default policy

    • 46.2. Record user name and IP

    • 46.3. Change Control class

    • 46.4. Modify the configuration file

    • 45.1. Modify filter Support forward

    • 45.2. Customizing the login page

    • 45.3. Display password error message

    • 44.1. Database structure

    • 44.2. Modify the configuration file

    • 40.1. Implement the Userdetails interface

    • 40.2. Implement the Userdetailsservice interface

    • 40.3. Modify the configuration file

    • 40.4. Test run

    • 39.1. Basic knowledge

    • 39.2. Read resources

    • 39.3. URL Resource Extension Point

    • 39.4. Method Resource Extension Point

    • 37.1. Userdetails

    • 37.2. Using Role inheritance

    • 37.3. Adding role inheritance for ACLs

    • 37.4. Passwordencoder and Saltvalue

    • 36.1. Permission Configuration Data source

    • 36.2. Rights Manager

    • 36.3. Post-Call Manager

    • 36.4. Temporary assignment of additional permissions

    • 35.1. Voter voting

    • 35.2. Rolevoter

    • 35.3. Authenticatedvoter

    • 35.4. Abstractaclvoter

    • 34.1. Certification and verification

    • 34.2. SecurityContext Security Context

    • 34.3. Authentication Validation Object

    • 33.1. Controlling the global scope of method permissions

    • 33.2. Controlling method permissions within a bean

    • 33.3. Using annotation control method permissions

    • 33.3.1. Using secured

    • 33.3.2. Using jsr250

    • 33. Protection Method Invocation

    • 34. Basic concepts of Rights management

    • Voter. Voting by

    • 36. Interceptors

    • 37. User Information

    • 38. Integrated Jcaptcha

    • 39. Dynamic resource Management

    • 40. Extended Userdetails

    • 41. Lock the user

    • 42. Set the filter chain

    • 43. Custom Filters

    • 44. Working with user groups

    • 45. Using Spring Security in JSF

    • 46. Custom Session Management

    • 47. Match URL Address

    • 48. Configure Filters

    • 49. Monitoring session Expiration

    • 50. Multiple Landing pages

    • 51. Role Inheritance

    • 52. Setting up Method interceptors

  • Iv. ACL Articles

      • 55.1. Automatically create ACLs

      • 55.2. Automatically delete ACLs

      • 55.3. Remove ACLs by ID

      • 54.1. Managing multiple domain Classes

      • 54.2. Dynamic authorization and recovery authorization

      • 54.2.1. Obtaining ACL permissions for an object

      • 54.2.2. Adding authorizations

      • 54.2.3. Repossession of authorizations

      • 53.1. Preparing the database and Aclservice

      • 53.2. Using Aclservice to manage ACL information

      • 53.3. Using ACLs to control delete operations

      • 53.4. Control what information users can see

      • 53.1.1. Configuring the cache for ACLs

      • 53.1.2. Configuring Lookupstrategy

      • 53.1.3. Configuring Aclservice

      • . ACL Basic Operations

      • 54. Managing ACLS

      • Automatic ACL alert

  • V. Best practices

      • 57.1. Add support for user groups

      • 57.2. Browse user Groups

      • 57.3. Create a user group

      • 57.4. Modify user Groups

      • 56.1. Platform Setup

      • 56.2. User Login

      • 56.3. List of user information

      • 56.4. Add Users

      • 56.5. Modify user Information

      • 56.6. Change your password

      • 56. Simplified Console

      • 57. User Group Console

  • A. Modifying the log

  • B. Frequently Asked Questions

  • C. Spring security-3.0.0.m1

      • C.1. Hello World

      • C.2. Spring-el

      • C.3. Rolehierarchy

      • C.4. Success Handler

      • C.5. Permissions control under Rest

      • C.6. Managing session Synchronization

      • C.7. Debug Debug mode

  • D. Namespaces

      • D.1. http

      • D.2. Authentication-provider

      • D.3. Ldap-server

      • D.4. global-method-security

  • E. Database table structure

      • E.1. User

      • E.2. Group

      • E.3. RememberMe

      • E.4. ACL

  • F. Exceptions

  • G. Events

  • H. RBAC model (reproduced)

      • h.5.1. Definition 3:

      • h.4.1. Definition 2:RBAC1 determined by the following content

      • The form of the h.3.1. RBAC0 model is defined as follows

      • h.2.1. What is a role

      • h.2.2. Roles and user groups

      • H.1. RBAC Model Introduction

      • H.2. Related Concepts

      • h.3. Basic model RBAC0

      • H.4. Role Ranking Model RBAC1

      • H.5. Restricting model RBAC2

      • h.6. Unified Model RBAC3

      • h.7. Definition 4

      • H.8. In the ARBAC97, including three types of components

      • H.9. Features of the RBAC model

      • h.10. party-based models

      • h.11. About Operation

  • I. Certification process

Spring Security 3 Very full document API Chinese version

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.