My last blog talked about exposing a simple GET endpoint. In this article, I will try to protect that same endpoint using an LDAP-backed IdP via the Spring framework.
Spring Security aims to operate in a self container manner. There is no need to place any special configuration files into your Java Runtime Environment.
Authentication and Access Control
The application security is about two main components:
from DZone.com Feed https://ift.tt/2yMIJT4
No comments:
Post a Comment