Spring Security Principle
Spring Security adopts the chain of responsibility design pattern. There is a long filter chain. First, the client Initiate a request, enter the Security filter chain, then determine whether it is a login, and finally find the corresponding authentication manager based on the URI for authentication.
flow chart
Process Description
#The client initiates a request and enters the Security filter chain.
When reaching the LogoutFilter, determine whether it is the logout path. If it is the logout path, go to the logoutHandler. If the logout is successful, go to the logoutSuccessHandler to process the logout successfully. If the logout fails, then By ExceptionTranslationFilter; if it is not the logout path, go directly to the next filter.
When reaching the UsernamePasswordAuthenticationFilter, determine whether it is the login path. If so, enter the filter to perform the login operation. If the login fails, go to the AuthenticationFailureHandler login failure handler for processing. If the login is successful, Then go to the AuthenticationSuccessHandler login success processor for processing. If it is not a login request, it will not enter the filter.
When you get to the FilterSecurityInterceptor, you will get the uri. According to the uri, you will find the corresponding authentication manager. The authentication manager will do the authentication work. If the authentication is successful, go to the Controller layer. Otherwise, go to the Controller layer. Go to the AccessDeniedHandler authentication failure handler for processing.
Recommended tutorial: "Java Tutorial"
The above is the detailed content of Spring Security Principles. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
