shiro learning summary

First two good examples for reference:

1. Examples of authentication and authority management implemented by common Spring MVC interceptors

https://blog.csdn.net/u013647382/article/details/53995655

2. Shiro+SSM integration example with database can be successfully accessed

https://blog.csdn.net/zzhao114/article/details/55662585

 

The general process of authentication and authority management implemented by ordinary Spring MVC interceptors:

The Spring MVC login interceptor and permission interceptor actually read the current user's login and permission information from the seesion, and perform corresponding authentication and matching.

 

 

The benefits of using shiro can be seen by comparison:

No need to write SpringMVC login interceptor and permission interceptor.

As long as the relevant address is configured in the spring-shiro configuration file,

Works with MyRealm

doGetAuthenticationInfo login authentication

doGetAuthorizationInfo reads user permissions

The same can be achieved.

 

 

https://blog.csdn.net/zzhao114/article/details/55662585

 

The general process of authentication and authority management implemented by ordinary Spring MVC interceptors:

The Spring MVC login interceptor and permission interceptor actually read the current user's login and permission information from the seesion, and perform corresponding authentication and matching.

 

 

The benefits of using shiro can be seen by comparison:

No need to write SpringMVC login interceptor and permission interceptor.

As long as the relevant address is configured in the spring-shiro configuration file,

Works with MyRealm

doGetAuthenticationInfo login authentication

doGetAuthorizationInfo reads user permissions

The same can be achieved.

 

 

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=324394936&siteId=291194637