Spring Security - from technical background to basic knowledge to installation and landing application

1. When should safety be considered?               

During the project architecture, it is necessary to consider the specific implementation to avoid later project reconstruction
2, the difference between shiro and springsecurity:           

Except that the class is different and the name is different, it is very similar

 3. General web applications need to be authenticated and authorized.

  • 认证: To verify whether the current access system is a user of this system, and to confirm which user it is
  • ​: 授权 After authentication, determine whether the current user has permission to perform an operation

Authentication and authorization are also the core functions of Spring Security as a security framework.

4. What are the permissions?

      Function Permissions
      Access Permissions
      Menu Permissions

5. The use demo of Mad God: SpringBoot: Integrating SpringSecurity to realize login authentication, authorization, remember me, and permission control-KuangStudy-Article

 

Guess you like

Origin blog.csdn.net/qq_39367410/article/details/128797992