What architectural patterns does Spring Security follow? This talk starts with an insecure application and secures it from the ground up. It’ll examine patterns that are repeated throughout Spring Security and explain why they are there. Among others, you’ll learn about Spring Security’s filter chain, its authentication manager, and its preference for final classes and private methods.
Josh enjoys application security, live hacking, and frosted mini-wheats. He works for VMWare, maintaining Spring Security.