Book Image

Building Applications with Spring 5 and Vue.js 2

By : James J. Ye
Book Image

Building Applications with Spring 5 and Vue.js 2

By: James J. Ye

Overview of this book

Building Applications with Spring 5 and Vue.js 2, with its practical approach, helps you become a full-stack web developer. As well as knowing how to write frontend and backend code, a developer has to tackle all problems encountered in the application development life cycle – starting from the simple idea of an application, to the UI and technical designs, and all the way to implementation, testing, production deployment, and monitoring. With the help of this book, you'll get to grips with Spring 5 and Vue.js 2 as you learn how to develop a web application. From the initial structuring to full deployment, you’ll be guided at every step of developing a web application from scratch with Vue.js 2 and Spring 5. You’ll learn how to create different components of your application as you progress through each chapter, followed by exploring different tools in these frameworks to expedite your development cycle. By the end of this book, you’ll have gained a complete understanding of the key design patterns and best practices that underpin professional full-stack web development.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Preface
Index

Spring Security deep dive


Filters are the perfect place to perform various actions on the requests that the application receives, such as auditing and security checking. Spring Security is built on filters. To gain a better understanding of how Spring Security works internally, we're going to look at the following types of requests and see how they are processed by Spring Security filters, as well as the Spring Security components that participate in these requests:

  • An unauthenticated request accessing a public resource
  • An unauthenticated request accessing a protected resource
  • An authentication request
  • An authenticated request accessing a protected resource
  • An authenticated request accessing an unauthorized resource

What is a better way to understand how Spring Security works than seeing it in action? Before we talk about these requests, let's set up Spring Security in our TaskAgile application.

Setting up Spring Security

To install Spring Security, let's add the following dependency to pom.xml...