Chapter 13. Custom Authorization
In this chapter, we will write some custom implementations for Spring Security's key authorization APIs. Once we have done this, we will use the understanding of the custom implementations to understand how Spring Security's authorization architecture works.
Throughout this chapter, we will cover the following topics:
- Gaining an understanding of how authorization works
- Writing a custom
SecurityMetaDataSource
backed by a database instead ofantMatchers()
methods - Creating a custom SpEL expression
- Implementing a custom
PermissionEvaluator
object that allows our permissions to be encapsulated