Summary
Review the concepts covered in this chapter.
In this chapter we learned how to:
- Create a demo application by simply adding Spring Boot’s security starter.
- Craft a Spring Data repository to delegate user management to a database.
- Customize our configuration and plug in URL security rules.
- Leverage method-level security to apply fine-grained access controls.
- Integrate with Google to shift the need for user management to a third-party.
Get hands-on with 1200+ tech skills courses.